Analysis of the power consumption of secure communication in wireless networks

Kihong Kim*, Jinkeun Hong, Jongin Lim

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)

    Abstract

    With the growth of the Internet, communication and network security have been the focus of much attention. In addition, deployment of resource intensive security protocols in battery-powered mobile devices has raised power consumption to a significant design basis of network design. In this paper, we propose a power-efficient secure communication restart mechanism for a wireless network and analyze the power consumed while restarting a secure communication. An experimental test bed was developed to inspect the proposed mechanism and to evaluate it in terms of power consumption relative to that of conventional secure communication restart mechanisms. Using our enhanced mechanism, we were able to reduce the power consumed during a secure communication restart by up to 60% compared with conventional restart mechanisms.

    Original languageEnglish
    Title of host publicationDatabase and Expert Systems Applications - 17th International Conference, DEXA 2006, Proceedings
    PublisherSpringer Verlag
    Pages894-903
    Number of pages10
    ISBN (Print)3540378715, 9783540378716
    DOIs
    Publication statusPublished - 2006
    Event17th International Conference on Database and Expert Systems Applications, DEXA 2006 - Krakow, Poland
    Duration: 2006 Sept 42006 Sept 8

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume4080 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other17th International Conference on Database and Expert Systems Applications, DEXA 2006
    Country/TerritoryPoland
    CityKrakow
    Period06/9/406/9/8

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Analysis of the power consumption of secure communication in wireless networks'. Together they form a unique fingerprint.

    Cite this