Abstract
Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation, (b) based on the profiled data, propose mathematical models to capture the relationships between power consumption and security, and (c) formulate and solve security maximization subject to power constraints. Numerical results are presented to illustrate the gains that can be achieved in using solutions of the proposed security maximization problems subject to power constraints.
- Bapatla, S. and Chandramouli, R. 2004. Battery power optimized encryption. Proc. IEEE Intern. Conf. on Communications 7, 3802--3806.Google Scholar
- Biham, E. and Shamir, A. 1991. Differential cryptanalysis of des-like cryptosystems. Journal of Cryptology 4, 1, 3--72.Google ScholarDigital Library
- Biryukov, A. 2004. Boomerang attack on 5- and 6-round aes. Fourth Conference on the Advanced Encryption Standard (AES). 11--15. Google ScholarDigital Library
- Buchmann, I. Batteries in a portable world. http://www.buchmann.ca/.Google Scholar
- Dantzig, G. B. 1957. Discrete-variable extremum problems. Operations Research 5, 266--277.Google ScholarDigital Library
- DES. 1977. National bureau of standards. data encryption standard. U. S. Department of Commerce.Google Scholar
- Goodman, J. and Chandrakasan, A. 1998. Low power scalable encryption algorithms. Wireless Networks The Journal of Mobile Communication, Computation and Information 4, 1, 55--70. Google ScholarDigital Library
- Goodman, J., Chandrakasan, A., and Dancy, A. 1999. Design and implementation of a scalable encryption processor with embedded variable dc/dc converter. In Proc. of the 36th ACM/IEEE Conference on Design Automation. 855--860. Google ScholarDigital Library
- GOST. 1989. Gosudarstvennyi standard 28146-89. Cryptographic Protection for Data Processing Systems.Google Scholar
- Hodjat, A. and Verbauwhede, I. 2002. The energy cost of secrets in ad-hoc networks. IEEE Circuits and Systems Workshop on Wireless Communications and Networking.Google Scholar
- IEEE802.11b. http://grouper.ieee.org/groups/802/11/.Google Scholar
- Karri, R. and Mishra, P. 2003. Minimizing the secure wireless session energy. Journal of Mobile Network and Applications (MONET) 8, 2 (April), 177--185. Google ScholarDigital Library
- Keliher, L. 2004. Refined analysis of bounds related to linear and differential cryptanalysis for the aes. Fourth Conference on the Advanced Encryption Standard (AES) “AES---State of the Crypto Analysis.” 42--57. Google ScholarDigital Library
- Labview. http://www.ni.com.Google Scholar
- Lai, X. 1992. On the design and security of block ciphers. ETH Series in Information Processing 1.Google Scholar
- Lawler, E. 1976. Combinatorial optimization: Networks and matroids. Holt, Rinehart and Winston, NY.Google Scholar
- Matsui, M. 1993. Linear cryptanalysis method for des cipher. Advances in Cryptology - Eurocrypt. 386--397. Google ScholarDigital Library
- Matsui, M. 1994. The first experimental cryptanalysis of data encryption standard. Advances in Cryptology Crypto'94, 1--11. Google ScholarDigital Library
- Michell, S. and Srinivasan, K. 2004. State based key hop protocol: a lightweight security protocol for wireless networks. In Proc. of 1st ACM International Workshop on Performance Evaluation of Wireless Ad hoc, Sensor, and Ubiquitous Network. 112--118. Google ScholarDigital Library
- MPEG4. http://www.m4if.org/.Google Scholar
- Nechvatal, J., Barker, E., Dodson, D., Dworkin, M., Foti, J., and Roback, E. 1999. Status report on the first round of the development of the advanced encryption standard. Journal of Research of the National Institute of Standards and Technology 104, 5, 435--459.Google ScholarCross Ref
- Oprofile: A System Profiler for Linux. http://oprofile.sourceforge.net.Google Scholar
- Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler, D. 2002. Spins: Security protocols for sensor networks. ACM Journal of Wireless Networks 8, 5 (Sept.), 521--534. Google ScholarDigital Library
- Potlapally, N., Ravi, S., Raghunathan, A., and Jha, N. 2003. Analyzing the energy consumption of security protocols. International Symposium on Low Power Electronics and Design, 30--35. Google ScholarDigital Library
- Prasithsangaree, P. and Krishnamurthy, P. 2003. Analysis of energy consumption of rc4 and aes algorithms in wireless lans. In Proc. IEEE Global Telecommunications Conference 22, 1 (Dec.). 1445--1449.Google Scholar
- Ravi, S., Raghunathan, A., and Potlapally, N. 2002. Securing wireless data: System architecture challenges. In Proc. Int. Symp. System Synthesis. 195--200. Google ScholarDigital Library
- Rivest, R. 1992. The rc4 encryption algorithm. RSA Data Security, Inc.Google Scholar
- Schneier, B. 2002. Applied cryptography: Protocols, algorithms, and source code in C. Vol. 2. Wiley, New York. Google ScholarDigital Library
- Sklavos, N. and Koufopavlou, O. 2001. Asynchronous low power vlsi implementation of the international data encryption algorithm. In Proc. of IEEE International Conference on Electronics, Circuits and Systems.Google Scholar
- Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., and Srivastava, M. 2002. On communication security in wireless ad-hoc sensor networks. In 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. 139--144. Google ScholarDigital Library
- Tosun, A. and Feng, W. 2001. Lightweight security mechanisms for wireless video transmission. In Proc. IEEE International Conference on Information Technology: Coding and Computing. 157--161. Google ScholarDigital Library
Index Terms
- Battery power-aware encryption
Recommendations
An Efficient Battery Lifetime Aware Power Saving (EBLAPS) Mechanism in IEEE 802.16e Networks
The IEEE 802.16e standard is an emergent broadband wireless access technology that added the mobility feature to the original standard. This feature made battery life of an operated mobile subscribe station (MSS) a bigger challenge because an MSS is ...
Latency-aware DVFS for efficient power state transitions on many-core architectures
Energy efficiency is quickly becoming a first-class design constraint in high-performance computing (HPC). We need more efficient power management solutions to save energy costs and carbon footprint of HPC systems. Dynamic voltage and frequency scaling (...
Applying pinwheel scheduling and compiler profiling for power-aware real-time scheduling
Energy consumption is a critical design issue in embedded systems, especially in battery-operated systems. Maintaining high performance while extending the battery life is an interesting challenge for system designers. Dynamic voltage scaling and ...
Comments