Energy cost analysis of IPSec on handheld devices

作者: Peifeng Ni , Zhiyuan Li

DOI: 10.1016/J.MICPRO.2004.08.010

关键词:

摘要: We analyze the computation overhead of IP security protocol (IPSec) on a handheld device. design experiments to quantify energy consumed by individual components in IPSec. then experiment with several measures which can potentially cut consumption without compromising security. Our results show that replacing 3DES Advanced Encryption Standard as encryption algorithm, total is reduced up 38%. On other hand, MD5 and SHA-1 consume about same amount for message authentication, makes more preferred because its known higher strength against birthday attacks. also find power-saving mode wireless LAN interface does not reduce (and may even increase) cost despite substantial network idle time. Finally, we data compression option must be used carefully. When sending from device, lossless IPSec actually increase until bandwidth drops down 2 Mbps or lower. However, found save when device receives compressible under normal bandwidths. This result suggests dynamically changed between transmission reception.

参考文章(15)
James Nechvatal, Public-Key Cryptography Special Publication (NIST SP) - 800-2. ,(1991) , 10.6028/NIST.SP.800-2
Mark Stemm, Randy H. Katz, Measuring and Reducing Energy Consumption of Network Interfaces in Hand-Held Devices IEICE Transactions on Communications. ,vol. 80, pp. 1125- 1131 ,(1997)
Swetha Narayanaswamy, Vikas Kawadia, Ramavarapu S Sreenivas, PRe Kumar, Power Control in Ad-Hoc Networks : Theory, Architecture Algorithm and Implementation of the COMPOW protocol European Wireless 2002, Feb. ,(2002)
R. Glenn, C. Madson, The Use of HMAC-MD5-96 within ESP and AH RFC. ,vol. 2403, pp. 1- 7 ,(1998)
R. Glenn, C. Madson, The Use of HMAC-SHA-1-96 within ESP and AH RFC. ,vol. 2404, pp. 1- 7 ,(1998)
R. Atkinson, S. Kent, IP Encapsulating Security Payload (ESP) RFC. ,vol. 1827, pp. 1- 12 ,(1995)
D. Harkins, D. Carrel, The Internet Key Exchange (IKE) RFC. ,vol. 2409, pp. 1- 41 ,(1998)
R. Oppliger, Security at the Internet layer IEEE Computer. ,vol. 31, pp. 43- 47 ,(1998) , 10.1109/2.708449
J. Flinn, M. Satyanarayanan, PowerScope: a tool for profiling the energy usage of mobile applications workshop on mobile computing systems and applications. pp. 2- 10 ,(1999) , 10.1109/MCSA.1999.749272