Affiliation:
1. Stevens Institute of Technology, Hoboken, NJ
2. North Carolina Central University, Durham, NC
Abstract
Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation, (b) based on the profiled data, propose mathematical models to capture the relationships between power consumption and security, and (c) formulate and solve security maximization subject to power constraints. Numerical results are presented to illustrate the gains that can be achieved in using solutions of the proposed security maximization problems subject to power constraints.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference31 articles.
1. Battery power optimized encryption;Bapatla S.;Proc. IEEE Intern. Conf. on Communications,2004
2. Differential cryptanalysis of DES-like cryptosystems
3. The Boomerang Attack on 5 and 6-Round Reduced AES
4. Buchmann I. Batteries in a portable world. http://www.buchmann.ca/. Buchmann I. Batteries in a portable world. http://www.buchmann.ca/.
5. Discrete-Variable Extremum Problems
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献