Loading…

Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks

Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on dependable and secure computing 2007-10, Vol.4 (4), p.313-324
Main Authors: Haleem, M.A., Mathur, C.N., Chandramouli, R., Subbalakshmi, K.P.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843
cites cdi_FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843
container_end_page 324
container_issue 4
container_start_page 313
container_title IEEE transactions on dependable and secure computing
container_volume 4
creator Haleem, M.A.
Mathur, C.N.
Chandramouli, R.
Subbalakshmi, K.P.
description Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security.1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation (single and multirate), 4) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches.
doi_str_mv 10.1109/TDSC.2007.70214
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TDSC_2007_70214</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4358705</ieee_id><sourcerecordid>34525686</sourcerecordid><originalsourceid>FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843</originalsourceid><addsrcrecordid>eNp90T1PwzAQBuAIgcTnzMBiMcCU9pzYsc1WlU-pokOLkFisxL5QQ5sEOxHqvyeliIGB6W543pNObxSdUhhQCmo4v56NBwmAGAhIKNuJDqhiNAagcrffOeMxV4LuR4chvAEkTCp2EL1Mm6b2bVe50DpDbirj103r6uqKjMjc5xbjaVmSAttPxIrM0HTetWuSV5bMF77uXhdN1xJXkWfncYkhkMfe1v49HEd7Zb4MePIzj6Kn25v5-D6eTO8exqNJbBgVbVwkNCspSlOgMhYso6UyRgqRQlEYK6yQNrHAmZKgCpVKadMiA8MgF8xIlh5Fl9u7ja8_OgytXrlgcLnMK6y7oKXKaCYV5b28-FemjCc8k1kPz__At7rzVf-FTiDjVIBUPRpukfF1CB5L3Xi3yv1aU9CbSvSmEr2pRH9X0ifOtgmHiL-apVwK4OkXT02HfA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>206517089</pqid></control><display><type>article</type><title>Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks</title><source>ABI/INFORM global</source><source>IEEE Electronic Library (IEL) Journals</source><creator>Haleem, M.A. ; Mathur, C.N. ; Chandramouli, R. ; Subbalakshmi, K.P.</creator><creatorcontrib>Haleem, M.A. ; Mathur, C.N. ; Chandramouli, R. ; Subbalakshmi, K.P.</creatorcontrib><description>Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security.1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation (single and multirate), 4) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2007.70214</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Algorithms ; and protection ; Codes ; Communication system security ; Cost/performance ; Cryptography ; Data encryption ; Digital Object Identifier ; Dynamic programming ; Emerging technologies ; Encryption ; Error correction ; Error correction codes ; Errors ; Fading ; integrity ; Mathematical model ; Mathematical models ; Modulation coding ; Network security ; Networks ; Optimization ; Propagation ; Security ; Security and Privacy Protection ; Signal to noise ratio ; Simulation ; Studies ; Throughput ; Tradeoffs ; Wireless communication ; Wireless networks ; Wireless sensor networks ; Wireless systems</subject><ispartof>IEEE transactions on dependable and secure computing, 2007-10, Vol.4 (4), p.313-324</ispartof><rights>Copyright IEEE Computer Society Oct-Dec 2007</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843</citedby><cites>FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/206517089?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,11668,27903,27904,36039,36040,44342,54774</link.rule.ids></links><search><creatorcontrib>Haleem, M.A.</creatorcontrib><creatorcontrib>Mathur, C.N.</creatorcontrib><creatorcontrib>Chandramouli, R.</creatorcontrib><creatorcontrib>Subbalakshmi, K.P.</creatorcontrib><title>Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security.1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation (single and multirate), 4) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches.</description><subject>Algorithms</subject><subject>and protection</subject><subject>Codes</subject><subject>Communication system security</subject><subject>Cost/performance</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Digital Object Identifier</subject><subject>Dynamic programming</subject><subject>Emerging technologies</subject><subject>Encryption</subject><subject>Error correction</subject><subject>Error correction codes</subject><subject>Errors</subject><subject>Fading</subject><subject>integrity</subject><subject>Mathematical model</subject><subject>Mathematical models</subject><subject>Modulation coding</subject><subject>Network security</subject><subject>Networks</subject><subject>Optimization</subject><subject>Propagation</subject><subject>Security</subject><subject>Security and Privacy Protection</subject><subject>Signal to noise ratio</subject><subject>Simulation</subject><subject>Studies</subject><subject>Throughput</subject><subject>Tradeoffs</subject><subject>Wireless communication</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><subject>Wireless systems</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2007</creationdate><recordtype>article</recordtype><sourceid>M0C</sourceid><recordid>eNp90T1PwzAQBuAIgcTnzMBiMcCU9pzYsc1WlU-pokOLkFisxL5QQ5sEOxHqvyeliIGB6W543pNObxSdUhhQCmo4v56NBwmAGAhIKNuJDqhiNAagcrffOeMxV4LuR4chvAEkTCp2EL1Mm6b2bVe50DpDbirj103r6uqKjMjc5xbjaVmSAttPxIrM0HTetWuSV5bMF77uXhdN1xJXkWfncYkhkMfe1v49HEd7Zb4MePIzj6Kn25v5-D6eTO8exqNJbBgVbVwkNCspSlOgMhYso6UyRgqRQlEYK6yQNrHAmZKgCpVKadMiA8MgF8xIlh5Fl9u7ja8_OgytXrlgcLnMK6y7oKXKaCYV5b28-FemjCc8k1kPz__At7rzVf-FTiDjVIBUPRpukfF1CB5L3Xi3yv1aU9CbSvSmEr2pRH9X0ifOtgmHiL-apVwK4OkXT02HfA</recordid><startdate>20071001</startdate><enddate>20071001</enddate><creator>Haleem, M.A.