General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Mia Hu
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • E-mail: ijcte@iacsitp.com
    • Journal Metrics:

Editor-in-chief
Prof. Mehmet Sahinoglu
Computer Science Department, Troy University, USA
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.

IJCTE 2009 Vol.1(3): 293-301 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2009.V1.48

Evaluating the Effects of Cryptography Algorithms on Power Consumption for Wireless Devices

D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud

Abstract—the increasing of wireless systems provides malicious entities greater incentives to step up their efforts to gain unauthorized access to the information being exchanged over the wireless link. As the world becomes more dependent on wireless networks, it needs to improve the ways that protect them. Security is important for wireless networks, mainly because the communications signals are openly available as they propagate through the air. The security settings can be different in many factors, but the main factors are the choice of ciphers used to provide security functions, the key length, and the number of operational rounds, packet size, and data types. These factors also have a significant impact on the energy consumption for providing security. The design of energy efficient secure protocols for wireless devices needs to understand how encryption affects the consumption of battery power with and without data transmission. The major contributions of this paper are energy-security trades off then, some suggestions for design of secure communications systems. This paper illustrates the key concepts of security, wireless networks, and security over wireless networks. Wireless security is demonstrated by applying the common security standards like (802.11 WEP and 802.11i WPA, WPA2) and provides evaluation of six of the most common encryption algorithms on power consumption for wireless devices namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. Experimental results are given to demonstrate the effectiveness of each algorithm.

Index Terms—Encryption techniques, Computer security, wireless network, ad hoc wireless LANs, Basic Service Set (BBS)

[PDF]

Cite: D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud, "Evaluating the Effects of Cryptography Algorithms on power consumption for wireless Devices," International Journal of Computer Theory and Engineering vol. 1, no. 3, pp. 293-301, 2009.


Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.