Abstract
Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation, (b) based on the profiled data, propose mathematical models to capture the relationships between power consumption and security, and (c) formulate and solve security maximization subject to power constraints. Numerical results are presented to illustrate the gains that can be achieved in using solutions of the proposed security maximization problems subject to power constraints.
| Original language | English |
|---|---|
| Pages (from-to) | 162-180 |
| Number of pages | 19 |
| Journal | ACM Transactions on Information and System Security |
| Volume | 9 |
| Issue number | 2 |
| DOIs | |
| State | Published - 2006 |
Keywords
- Low-power encryption
- Optimization
- Profiling
Fingerprint
Dive into the research topics of 'Battery power-aware encryption'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver