Analyzing the Energy Consumption of Security Algorithms for Wireless LANs

Security in wireless networks is of paramount importance. Due to the broadcast nature of the wireless radio signals, wireless networks are implicitly vulnerable to several network attacks. Anyone within the wireless transmission range of a device (including malicious users or attackers) is able to passively listen to or eavesdrop on the signals and could potentially access information from the signals. It is also possible to actively transmit signals that can attack the network. Encryption algorithms play good roles in information security systems (ISS). Those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. Wireless devices are powered by a battery which is a very limited resource. It implicitly says that the power of computing will grow exponentially. However, the capacity of batteries is growing linearly, and this introduces a "power gap" which is the difference between the power required by computing and the battery capacity. Thus, battery power tends to be a very seriously limited resource for small wireless devices, and a security protocol should utilize energy to the minimum extent possible. This aspect is the primary focus of this dissertation. This paper illustrates the key concepts of security, wireless networks, and security over wireless networks. It provides evaluation of six of the most common encryption algorithms on power consumption for wireless devices A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption

[1]  T. Sakai,et al.  Structural investigation and hydrogen capacity of YMg2Ni9 and (Y0.5Ca0.5)(MgCa)Ni9: new phases in the AB2C9 system isostructural with LaMg2Ni9 , 1999 .

[2]  Sohail A Hirani Energy Consumption of Encryption Schemes in Wireless Devices , 2003 .

[3]  R. N. Uma,et al.  Battery power-aware encryption , 2006, TSEC.

[4]  Vincent Rijmen,et al.  Rijndael, the advanced encryption standard , 2001 .

[5]  D. Noréus,et al.  Structural determination of AMgNi4 (where A=Ca, La, Ce, Pr, Nd and Y) in the AuBe5 type structure , 2002 .

[6]  T. Sakai,et al.  Structural investigation and hydrogen storage capacity of LaMg2Ni9 and (La0.65Ca0.35)(Mg1.32Ca0.68)Ni9 of the AB2C9 type structure , 2000 .

[7]  Shiva Priya Katta Performance of Encryption Techniques for Real Time Video Streaming , 2010, ICCA 2010.

[8]  Anantha Chandrakasan,et al.  JouleTrack: a web based tool for software energy profiling , 2001, DAC '01.

[9]  Osama M. Abu Zaid,et al.  Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms , 2007, Int. J. Netw. Secur..

[10]  William Stallings,et al.  Cryptography and network security , 1998 .

[11]  Sagar Naik,et al.  Software implementation strategies for power-conscious systems , 1999, Mobile Networks and Computing.

[12]  A T Karygiannis,et al.  Wireless Network Security: 802.11, Bluetooth and Handheld Devices , 2002 .

[13]  Thomas Hardjono,et al.  Security in Wireless LANs and MANs , 2005 .

[14]  P. Krishnamurthy,et al.  Encryption and Power Consumption in Wireless LANs , 2001 .

[15]  R. Badlishah Ahmad,et al.  Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers , 2008 .

[16]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[17]  Xiao-ping Dong,et al.  Influences of the substitution of Fe for Ni on structures and electrochemical performances of the as-cast and quenched La0.7Mg0.3Co0.45Ni2.55−xFex (x = 0–0.4) electrode alloys , 2008 .

[18]  Don Coppersmith,et al.  The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..