Advertisement

Using Hardware Acceleration to Improve the Security of Wi-Fi Client Devices

  • Jed Kao-Tung ChangEmail author
  • Chen Liu
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 274)

Abstract

As mobile devices prevail, communications security has become a critical and popular topic in recent years. For example, when a mobile device accesses Wi-Fi, the data communicated with the Wi-Fi access point may be encrypted to provide extra security. However, on a mobile device with limited energy budget, data encryption/ decryption often imposes high pressure on the battery life. In this paper, we review how a recently introduced Extremely Heterogeneous Architecture (EHA) can potentially be used to improve performance and energy efficiency of data encryption/decryption on mobile devices.

Keywords

Wi-Fi Extremely Heterogeneous Architecture (EHA) cryptography hardware acceleration performance analysis hotspot function 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Tang, J., Liu, S., Gu, Z., Liu, C., Gaudiot, J.-L.: Acceleration of XML Parsing Through Prefetching. IEEE Transactions on Computers (in press)Google Scholar
  2. 2.
    Tang, J., Thanarungroj, P., Liu, C., Liu, S., Gu, Z., Gaudiot, J.-L.: Pinned OS/Services: A Case Study of XML Parsing on Intel SCC. Journal of Computer Science and Technology (in press)Google Scholar
  3. 3.
    Tang, J., Liu, S., Gu, Z., Li, X.-F., Gaudiot, J.-L.: Achieving middleware execution efficiency: Hardware-assisted Garbage Collection Operations. Journal of Supercomputing 59(3), 1101–1119 (2012)CrossRefGoogle Scholar
  4. 4.
    Tang, J., Liu, S., Gu, Z., Liu, C., Gaudiot, J.-L.: Prefetching in Mobile Embedded System Can be Energy Efficient. IEEE Computer Architecture Letters 10(1), 8–11 (2011)CrossRefGoogle Scholar
  5. 5.
    Tang, J., Liu, S., Gu, Z., Li, X.-F., Gaudiot, J.-L.: Hardware-Assisted Middleware: Acceleration of Garbage Collection Operations. In: Proceedings of the 21st IEEE International Conference on Application-Specific Systems Architectures and Processors (ASAP 2010), Rennes, France, pp. 281–284 (2010)Google Scholar
  6. 6.
    Tang, J., Liu, S., Gu, Z., Liu, C., Gaudiot, J.-L.: Memory-Side Acceleration for XML Parsing. In: Altman, E., Shi, W. (eds.) NPC 2011. LNCS, vol. 6985, pp. 277–292. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  7. 7.
    Liu, S., Tang, J., Wang, L., Li, X.-F., Gaudiot, J.-L.: Packer: Parallel Garbage Collection Based on Virtual Spaces. IEEE Transactions on Computers (October 2011), doi:10.1109/TC.2011.193Google Scholar
  8. 8.
    Liu, S., Tang, J., Deng, C., Li, X.-F., Gaudiot, J.-L.: RHE: A JVM Courseware. IEEE Transactions on Education 54(1), 141–148 (2011)CrossRefGoogle Scholar
  9. 9.
    Tang, J.: Research on Performance Acceleration and Energy Efficiency for EHA Multicore Processor. Ph.D. Thesis, Beijing Institute of Technology, China (2012)Google Scholar
  10. 10.
    Liu, S., Gaudiot, J.-L.: Potential Impact of Value Prediction on Communication in Many-Core Architectures. IEEE Transactions on Computers (June 2009)Google Scholar
  11. 11.
    Liu, S., Wang, L., Li, X.-F., Gaudiot, J.-L.: Space-and-Time Efficient Parallel Garbage Collector for Data-Intensive Applications. International Journal of Parallel Programming (October 2010)Google Scholar
  12. 12.
    Liu, S., Eisenbeis, C., Gaudiot, J.-L.: Value Prediction and Speculative Execution on GPU. International Journal of Parallel Programming (December 2010)Google Scholar
  13. 13.
    Liu, S., Pittman, R.N., Forin, A., Gaudiot, J.-L.: Minimizing the Run-time Partial Reconfiguration Overheads in Reconfigurable Systems. Journal of Supercomputing (in press)Google Scholar
  14. 14.
    Liu, S., Pittman, R.N., Forin, A., Gaudiot, J.-L.: Achieving Energy Efficiency through Run-Time Partial Reconfiguration on Reconfigurable Systems. ACM Transactions on Embedded Computing Systems (in press)Google Scholar
  15. 15.
    Liu, S., Ro, W.W., Liu, C., Salas, A.C., Cérin, C., Gaudiot, J.-L.: EHA: The Extremely Heterogeneous Architecture. In: Proceedings of the 2012 International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN 2012), San Marcos, Texas, December 13-15 (2012)Google Scholar
  16. 16.
    Shi, Z., Beard, C., Mitchell, K.: Tunable Traffic Control for Multihop CSMA Networks. In: IEEE Military Communications Conference, MILCOM 2008, pp. 1–7 (November 2008)Google Scholar
  17. 17.
    Chaparro-Baquero, G., Zhou, Q., Liu, C., Tang, J., Liu, S.: Power-Efficient Schemes Via Workload Characterization on the Intel’s Single-chip Cloud Computer. In: Proceedings of the Eighth Workshop on High-Performance, Power-Aware Computing (HPPAC 2012), in conjunction with IPDPS 2012, Shanghai, China (May 12, 2012)Google Scholar
  18. 18.
    Chang, J.K.-T., Liu, C., Liu, S., Gaudiot, J.-L.: Workload Characterization of Cryptography Algorithms for Hardware Acceleration. In: Proceedings of the 2nd ACM/SPEC International Conference on Performance Engineering (ICPE 2011), Karlsruhe, Germany, March 14-16 (2011)Google Scholar
  19. 19.
    Liu, C., Duarte, R., Granados, O., Tang, J., Liu, S., Andrian, J.: Critical Path Based Hardware Acceleration for Cryptosystems. International Journal of Advancements in Computing Technology (IJACT) 4(1), 438–452 (2012)CrossRefGoogle Scholar
  20. 20.
    Duarte, R., Granados, O., Liu, C., Andrian, J.: Case Study on a Software Communications Architecture Component for Hardware Acceleration. In: Proceedings of the 4th International Conference on Ubi-media Computing (U-Media 2011), Sao Paulo, Brazil, July 3-4 (2011)Google Scholar
  21. 21.
  22. 22.
    Lashkari, A.H., Danesh, M.M.S., Samadi, B.: A survey on wireless security protocols (WEP, WPA and WPA2/802.11 i). In: 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2009. IEEE (2009)Google Scholar
  23. 23.
    Bielecki, W., Burak, D.: Parallelization Method of Encryption Algorithms. In: Advances in Information Processing and Protection, pp. 191–204 (2008)Google Scholar
  24. 24.
    Beletskyy, V., Burak, D.: Parallelization of the IDEA algorithm. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2004. LNCS, vol. 3036, pp. 635–638. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  25. 25.

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.Department of Electrical and Computer EngineeringClarkson UniversityPotsdamUSA

Personalised recommendations