By Topic

Comparison of security protocols in mobile wireless environments: tradeoffs between level of security obtained and battery life

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Osorio, F.C.C. ; Dept. of Comput. Sci., Worcester Polytech. Inst., MA, USA ; McKay, K. ; Agu, E.

As the popularity of wireless networks increases, so does the need to protect them. In recent years, many researchers have studied the limitations of the security mechanisms that protect wireless networks, as well as the effects of network traffic on the battery life. However, there has been less research on the effect of adding security mechanisms to mobile devices and their impact on energy usage. This is a particularly important area when one considers classes of attacks where an attacker can drain a device's battery by simply having it repeatedly execute energy intensive programs. In this manuscript, we examine a method for analyzing trade-offs between energy and security proposed by Colo´n Osorio et al. This research describes a method to identify the most appropriate security profile for a given application, given battery constraints. We apply this methodology to the analysis of tradeoffs between energy utilization and security of current and proposed wireless protocols.

Published in:

Security and Privacy for Emerging Areas in Communication Networks, 2005. Workshop of the 1st International Conference on

Date of Conference:

5-9 Sept. 2005