• May 27, 2016 News!The submission for Special Issue is officially open now!   [Click]
  • May 03, 2016 News!Vol.6, No.6 has been indexed by EI (Inspec).   [Click]
  • Mar 17, 2017 News!Vol.9, No.2 has been published with online version. 13 peer reviewed articles from 4 specific areas are published in this issue.   [Click]
General Information
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2009 Vol.1(3): 293-301 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2009.V1.48

Evaluating the Effects of Cryptography Algorithms on Power Consumption for Wireless Devices

D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud

Abstract—the increasing of wireless systems provides malicious entities greater incentives to step up their efforts to gain unauthorized access to the information being exchanged over the wireless link. As the world becomes more dependent on wireless networks, it needs to improve the ways that protect them. Security is important for wireless networks, mainly because the communications signals are openly available as they propagate through the air. The security settings can be different in many factors, but the main factors are the choice of ciphers used to provide security functions, the key length, and the number of operational rounds, packet size, and data types. These factors also have a significant impact on the energy consumption for providing security. The design of energy efficient secure protocols for wireless devices needs to understand how encryption affects the consumption of battery power with and without data transmission. The major contributions of this paper are energy-security trades off then, some suggestions for design of secure communications systems. This paper illustrates the key concepts of security, wireless networks, and security over wireless networks. Wireless security is demonstrated by applying the common security standards like (802.11 WEP and 802.11i WPA, WPA2) and provides evaluation of six of the most common encryption algorithms on power consumption for wireless devices namely: AES (Rijndael), DES, 3DES, RC2, Blowfish, and RC6. Experimental results are given to demonstrate the effectiveness of each algorithm.

Index Terms—Encryption techniques, Computer security, wireless network, ad hoc wireless LANs, Basic Service Set (BBS)


Cite: D. S. Abdul. Elminaam, H. M. Abdul Kader and M. M. Hadhoud, "Evaluating the Effects of Cryptography Algorithms on power consumption for wireless Devices," International Journal of Computer Theory and Engineering vol. 1, no. 3, pp. 293-301, 2009.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com