Computation-Communication Trade-off for Power and Bandwidth Savings in Remote Authentication over Wireless Networks

نویسندگان

  • Arnab Paul
  • Umakishore Ramachandran
چکیده

We consider the problem of remote authentication over a long range wireless network using large signature keys such as biometric samples (fingerprint, retinal scans etc.). Because of the large size of these keys, and continual need for authentication, considerable power and bandwidth is consumed by such processes. We show that by using the concept of a holographic proof, it is possible to significantly cut down the number of bytes transferred. While bandwidth savings is obvious, for long range wireless this means huge savings in power which is a critical resource for mobile devices. Our approach trades computaion for communication, the intuition being that power requirement for transmitting one byte over wireless is orders of magnitude higher than executing one instruction on a standard processor. Our simulations provide a detailed analysis of power savings under a reasonable energyconsumption model and indeed demonstrate the effectiveness of such approach.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Bandwidth-power Efficiency of Homogeneous Wireless Networks Using On-meet Threshold Strategy (RESEARCH NOTE)

Over two decades, a problem of location dependent has been focused for improving the communication Bandwidth-Power Efficiency of homogeneous networks. The efficiencies of communication links are weakened by the Hidden Terminal Problem.  Thus we propose a Fine – Tune Strategy for analyzing the On-Off communication region. We were observed that the proposed technique had been able to track and mo...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Trading Processor Cycles for Communication

“Trade computation for communication whenever possible” has been the conventional wisdom to save bandwidth and power in wireless domain. We glanced at the merging trends of technology and the applications, and identified a number of areas where the processor cycles can be traded for network bandwidth. These areas are file transfer, shared document edits, remote authentication, and verification ...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004