Security-throughput Tradeoff with Link Adaptive Encryption Scheme

نویسندگان

  • Poonam Jindal
  • Brahmjit Singh
چکیده

With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength also make them very sensitive to channel error as well. Therefore, security for data transmission over wireless channel results in throughput loss. Trade-off between security and throughput is always a major concern in wireless networks. In this paper, a Link Adaptive Encryption scheme is evaluated that adapts to channel variations and enhances the security level of WLANs without making any compromise with the network performance. Numerical results obtained through simulation are compared with the fixed block length encryption technique in two different modes of operationElectronic Code Book (ECB) & Cipher Block Chaining (CBC). Optimal block length is also computed, which is assumed to be the effective strength of the cipher. It has been observed that security attained with link adaptive scheme operating in ECB mode of cipher is a better solution for security and throughput trade-off. However, it is found that if computational security is a major concern, link adaptive scheme in CBC mode should be preferred.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Study And Performance Evaluation Of Security-Throughput Tradeoff With Link Adaptive Encryption Scheme

With the ever increasing volume of information over wireless medium, security has assumed an important dimension. The security of transmitted data over a wireless channel aims at protecting the data from unauthorized intrusion. Wireless network security is achieved using cryptographic primitives. Some properties that give encryption mechanism their cryptographic strength also make them very sen...

متن کامل

An Adaptive Approach to Optimizing Tradeoff Between Service Performance and Security in Service-Based Systems

The message-based communication among services in Service-based Systems (SBS) is vulnerable to various security attacks and must be well protected by security mechanisms, which may affect performance due to available system resources. In this paper, an adaptive approach is presented to optimize the tradeoff between service performance and security according to SBS users’ requirements and prefer...

متن کامل

Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts

Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either long ciphertexts with size linear in the number of authorized users or can only achieve non-adaptive security. A non-adaptive attacker is assumed to disclose her target attacking set of users even before the system para...

متن کامل

On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries

In this paper, we model the adversary (eavesdropper) present in the wireless communication medium using probabilistic models. We precisely formulate the security-throughput optimization and derive analytical solutions. The effect of different adversary models, and single and multi-rate modulation schemes (BPSK and MQAM) are studied. Simulation results are given to show that significant throughp...

متن کامل

Security in WLAN- Review of Security and Throughput Tradeoff

An IEEE 802.11 WLAN is a group of wireless nodes located within a moderate physical area. It provides intensified productivity, less cost of installation and mobility. The open to air nature of wireless channel that give us great convenience of mobility also make it vulnerable to attack. Various security issues are described in paper. The tradeoff between security and throughput is main focus i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012