1st International ICST Workshop on Security and QoS in Communication Networks

Research Article

Comparison of security protocols in mobile wireless environments: tradeoffs between level of security obtained and battery life

  • @INPROCEEDINGS{10.1109/SECCMW.2005.1588322,
        author={Fernando C.  Col\^{o}n Osorio and Emmanuel  Agu and Kerry  McKay},
        title={Comparison of security protocols in mobile wireless environments: tradeoffs between level of security obtained and battery life},
        proceedings={1st International ICST Workshop on Security and QoS in Communication Networks},
        publisher={IEEE},
        proceedings_a={SECQOS},
        year={2006},
        month={2},
        keywords={},
        doi={10.1109/SECCMW.2005.1588322}
    }
    
  • Fernando C. Colón Osorio
    Emmanuel Agu
    Kerry McKay
    Year: 2006
    Comparison of security protocols in mobile wireless environments: tradeoffs between level of security obtained and battery life
    SECQOS
    IEEE
    DOI: 10.1109/SECCMW.2005.1588322
Fernando C. Colón Osorio1,*, Emmanuel Agu2, Kerry McKay3
  • 1: Computer Science Department, Worcester Polytechnic Institute, USA,
  • 2: Computer Science Department, Worcester Polytechnic Institute - USA
  • 3: Computer Science Department, Worcester Polytechnic Institute, USA
*Contact email: FCCO@CS.WPI.EDU

Abstract

As the popularity of wireless networks increases, so does the need to protect them. In recent years, many researchers have studied the limitations of the security mechanisms that protect wireless networks, as well as the effects of network traffic on the battery life. However, there has been less research on the effect of adding security mechanisms to mobile devices and their impact on energy usage. This is a particularly important area when one considers classes of attacks where an attacker can drain a device's battery by simply having it repeatedly execute energy intensive programs. In this manuscript, we examine a method for analyzing trade-offs between energy and security proposed by Colo´n Osorio et al. This research describes a method to identify the most appropriate security profile for a given application, given battery constraints. We apply this methodology to the analysis of tradeoffs between energy utilization and security of current and proposed wireless protocols.