TY - JOUR
T1 - Battery power-aware encryption
AU - Chandramouli, R.
AU - Bapatla, S.
AU - Subbalakshmi, K. P.
AU - Uma, R. N.
PY - 2006
Y1 - 2006
N2 - Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation, (b) based on the profiled data, propose mathematical models to capture the relationships between power consumption and security, and (c) formulate and solve security maximization subject to power constraints. Numerical results are presented to illustrate the gains that can be achieved in using solutions of the proposed security maximization problems subject to power constraints.
AB - Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation, (b) based on the profiled data, propose mathematical models to capture the relationships between power consumption and security, and (c) formulate and solve security maximization subject to power constraints. Numerical results are presented to illustrate the gains that can be achieved in using solutions of the proposed security maximization problems subject to power constraints.
KW - Low-power encryption
KW - Optimization
KW - Profiling
UR - http://www.scopus.com/inward/record.url?scp=33748300805&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33748300805&partnerID=8YFLogxK
U2 - 10.1145/1151414.1151417
DO - 10.1145/1151414.1151417
M3 - Review article
AN - SCOPUS:33748300805
SN - 1094-9224
VL - 9
SP - 162
EP - 180
JO - ACM Transactions on Information and System Security
JF - ACM Transactions on Information and System Security
IS - 2
ER -