{"title":"Adaptive IEEE 802.11i Security for Energy-Security Optimization","authors":"M. R. Doomun, K. Soyjaudah","doi":"10.1109/AICT.2007.3","DOIUrl":null,"url":null,"abstract":"As computing devices and wireless connectivity become ubiquitous, the need for efficient secure wireless networks becomes a critical concern. Low power consumption is currently one of the major issues for all wireless application. Emerging wireless and mobile appliances are severely constrained in the resources they possess, namely, processor, battery, and memory. Energy consumed by computation and communication intensive wireless security protocols used to provide data privacy, integrity and authenticity is a function of the size of the data transferred and the security level of the session. In this paper we propose an adaptive security scheme for wireless networks to optimize battery energy consumption. We base our model on well-established simulation results and methodologies that leads to rigorous modularization for energy-conscious and energy-conserving wireless security design.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Third Advanced International Conference on Telecommunications (AICT'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AICT.2007.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
As computing devices and wireless connectivity become ubiquitous, the need for efficient secure wireless networks becomes a critical concern. Low power consumption is currently one of the major issues for all wireless application. Emerging wireless and mobile appliances are severely constrained in the resources they possess, namely, processor, battery, and memory. Energy consumed by computation and communication intensive wireless security protocols used to provide data privacy, integrity and authenticity is a function of the size of the data transferred and the security level of the session. In this paper we propose an adaptive security scheme for wireless networks to optimize battery energy consumption. We base our model on well-established simulation results and methodologies that leads to rigorous modularization for energy-conscious and energy-conserving wireless security design.