General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Mia Hu
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • E-mail:
    • Journal Metrics:

Prof. Mehmet Sahinoglu
Computer Science Department, Troy University, USA
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.

IJCTE 2009 Vol.1(4): 334-342 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2009.V1.53

Analyzing the Energy Consumption of Security Algorithms for Wireless LANs

Diaa Salama Abdul. Elminaam, Hatem M. Abdul Kader, and Mohie M. Hadhoud

Abstract—Security in wireless networks is of paramount importance. Due to the broadcast nature of the wireless radio signals, wireless networks are implicitly vulnerable to several network attacks. Anyone within the wireless transmission range of a device (including malicious users or attackers) is able to passively listen to or eavesdrop on the signals and could potentially access information from the signals. It is also possible to actively transmit signals that can attack the network. Encryption algorithms play good roles in information security systems (ISS). Those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. Wireless devices are powered by a battery which is a very limited resource. It implicitly says that the power of computing will grow exponentially. However, the capacity of batteries is growing linearly, and this introduces a “power gap” which is the difference between the power required by computing and the battery capacity. Thus, battery power tends to be a very seriously limited resource for small wireless devices, and a security protocol should utilize energy to the minimum extent possible. This aspect is the primary focus of this dissertation. This paper illustrates the key concepts of security, wireless networks, and security over wireless networks. It provides evaluation of six of the most common encryption algorithms on power consumption for wireless devices A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as different sizes of data blocks, different data types, battery power consumption

Index Terms—Computer security, wireless network, ad hoc wireless LANs, Basic Service Set (BBS), Cryptographic algorithms


Cite: Diaa Salama Abdul. Elminaam, Hatem M. Abdul Kader and Mohie M. Hadhoud, "Analyzing the Energy Consumption of Security Algorithms for Wireless LANs," International Journal of Computer Theory and Engineering vol. 1, no. 4, pp. 334-342, 2009.

Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.