Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks

Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security.1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation (single and multirate), 4) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches.

[1]  Douglas R. Stinson Cryptography: Theory and Practice, Third Edition , 2005 .

[2]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[3]  L. Litwin,et al.  Error control coding , 2001 .

[4]  L. Sennott Stochastic Dynamic Programming and the Control of Queueing Systems , 1998 .

[5]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[6]  Dimitri P. Bertsekas,et al.  Dynamic Programming and Optimal Control, Two Volume Set , 1995 .

[7]  Pravin Varaiya,et al.  Capacity of fading channels with channel side information , 1997, IEEE Trans. Inf. Theory.

[8]  Rajarathnam Chandramouli,et al.  Battery power optimized encryption , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[9]  John B. Kam,et al.  Structured Design of Substitution-Permutation Encryption Networks , 1979, IEEE Transactions on Computers.

[10]  Andrea J. Goldsmith,et al.  Variable-rate variable-power MQAM for fading channels , 1997, IEEE Trans. Commun..

[11]  Ronald L. Rivest,et al.  Introduction to Algorithms, Second Edition , 2001 .

[12]  Mohsen Guizani,et al.  Optimal stream-based cipher feedback mode in error channel , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[13]  Shlomo Shamai,et al.  Information theoretic considerations for cellular mobile radio , 1994 .

[14]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[15]  Norman C. Beaulieu,et al.  On first-order Markov modeling for the Rayleigh fading channel , 2000, IEEE Trans. Commun..

[16]  David G. Messerschmitt,et al.  End-to-end confidentiality for continuous-media applications in wireless systems , 2001 .

[17]  Zukang Shen,et al.  Short range wireless channel prediction using local information , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.

[18]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[19]  Sinem Coleri Ergen,et al.  Channel estimation techniques based on pilot arrangement in OFDM systems , 2002, IEEE Trans. Broadcast..

[20]  B.L. Evans,et al.  Long range channel prediction for adaptive OFDM systems , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[21]  Daniel J. Costello,et al.  Error Control Coding, Second Edition , 2004 .

[22]  Seymour Stein,et al.  Fading Channel Issues in System Engineering , 1987, IEEE J. Sel. Areas Commun..

[23]  Lars K. Rasmussen,et al.  Linear interference cancellation in CDMA based on iterative techniques for linear equation systems , 2000, IEEE Trans. Commun..

[24]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory , 2002 .

[25]  Andrea Goldsmith,et al.  Variable- Power MQAM for )Fading Channels , 1996 .

[26]  Xiaolin Wu,et al.  Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[27]  W. C. Jakes,et al.  Microwave Mobile Communications , 1974 .

[28]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[29]  A. Goldsmith,et al.  Variable-rate variable-power MQAM for fading channels , 1996, Proceedings of Vehicular Technology Conference - VTC.

[30]  Hong Shen Wang,et al.  Finite-state Markov channel-a useful model for radio communication channels , 1995 .

[31]  David G. Messerschmitt,et al.  The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks , 2001, MMNS.