• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
  • Jun 14, 2017 News!Vol.9, No.3 has been published with online version. 15 peer reviewed articles from 8 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2009 Vol.1(4): 334-342 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2009.V1.53

Analyzing the Energy Consumption of Security Algorithms for Wireless LANs

Diaa Salama Abdul. Elminaam, Hatem M. Abdul Kader, and Mohie M. Hadhoud
Abstract—Security in wireless networks is of paramount importance. Due to the broadcast nature of the wireless radio signals, wireless networks are implicitly vulnerable to several network attacks. Anyone within the wireless transmission range of a device (including malicious users or attackers) is able to passively listen to or eavesdrop on the signals and could potentially access information from the signals. It is also possible to actively transmit signals that can attack the network. Encryption algorithms play good roles in information security systems (ISS). Those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. Wireless devices are powered by a battery which is a very limited resource. It implicitly says that the power of computing will grow exponentially. However, the capacity of batteries is growing linearly, and this introduces a “power gap” which is the difference between the power required by computing and the battery capacity. Thus, battery power tends to be a very seriously limited resource for small wireless devices, and a security protocol should utilize energy to the minimum extent possible. This aspect is the primary focus of this dissertation. This paper illustrates the key concepts of security, wireless networks, and security over wireless networks. It provides evaluation of six of the most common encryption algorithms on power consumption for wireless devices A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption

Index Terms—Computer security, wireless network, ad hoc wireless LANs, Basic Service Set (BBS), Cryptographic algorithms

[PDF]

Cite: Diaa Salama Abdul. Elminaam, Hatem M. Abdul Kader and Mohie M. Hadhoud, "Analyzing the Energy Consumption of Security Algorithms for Wireless LANs," International Journal of Computer Theory and Engineering vol. 1, no. 4, pp. 334-342, 2009.
Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com