{"title":"自适应IEEE 802.11i安全能源安全优化","authors":"M. R. Doomun, K. Soyjaudah","doi":"10.1109/AICT.2007.3","DOIUrl":null,"url":null,"abstract":"As computing devices and wireless connectivity become ubiquitous, the need for efficient secure wireless networks becomes a critical concern. Low power consumption is currently one of the major issues for all wireless application. Emerging wireless and mobile appliances are severely constrained in the resources they possess, namely, processor, battery, and memory. Energy consumed by computation and communication intensive wireless security protocols used to provide data privacy, integrity and authenticity is a function of the size of the data transferred and the security level of the session. In this paper we propose an adaptive security scheme for wireless networks to optimize battery energy consumption. We base our model on well-established simulation results and methodologies that leads to rigorous modularization for energy-conscious and energy-conserving wireless security design.","PeriodicalId":334924,"journal":{"name":"The Third Advanced International Conference on Telecommunications (AICT'07)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Adaptive IEEE 802.11i Security for Energy-Security Optimization\",\"authors\":\"M. R. Doomun, K. Soyjaudah\",\"doi\":\"10.1109/AICT.2007.3\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As computing devices and wireless connectivity become ubiquitous, the need for efficient secure wireless networks becomes a critical concern. Low power consumption is currently one of the major issues for all wireless application. Emerging wireless and mobile appliances are severely constrained in the resources they possess, namely, processor, battery, and memory. Energy consumed by computation and communication intensive wireless security protocols used to provide data privacy, integrity and authenticity is a function of the size of the data transferred and the security level of the session. In this paper we propose an adaptive security scheme for wireless networks to optimize battery energy consumption. We base our model on well-established simulation results and methodologies that leads to rigorous modularization for energy-conscious and energy-conserving wireless security design.\",\"PeriodicalId\":334924,\"journal\":{\"name\":\"The Third Advanced International Conference on Telecommunications (AICT'07)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-05-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Third Advanced International Conference on Telecommunications (AICT'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AICT.2007.3\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Third Advanced International Conference on Telecommunications (AICT'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AICT.2007.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Adaptive IEEE 802.11i Security for Energy-Security Optimization
As computing devices and wireless connectivity become ubiquitous, the need for efficient secure wireless networks becomes a critical concern. Low power consumption is currently one of the major issues for all wireless application. Emerging wireless and mobile appliances are severely constrained in the resources they possess, namely, processor, battery, and memory. Energy consumed by computation and communication intensive wireless security protocols used to provide data privacy, integrity and authenticity is a function of the size of the data transferred and the security level of the session. In this paper we propose an adaptive security scheme for wireless networks to optimize battery energy consumption. We base our model on well-established simulation results and methodologies that leads to rigorous modularization for energy-conscious and energy-conserving wireless security design.