Loading…
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks
Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher...
Saved in:
Published in: | IEEE transactions on dependable and secure computing 2007-10, Vol.4 (4), p.313-324 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843 |
---|---|
cites | cdi_FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843 |
container_end_page | 324 |
container_issue | 4 |
container_start_page | 313 |
container_title | IEEE transactions on dependable and secure computing |
container_volume | 4 |
creator | Haleem, M.A. Mathur, C.N. Chandramouli, R. Subbalakshmi, K.P. |
description | Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security.1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation (single and multirate), 4) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches. |
doi_str_mv | 10.1109/TDSC.2007.70214 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TDSC_2007_70214</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4358705</ieee_id><sourcerecordid>34525686</sourcerecordid><originalsourceid>FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843</originalsourceid><addsrcrecordid>eNp90T1PwzAQBuAIgcTnzMBiMcCU9pzYsc1WlU-pokOLkFisxL5QQ5sEOxHqvyeliIGB6W543pNObxSdUhhQCmo4v56NBwmAGAhIKNuJDqhiNAagcrffOeMxV4LuR4chvAEkTCp2EL1Mm6b2bVe50DpDbirj103r6uqKjMjc5xbjaVmSAttPxIrM0HTetWuSV5bMF77uXhdN1xJXkWfncYkhkMfe1v49HEd7Zb4MePIzj6Kn25v5-D6eTO8exqNJbBgVbVwkNCspSlOgMhYso6UyRgqRQlEYK6yQNrHAmZKgCpVKadMiA8MgF8xIlh5Fl9u7ja8_OgytXrlgcLnMK6y7oKXKaCYV5b28-FemjCc8k1kPz__At7rzVf-FTiDjVIBUPRpukfF1CB5L3Xi3yv1aU9CbSvSmEr2pRH9X0ifOtgmHiL-apVwK4OkXT02HfA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>206517089</pqid></control><display><type>article</type><title>Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks</title><source>ABI/INFORM global</source><source>IEEE Electronic Library (IEL) Journals</source><creator>Haleem, M.A. ; Mathur, C.N. ; Chandramouli, R. ; Subbalakshmi, K.P.</creator><creatorcontrib>Haleem, M.A. ; Mathur, C.N. ; Chandramouli, R. ; Subbalakshmi, K.P.</creatorcontrib><description>Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security.1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation (single and multirate), 4) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2007.70214</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Algorithms ; and protection ; Codes ; Communication system security ; Cost/performance ; Cryptography ; Data encryption ; Digital Object Identifier ; Dynamic programming ; Emerging technologies ; Encryption ; Error correction ; Error correction codes ; Errors ; Fading ; integrity ; Mathematical model ; Mathematical models ; Modulation coding ; Network security ; Networks ; Optimization ; Propagation ; Security ; Security and Privacy Protection ; Signal to noise ratio ; Simulation ; Studies ; Throughput ; Tradeoffs ; Wireless communication ; Wireless networks ; Wireless sensor networks ; Wireless systems</subject><ispartof>IEEE transactions on dependable and secure computing, 2007-10, Vol.4 (4), p.313-324</ispartof><rights>Copyright IEEE Computer Society Oct-Dec 2007</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843</citedby><cites>FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/206517089?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,11668,27903,27904,36039,36040,44342,54774</link.rule.ids></links><search><creatorcontrib>Haleem, M.A.</creatorcontrib><creatorcontrib>Mathur, C.N.</creatorcontrib><creatorcontrib>Chandramouli, R.</creatorcontrib><creatorcontrib>Subbalakshmi, K.P.</creatorcontrib><title>Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security.1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation (single and multirate), 4) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches.</description><subject>Algorithms</subject><subject>and protection</subject><subject>Codes</subject><subject>Communication system security</subject><subject>Cost/performance</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Digital Object Identifier</subject><subject>Dynamic programming</subject><subject>Emerging technologies</subject><subject>Encryption</subject><subject>Error correction</subject><subject>Error correction codes</subject><subject>Errors</subject><subject>Fading</subject><subject>integrity</subject><subject>Mathematical model</subject><subject>Mathematical models</subject><subject>Modulation coding</subject><subject>Network security</subject><subject>Networks</subject><subject>Optimization</subject><subject>Propagation</subject><subject>Security</subject><subject>Security and Privacy Protection</subject><subject>Signal to noise