MINIMIZING THE SECURE WIRELESS SESSION ENERGY

In this paper we identified the various sources of energy consumption during the setup, operation and tear down of a secure wireless session. Our analysis showed that the data transfers during a secure wireless transaction, the number and size of messages exchanged during secure session establishment and the cryptographic computations used for data authentication and privacy during secure data transactions in that order are the main sources of energy consumption during a secure wireless session. We developed techniques based on compression, protocol optimization and hardware acceleration to reduce the energy consumed by a secure session. A mobile test bed was developed to verify our energy management schemes and to study the energy consumption vs. security trade-offs. Using our proposed schemes we were able to reduce the session establishment energy by more than 85% and the secure data transaction energy by more than 40% during data transmission and by more than 65% during data reception

[1]  Sharad Malik,et al.  Power analysis of embedded software: a first step towards software power minimization , 1994, IEEE Trans. Very Large Scale Integr. Syst..

[2]  Sujit Dey,et al.  Common-case computation: a high-level technique for power and performance optimization , 1999, DAC '99.

[3]  Peter Deutsch,et al.  DEFLATE Compressed Data Format Specification version 1.3 , 1996, RFC.

[4]  N. Bambos,et al.  Mobile power management for maximum battery life in wireless communication networks , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.

[5]  Frank Vahid,et al.  Interface and cache power exploration for core-based embedded system design , 1999, 1999 IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers (Cat. No.99CH37051).

[6]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[7]  Fred Douglis,et al.  Adaptive Disk Spin-Down Policies for Mobile Computers , 1995, Comput. Syst..

[8]  Cheng-Ta Hsieh,et al.  Profile-driven Program Synthesis For Evaluation Of System Power Dissipation , 1997, Proceedings of the 34th Design Automation Conference.

[9]  J. Flinn,et al.  Energy-aware adaptation for mobile applications , 1999, SOSP.

[10]  Niraj K. Jha,et al.  Power analysis of embedded operating systems , 2000, Proceedings 37th Design Automation Conference.

[11]  Carla Schlatter Ellis,et al.  The case for higher-level power management , 1999, Proceedings of the Seventh Workshop on Hot Topics in Operating Systems.

[12]  Massoud Pedram,et al.  Profile-driven program synthesis for evaluation of system power dissipation , 1997, DAC.

[13]  Alan Jay Smith,et al.  Reducing processor power consumption by improving processor time management in a single-user operating system , 1996, MobiCom '96.

[14]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[15]  Hal Wasserman,et al.  Comparing algorithm for dynamic speed-setting of a low-power CPU , 1995, MobiCom '95.

[16]  Jonathan M. Smith,et al.  The Power Broker: Intelligent Power Management for Mobile Computers , 1996 .

[17]  Jörg Henkel,et al.  A framework for estimating and minimizing energy dissipation of embedded HW/SW systems , 2001 .

[18]  Leo Monteban,et al.  WaveLAN®-II: A high-performance wireless LAN for the unlicensed band , 1997, Bell Labs Technical Journal.

[19]  David Clark,et al.  Encryption Advances to Meet Internet Challenges , 2000, Computer.

[20]  Robin Kravets,et al.  Power management techniques for mobile communication , 1998, MobiCom '98.

[21]  James A. Senn,et al.  The Emergence of M-Commerce , 2000, Computer.

[22]  Paul Horton,et al.  A Quantitative Analysis of Disk Drive Power Management in Portable Computers , 1994, USENIX Winter.