skip to main content
article

Battery power-aware encryption

Published:01 May 2006Publication History
Skip Abstract Section

Abstract

Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation, (b) based on the profiled data, propose mathematical models to capture the relationships between power consumption and security, and (c) formulate and solve security maximization subject to power constraints. Numerical results are presented to illustrate the gains that can be achieved in using solutions of the proposed security maximization problems subject to power constraints.

References

  1. Bapatla, S. and Chandramouli, R. 2004. Battery power optimized encryption. Proc. IEEE Intern. Conf. on Communications 7, 3802--3806.Google ScholarGoogle Scholar
  2. Biham, E. and Shamir, A. 1991. Differential cryptanalysis of des-like cryptosystems. Journal of Cryptology 4, 1, 3--72.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Biryukov, A. 2004. Boomerang attack on 5- and 6-round aes. Fourth Conference on the Advanced Encryption Standard (AES). 11--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Buchmann, I. Batteries in a portable world. http://www.buchmann.ca/.Google ScholarGoogle Scholar
  5. Dantzig, G. B. 1957. Discrete-variable extremum problems. Operations Research 5, 266--277.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. DES. 1977. National bureau of standards. data encryption standard. U. S. Department of Commerce.Google ScholarGoogle Scholar
  7. Goodman, J. and Chandrakasan, A. 1998. Low power scalable encryption algorithms. Wireless Networks The Journal of Mobile Communication, Computation and Information 4, 1, 55--70. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Goodman, J., Chandrakasan, A., and Dancy, A. 1999. Design and implementation of a scalable encryption processor with embedded variable dc/dc converter. In Proc. of the 36th ACM/IEEE Conference on Design Automation. 855--860. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. GOST. 1989. Gosudarstvennyi standard 28146-89. Cryptographic Protection for Data Processing Systems.Google ScholarGoogle Scholar
  10. Hodjat, A. and Verbauwhede, I. 2002. The energy cost of secrets in ad-hoc networks. IEEE Circuits and Systems Workshop on Wireless Communications and Networking.Google ScholarGoogle Scholar
  11. IEEE802.11b. http://grouper.ieee.org/groups/802/11/.Google ScholarGoogle Scholar
  12. Karri, R. and Mishra, P. 2003. Minimizing the secure wireless session energy. Journal of Mobile Network and Applications (MONET) 8, 2 (April), 177--185. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Keliher, L. 2004. Refined analysis of bounds related to linear and differential cryptanalysis for the aes. Fourth Conference on the Advanced Encryption Standard (AES) “AES---State of the Crypto Analysis.” 42--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Labview. http://www.ni.com.Google ScholarGoogle Scholar
  15. Lai, X. 1992. On the design and security of block ciphers. ETH Series in Information Processing 1.Google ScholarGoogle Scholar
  16. Lawler, E. 1976. Combinatorial optimization: Networks and matroids. Holt, Rinehart and Winston, NY.Google ScholarGoogle Scholar
  17. Matsui, M. 1993. Linear cryptanalysis method for des cipher. Advances in Cryptology - Eurocrypt. 386--397. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Matsui, M. 1994. The first experimental cryptanalysis of data encryption standard. Advances in Cryptology Crypto'94, 1--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Michell, S. and Srinivasan, K. 2004. State based key hop protocol: a lightweight security protocol for wireless networks. In Proc. of 1st ACM International Workshop on Performance Evaluation of Wireless Ad hoc, Sensor, and Ubiquitous Network. 112--118. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. MPEG4. http://www.m4if.org/.Google ScholarGoogle Scholar
  21. Nechvatal, J., Barker, E., Dodson, D., Dworkin, M., Foti, J., and Roback, E. 1999. Status report on the first round of the development of the advanced encryption standard. Journal of Research of the National Institute of Standards and Technology 104, 5, 435--459.Google ScholarGoogle ScholarCross RefCross Ref
  22. Oprofile: A System Profiler for Linux. http://oprofile.sourceforge.net.Google ScholarGoogle Scholar
  23. Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D. 2002. Spins: Security protocols for sensor networks. ACM Journal of Wireless Networks 8, 5 (Sept.), 521--534. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Potlapally, N., Ravi, S., Raghunathan, A., and Jha, N. 2003. Analyzing the energy consumption of security protocols. International Symposium on Low Power Electronics and Design, 30--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Prasithsangaree, P. and Krishnamurthy, P. 2003. Analysis of energy consumption of rc4 and aes algorithms in wireless lans. In Proc. IEEE Global Telecommunications Conference 22, 1 (Dec.). 1445--1449.Google ScholarGoogle Scholar
  26. Ravi, S., Raghunathan, A., and Potlapally, N. 2002. Securing wireless data: System architecture challenges. In Proc. Int. Symp. System Synthesis. 195--200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Rivest, R. 1992. The rc4 encryption algorithm. RSA Data Security, Inc.Google ScholarGoogle Scholar
  28. Schneier, B. 2002. Applied cryptography: Protocols, algorithms, and source code in C. Vol. 2. Wiley, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Sklavos, N. and Koufopavlou, O. 2001. Asynchronous low power vlsi implementation of the international data encryption algorithm. In Proc. of IEEE International Conference on Electronics, Circuits and Systems.Google ScholarGoogle Scholar
  30. Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., and Srivastava, M. 2002. On communication security in wireless ad-hoc sensor networks. In 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. 139--144. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Tosun, A. and Feng, W. 2001. Lightweight security mechanisms for wireless video transmission. In Proc. IEEE International Conference on Information Technology: Coding and Computing. 157--161. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Battery power-aware encryption

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Information and System Security
          ACM Transactions on Information and System Security  Volume 9, Issue 2
          May 2006
          122 pages
          ISSN:1094-9224
          EISSN:1557-7406
          DOI:10.1145/1151414
          Issue’s Table of Contents

          Copyright © 2006 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 May 2006
          Published in tissec Volume 9, Issue 2

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader