Worcester Polytechnic Institute Electronic Theses and Dissertations Collection

Title page for ETD etd-050505-094448


Document Typethesis
Author NameMcKay, Kerry A
URNetd-050505-094448
TitleTrade-offs Between Energy and Security in Wireless Networks
DegreeMS
DepartmentComputer Science
Advisors
  • Fernando C. Colon Osorio, Advisor
  • Emmanuel Agu, Reader
  • Keywords
  • energy
  • security
  • 802.11 security protocols
  • wireless networks
  • Date of Presentation/Defense2005-04-04
    Availability unrestricted

    Abstract

    As the popularity of wireless networks increases, so does the need to protect them. In recent years, many researchers have studied the limitations of the security mechanisms that protect wireless networks. There has also been much research in the power consumption introduced by the network card. Technologies such as CPU and memory are increasing and so is their need for power, but battery technology is increasing at a much slower rate, forming a “battery gap”. Because of this, battery capacity plays a major role in the usability of the devices. Although the effect of the network communication on a mobile device’s battery has been widely researched, there has been less research on the effect of the security profile on energy usage.

    In this thesis, we examine a method for analyzing trade-offs between energy and security proposed by Colon Osorio et al. This research describes a method to identify the most appropriate security profile for a given application, given battery constraints. The same method can also be used to discover the minimum battery capacity to maintain a minimum security profile for a predefined amount of time.

    Trade-offs and optimality are analyzed using a cost-energy function, CE, and security measure, SM. CE encompasses the energy required to use countermeasure M against a specific vulnerability, Vi, as well as the energy consumed in bulk transfer. SM is a numerical representation of the effectiveness of a set of security mechanisms which utilize the set of countermeasures to defend against a set of vulnerabilities. Using CE and SM, we can compare different security profiles using a trade-off model. Having defined such a framework, we investigate different instances and examples where the use of the model is helpful in accessing trade-offs between security obtained and energy consumed to achieve such security. This was first examined through an analytical study, followed by experimentation.

    The major contributions of this work are an energy-security trade-off model and its empirical validation. This work extends the empirical experimentation done by other researchers such as Potlapally et al., Karri et al., and Stemm and Katz on the relationship between energy and the security of wireless communications in battery-constrained devices.

    Files
  • KerryMcKay-thesis.pdf

  • Browse by Author | Browse by Department | Search all available ETDs

    [WPI] [Library] [Home] [Top]

    Questions? Email etd-questions@wpi.edu
    Maintained by webmaster@wpi.edu