Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 12:00 PM ET (12:00 - 16:00 UTC). We apologize for the inconvenience.
By Topic

On design tradeoffs between security and performance in wireless group communicating systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Jin-Hee Cho ; Dept. of Comput. Sci., Virginia Tech, VA, USA ; Ing-Ray Chen

While security is of prime concern in secure group communicating systems in wireless networks, security mechanisms employed often have implication on the performance of the system. Recently model-based qualitative evaluation has been used for the evaluation of security protocols to quantify security properties in terms of intrusion tolerance using quantitative modeling techniques. However, most of the prior work focused only on measuring security properties, largely ignoring the performance impact of the security mechanisms introduced into the system. In this paper, we analyze the tradeoff between security and performance properties of an intrusion detection system (IDS) in a wireless group communicating setting. In particular, we analyze how often the IDS should perform intrusion detection to effectively trade security off for performance, or vice versa, for the system to satisfy the application security and performance requirements. Given the mean time to security failure (MTTSF) for the system to reach a failure state, and the response time per rekey operation for the wireless group communicating system as metrics, we identify the optimal intrusion detection rate under which the MTTSF metric can be best traded off for the response time metric.

Published in:

Secure Network Protocols, 2005. (NPSec). 1st IEEE ICNP Workshop on

Date of Conference:

6 Nov. 2005