In:
ACM Transactions on Information and System Security, Association for Computing Machinery (ACM), Vol. 9, No. 2 ( 2006-05), p. 162-180
Kurzfassung:
Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation, (b) based on the profiled data, propose mathematical models to capture the relationships between power consumption and security, and (c) formulate and solve security maximization subject to power constraints. Numerical results are presented to illustrate the gains that can be achieved in using solutions of the proposed security maximization problems subject to power constraints.
Materialart:
Online-Ressource
ISSN:
1094-9224
,
1557-7406
DOI:
10.1145/1151414.1151417
Sprache:
Englisch
Verlag:
Association for Computing Machinery (ACM)
Publikationsdatum:
2006
ZDB Id:
2006415-9
Permalink