ratio</subject><subject>Simulation</subject><subject>Studies</subject><subject>Throughput</subject><subject>Tradeoffs</subject><subject>Wireless communication</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><subject>Wireless systems</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp90T1PwzAQBuAIgcTnzMBiMcCU9pzYsc1WlU-pokOLkFisxL5QQ5sEOxHqvyeliIGB6W543pNObxSdUhhQCmo4v56NBwmAGAhIKNuJDqhiNAagcrffOeMxV4LuR4chvAEkTCp2EL1Mm6b2bVe50DpDbirj103r6uqKjMjc5xbjaVmSAttPxIrM0HTetWuSV5bMF77uXhdN1xJXkWfncYkhkMfe1v49HEd7Zb4MePIzj6Kn25v5-D6eTO8exqNJbBgVbVwkNCspSlOgMhYso6UyRgqRQlEYK6yQNrHAmZKgCpVKadMiA8MgF8xIlh5Fl9u7ja8_OgytXrlgcLnMK6y7oKXKaCYV5b28-FemjCc8k1kPz__At7rzVf-FTiDjVIBUPRpukfF1CB5L3Xi3yv1aU9CbSvSmEr2pRH9X0ifOtgmHiL-apVwK4OkXT02HfA</recordid><startdate>20071001</startdate><enddate>20071001</enddate><creator>Haleem, M.A.</creator><creator>Mathur, C.N.</creator><creator>Chandramouli, R.</creator><creator>Subbalakshmi, K.P.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>PYYUZ</scope><scope>Q9U</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20071001</creationdate><title>Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks</title><author>Haleem, M.A. ; Mathur, C.N. ; Chandramouli, R. ; Subbalakshmi, K.P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Algorithms</topic><topic>and protection</topic><topic>Codes</topic><topic>Communication system security</topic><topic>Cost/performance</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Digital Object Identifier</topic><topic>Dynamic programming</topic><topic>Emerging technologies</topic><topic>Encryption</topic><topic>Error correction</topic><topic>Error correction codes</topic><topic>Errors</topic><topic>Fading</topic><topic>integrity</topic><topic>Mathematical model</topic><topic>Mathematical models</topic><topic>Modulation coding</topic><topic>Network security</topic><topic>Networks</topic><topic>Optimization</topic><topic>Propagation</topic><topic>Security</topic><topic>Security and Privacy Protection</topic><topic>Signal to noise ratio</topic><topic>Simulation</topic><topic>Studies</topic><topic>Throughput</topic><topic>Tradeoffs</topic><topic>Wireless communication</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><topic>Wireless systems</topic><toplevel>online_resources</toplevel><creatorcontrib>Haleem, M.A.</creatorcontrib><creatorcontrib>Mathur, C.N.</creatorcontrib><creatorcontrib>Chandramouli, R.</creatorcontrib><creatorcontrib>Subbalakshmi, K.P.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM global</collection><collection>Computing Database</collection><collection>ProQuest Engineering Database</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>ABI/INFORM Collection China</collection><collection>ProQuest Central Basic</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Haleem, M.A.</au><au>Mathur, C.N.</au><au>Chandramouli, R.</au><au>Subbalakshmi, K.P.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2007-10-01</date><risdate>2007</risdate><volume>4</volume><issue>4</issue><spage>313</spage><epage>324</epage><pages>313-324</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security.1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation (single and multirate), 4) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2007.70214</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1545-5971 |
ispartof | IEEE transactions on dependable and secure computing, 2007-10, Vol.4 (4), p.313-324 |
issn | 1545-5971 1941-0018 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TDSC_2007_70214 |
source | ABI/INFORM global; IEEE Electronic Library (IEL) Journals |
subjects | Algorithms and protection Codes Communication system security Cost/performance Cryptography Data encryption Digital Object Identifier Dynamic programming Emerging technologies Encryption Error correction Error correction codes Errors Fading integrity Mathematical model Mathematical models Modulation coding Network security Networks Optimization Propagation Security Security and Privacy Protection Signal to noise ratio Simulation Studies Throughput Tradeoffs Wireless communication Wireless networks Wireless sensor networks Wireless systems |
title | Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T02%3A04%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Opportunistic%20Encryption:%20A%20Trade-Off%20between%20Security%20and%20Throughput%20in%20Wireless%20Networks&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Haleem,%20M.A.&rft.date=2007-10-01&rft.volume=4&rft.issue=4&rft.spage=313&rft.epage=324&rft.pages=313-324&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2007.70214&rft_dat=%3Cproquest_cross%3E34525686%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=206517089&rft_id=info:pmid/&rft_ieee_id=4358705&rfr_iscdi=true |