Analysis of the Power Consumption of Secure Communication in Wireless Networks

  • Kihong Kim
  • Jinkeun Hong
  • Jongin Lim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4080)


With the growth of the Internet, communication and network security have been the focus of much attention. In addition, deployment of resource intensive security protocols in battery-powered mobile devices has raised power consumption to a significant design basis of network design. In this paper, we propose a power-efficient secure communication restart mechanism for a wireless network and analyze the power consumed while restarting a secure communication. An experimental test bed was developed to inspect the proposed mechanism and to evaluate it in terms of power consumption relative to that of conventional secure communication restart mechanisms. Using our enhanced mechanism, we were able to reduce the power consumed during a secure communication restart by up to 60% compared with conventional restart mechanisms.


Power Consumption Secure Communication Mutual Authentication Secure Socket Layer Wireless Application Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
  3. 3.
  4. 4.
    WAP Froum. Wireless Transport Layer Security Spec.,
  5. 5.
    Karri, R., Mishra, P.: Optimizing the Energy Consumed by Secure Wireless Sessions - Wireless Transport Layer Security. In: Mobile Networks and Applications, pp. 177–185. Kluwer Academic Publishers, Dordrecht (2003)Google Scholar
  6. 6.
    Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. IEEE Transaction on Mobile Computing 5(2), 128–143 (2005)CrossRefGoogle Scholar
  7. 7.
    Karri, R., Mishra, P.: Minimizing Energy Consumption of Secure Wireless Session with QoS Constraints. In: ICC 2002, pp. 2053–2057 (2002)Google Scholar
  8. 8.
    Jakobsson, M., Pointcheval, D.: Mutual Authentication for Low-Powered Mobile Devices. In: Syverson, P.F. (ed.) FC 2001, vol. 2339, pp. 178–195. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  9. 9.
    Wong, D.S., Chan, A.H.: Mutual Authentication and Key Exchange for Low Power Wireless Communications. In: MILCOM 2002, pp. 39–43 (2002)Google Scholar
  10. 10.
    Kravets, R., Krishnan, R.: Power Management Techniques for Mobile Communication. In: MobiCom 1999 (1999)Google Scholar
  11. 11.
    Woesner, H., Ebert, J.P., Schlager, M., Wolisz, A.: Power Saving Mechanisms in Emerging Standards for Wireless LANs: The MAC-Level Prospective. IEEE Personal Communication System, 40–48 (1998)Google Scholar
  12. 12.
    Singh, S., Raghavendra, C.S.: PAMAS-Power Aware Multi-Access Protocol with Signaling for Ad-hoc Networks. Computer Communications Review (1998)Google Scholar
  13. 13.
    Mikal, P.: WTLS : The Good and Bad of WAP Security (2001),
  14. 14.
    Saarinen, M.J.: Attacks against the WAP WTLS Protocols (1999),
  15. 15.
    Badra, M., et al.: A New Secure Session Exchange Key Protocol for Wireless Communication. In: IEEE PIMRC 2003 (2003)Google Scholar
  16. 16.
    Rahman, M.G., Imai, H.: Security in Wireless Communications. In: Wireless Personal Communications, No. 22. Kluwer Academic Publishers, Dordrecht (2002)Google Scholar
  17. 17.
    Daemen, J., Govaerts, R., Vandewalle, J.: Resynchronization Weaknesses in Synchronous Stream Ciphers. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 159–167. Springer, Heidelberg (1994)Google Scholar
  18. 18.
    Nichols, R.K., Lekks, P.C.: Wireless Security - Models, Threats, and Solutions. McGraw-Hill Telecom, New York (2002)Google Scholar
  19. 19.
    Amoroso, E.: Fundamentals of Computer Security Technology. Prentice-Hall, Englewood Cliffs (1993)Google Scholar
  20. 20.
    Armknecht, F., Lano, J., Preneel, B.: Extending the Resynchronization Attack. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 19–38. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Kihong Kim
    • 1
  • Jinkeun Hong
    • 2
  • Jongin Lim
    • 3
  1. 1.National Security Research InstituteDaejeonSouth Korea
  2. 2.Division of Information & Communication EngineeringBaekseok UniversityChungnamSouth Korea
  3. 3.Graduate School of Information Security / Center for Information Security TechnologiesKorea UniversitySeoulSouth Korea

Personalised recommendations