</creator><creator>Mathur, C.N.</creator><creator>Chandramouli, R.</creator><creator>Subbalakshmi, K.P.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L6V</scope><scope>M0C</scope><scope>M0N</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope><scope>PYYUZ</scope><scope>Q9U</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20071001</creationdate><title>Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks</title><author>Haleem, M.A. ; Mathur, C.N. ; Chandramouli, R. ; Subbalakshmi, K.P.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2007</creationdate><topic>Algorithms</topic><topic>and protection</topic><topic>Codes</topic><topic>Communication system security</topic><topic>Cost/performance</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Digital Object Identifier</topic><topic>Dynamic programming</topic><topic>Emerging technologies</topic><topic>Encryption</topic><topic>Error correction</topic><topic>Error correction codes</topic><topic>Errors</topic><topic>Fading</topic><topic>integrity</topic><topic>Mathematical model</topic><topic>Mathematical models</topic><topic>Modulation coding</topic><topic>Network security</topic><topic>Networks</topic><topic>Optimization</topic><topic>Propagation</topic><topic>Security</topic><topic>Security and Privacy Protection</topic><topic>Signal to noise ratio</topic><topic>Simulation</topic><topic>Studies</topic><topic>Throughput</topic><topic>Tradeoffs</topic><topic>Wireless communication</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><topic>Wireless systems</topic><toplevel>online_resources</toplevel><creatorcontrib>Haleem, M.A.</creatorcontrib><creatorcontrib>Mathur, C.N.</creatorcontrib><creatorcontrib>Chandramouli, R.</creatorcontrib><creatorcontrib>Subbalakshmi, K.P.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>ProQuest Engineering Collection</collection><collection>ABI/INFORM global</collection><collection>Computing Database</collection><collection>ProQuest Engineering Database</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>One Business (ProQuest)</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection><collection>ABI/INFORM Collection China</collection><collection>ProQuest Central Basic</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Haleem, M.A.</au><au>Mathur, C.N.</au><au>Chandramouli, R.</au><au>Subbalakshmi, K.P.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2007-10-01</date><risdate>2007</risdate><volume>4</volume><issue>4</issue><spage>313</spage><epage>324</epage><pages>313-324</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security.1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation (single and multirate), 4) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2007.70214</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1545-5971
ispartof IEEE transactions on dependable and secure computing, 2007-10, Vol.4 (4), p.313-324
issn 1545-5971
1941-0018
language eng
recordid cdi_crossref_primary_10_1109_TDSC_2007_70214
source ABI/INFORM global; IEEE Electronic Library (IEL) Journals
subjects Algorithms
and protection
Codes
Communication system security
Cost/performance
Cryptography
Data encryption
Digital Object Identifier
Dynamic programming
Emerging technologies
Encryption
Error correction
Error correction codes
Errors
Fading
integrity
Mathematical model
Mathematical models
Modulation coding
Network security
Networks
Optimization
Propagation
Security
Security and Privacy Protection
Signal to noise ratio
Simulation
Studies
Throughput
Tradeoffs
Wireless communication
Wireless networks
Wireless sensor networks
Wireless systems
title Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T02%3A04%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Opportunistic%20Encryption:%20A%20Trade-Off%20between%20Security%20and%20Throughput%20in%20Wireless%20Networks&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Haleem,%20M.A.&rft.date=2007-10-01&rft.volume=4&rft.issue=4&rft.spage=313&rft.epage=324&rft.pages=313-324&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2007.70214&rft_dat=%3Cproquest_cross%3E34525686%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=206517089&rft_id=info:pmid/&rft_ieee_id=4358705&rfr_iscdi=true