Trade-offs Between Energy and Security in Wireless Networks


Downloadable Content

open in viewer

As the popularity of wireless networks increases, so does the need to protect them. In recent years, many researchers have studied the limitations of the security mechanisms that protect wireless networks. There has also been much research in the power consumption introduced by the network card. Technologies such as CPU and memory are increasing and so is their need for power, but battery technology is increasing at a much slower rate, forming a ""battery gap"". Because of this, battery capacity plays a major role in the usability of the devices. Although the effect of the network communication on a mobile device's battery has been widely researched, there has been less research on the effect of the security profile on energy usage. In this thesis, we examine a method for analyzing trade-offs between energy and security proposed by Colon Osorio et al. This research describes a method to identify the most appropriate security profile for a given application, given battery constraints. The same method can also be used to discover the minimum battery capacity to maintain a minimum security profile for a predefined amount of time. Trade-offs and optimality are analyzed using a cost-energy function, C<sup>E</sup>, and security measure, S<sub>M</sub>. C<sup>E</sup> encompasses the energy required to use countermeasure M against a specific vulnerability, V<sub>i</sub>, as well as the energy consumed in bulk transfer. S<sub>M</sub> is a numerical representation of the effectiveness of a set of security mechanisms which utilize the set of countermeasures to defend against a set of vulnerabilities. Using C<sup>E</sup> and S<sub>M</sub>, we can compare different security profiles using a trade-off model. Having defined such a framework, we investigate different instances and examples where the use of the model is helpful in accessing trade-offs between security obtained and energy consumed to achieve such security. This was first examined through an analytical study, followed by experimentation. The major contributions of this work are an energy-security trade-off model and its empirical validation. This work extends the empirical experimentation done by other researchers such as Potlapally et al., Karri et al., and Stemm and Katz on the relationship between energy and the security of wireless communications in battery-constrained devices.

  • English
  • etd-050505-094448
Defense date
  • 2005
Date created
  • 2005-05-05
Resource type
Rights statement


In Collection:



Permanent link to this page: