Optimizing the energy consumed by secure wireless sessions wireless transport layer security case study

Ramesh Karri, Piyush Mishra

Research output: Contribution to journalArticle

Abstract

In this paper we identified the various sources of energy consumption during the setup, operation and tear down of a secure wireless session by considering the wireless transport layer security protocol. Our analysis showed that data transfers during a secure wireless transaction, number and size of messages exchanged during secure session establishment and cryptographic computations used for data authentication and privacy during secure data transactions in that order are the main sources of energy consumption during a secure wireless session. We developed techniques based on information compression, session negotiation protocol optimization and hardware acceleration of crypto-mechanisms to reduce the energy consumed by a secure session. A mobile test bed was developed to verify our energy management schemes and to study the energy consumption versus security tradeoffs. Using our proposed schemes we were able to reduce the session establishment energy by more than 6.5x and the secure data transaction energy by more than 1.5x during data transmission and by more than 2.5x during data reception.

Original languageEnglish (US)
Pages (from-to)177-185
Number of pages9
JournalMobile Networks and Applications
Volume8
Issue number2
DOIs
StatePublished - Apr 2003

Fingerprint

Energy utilization
Energy management
Data transfer
Data communication systems
Authentication
Hardware

Keywords

  • Energy-efficient
  • Mobile
  • Secure session
  • Security
  • Wireless
  • WTLS

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems

Cite this

Optimizing the energy consumed by secure wireless sessions wireless transport layer security case study. / Karri, Ramesh; Mishra, Piyush.

In: Mobile Networks and Applications, Vol. 8, No. 2, 04.2003, p. 177-185.

Research output: Contribution to journalArticle

@article{2beb1292e72148449fcd419b16d82dec,
title = "Optimizing the energy consumed by secure wireless sessions wireless transport layer security case study",
abstract = "In this paper we identified the various sources of energy consumption during the setup, operation and tear down of a secure wireless session by considering the wireless transport layer security protocol. Our analysis showed that data transfers during a secure wireless transaction, number and size of messages exchanged during secure session establishment and cryptographic computations used for data authentication and privacy during secure data transactions in that order are the main sources of energy consumption during a secure wireless session. We developed techniques based on information compression, session negotiation protocol optimization and hardware acceleration of crypto-mechanisms to reduce the energy consumed by a secure session. A mobile test bed was developed to verify our energy management schemes and to study the energy consumption versus security tradeoffs. Using our proposed schemes we were able to reduce the session establishment energy by more than 6.5x and the secure data transaction energy by more than 1.5x during data transmission and by more than 2.5x during data reception.",
keywords = "Energy-efficient, Mobile, Secure session, Security, Wireless, WTLS",
author = "Ramesh Karri and Piyush Mishra",
year = "2003",
month = "4",
doi = "10.1023/A:1022241315935",
language = "English (US)",
volume = "8",
pages = "177--185",
journal = "Mobile Networks and Applications",
issn = "1383-469X",
publisher = "Springer Netherlands",
number = "2",

}

TY - JOUR

T1 - Optimizing the energy consumed by secure wireless sessions wireless transport layer security case study

AU - Karri, Ramesh

AU - Mishra, Piyush

PY - 2003/4

Y1 - 2003/4

N2 - In this paper we identified the various sources of energy consumption during the setup, operation and tear down of a secure wireless session by considering the wireless transport layer security protocol. Our analysis showed that data transfers during a secure wireless transaction, number and size of messages exchanged during secure session establishment and cryptographic computations used for data authentication and privacy during secure data transactions in that order are the main sources of energy consumption during a secure wireless session. We developed techniques based on information compression, session negotiation protocol optimization and hardware acceleration of crypto-mechanisms to reduce the energy consumed by a secure session. A mobile test bed was developed to verify our energy management schemes and to study the energy consumption versus security tradeoffs. Using our proposed schemes we were able to reduce the session establishment energy by more than 6.5x and the secure data transaction energy by more than 1.5x during data transmission and by more than 2.5x during data reception.

AB - In this paper we identified the various sources of energy consumption during the setup, operation and tear down of a secure wireless session by considering the wireless transport layer security protocol. Our analysis showed that data transfers during a secure wireless transaction, number and size of messages exchanged during secure session establishment and cryptographic computations used for data authentication and privacy during secure data transactions in that order are the main sources of energy consumption during a secure wireless session. We developed techniques based on information compression, session negotiation protocol optimization and hardware acceleration of crypto-mechanisms to reduce the energy consumed by a secure session. A mobile test bed was developed to verify our energy management schemes and to study the energy consumption versus security tradeoffs. Using our proposed schemes we were able to reduce the session establishment energy by more than 6.5x and the secure data transaction energy by more than 1.5x during data transmission and by more than 2.5x during data reception.

KW - Energy-efficient

KW - Mobile

KW - Secure session

KW - Security

KW - Wireless

KW - WTLS

UR - http://www.scopus.com/inward/record.url?scp=0037376790&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0037376790&partnerID=8YFLogxK

U2 - 10.1023/A:1022241315935

DO - 10.1023/A:1022241315935

M3 - Article

VL - 8

SP - 177

EP - 185

JO - Mobile Networks and Applications

JF - Mobile Networks and Applications

SN - 1383-469X

IS - 2

ER -