A variation of the WTLS authentication protocol for reducing energy consumption in wireless devices

被引:0
|
作者
Prasithsangaree, P [1 ]
Krishnamurthy, P [1 ]
机构
[1] Univ Pittsburgh, Telecommun Program, Dept Informat Sci & Telecommun, Pittsburgh, PA 15232 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Energy efficiency has been an important factor in protocol design in wireless networks where small handheld wireless devices rely solely on battery power. Security is also of great concern in wireless networks. Several security protocols adapted from wired networks have been used in wireless networks to provide identity authentication. Security protocols could contribute significantly to energy consumption, especially authentication protocols such as Wireless Transport Layer Security (WTLS) or Transport Layer Security (TLS) Handshake protocol that are based on computationally intensive public key cryptography. There have been many efforts trying to reduce cryptographic load and energy consumption at wireless devices. Some are complicated and others may not comply with existing WTLS/TLS standards. In this paper, we propose a simple variant of TLS Handshake protocol for mutual authentication and key exchange, which reduces energy consumption in wireless devices. The proposed protocol uses RSA and ECC algorithms differently to make the Handshake protocol more energy efficient. With our proposed protocol, we can save about 25% compared to 1024-bit RSA or 70% compared to 163-bit ECC Handshake protocol. Our proposed protocol can also be easily integrated into the standard WTLS protocol with small modification.
引用
收藏
页码:696 / 706
页数:11
相关论文
共 50 条
  • [41] BLEmesh: A Wireless Mesh Network Protocol for Bluetooth Low Energy Devices
    Kim, Hyun-soo
    Lee, JungYub
    Jang, Ju Wook
    2015 3RD INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD) AND INTERNATIONAL CONFERENCE ON OPEN AND BIG (OBD), 2015, : 558 - 563
  • [42] Energy-efficient routing protocol to improve energy consumption in wireless sensors networks
    ELkamel, Rabiaa
    Cherif, Adnane
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (17)
  • [43] An end-to-end authentication protocol in wireless application protocol
    Yang, JP
    Shin, W
    Rhee, KH
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 247 - 259
  • [44] Reducing energy consumption
    Schon, Samuel C.
    GEOTIMES, 2008, 53 (02): : 5 - 5
  • [45] Advanced Authentication and Energy-Efficient Routing Protocol for Wireless Body Area Networks
    Bakkaiahgari, Padma Vijetha Dev
    Prasad, K. Venkata
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2024, 33 (13)
  • [46] Weaknesses of North American wireless authentication protocol
    Patel, S
    IEEE PERSONAL COMMUNICATIONS, 1997, 4 (03): : 40 - 44
  • [47] A lightweight identity authentication protocol for wireless networks
    Badra, M
    Serhrouchni, A
    Urien, P
    COMPUTER COMMUNICATIONS, 2004, 27 (17) : 1738 - 1745
  • [48] An Efficient Authentication Protocol for Wireless Mesh Networks
    Zhai, Peng
    He, Jingsha
    Zhu, Nafei
    He, Peng
    Liang, Yao
    JOURNAL OF WEB ENGINEERING, 2020, 19 (7-8): : 1193 - 1212
  • [49] Secure password authentication protocol in wireless networks
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2006, : 149 - +
  • [50] A novel authentication protocol for wireless access security
    Wan C.
    Hu A.
    Zhang J.
    Journal of Convergence Information Technology, 2010, 5 (08) : 22