Font Size: a A A

Energy -efficient secure embedded system

Posted on:2005-07-15Degree:Ph.DType:Dissertation
University:Polytechnic UniversityCandidate:Mishra, PiyushFull Text:PDF
GTID:1458390008489932Subject:Electrical engineering
Abstract/Summary:
Anytime-anywhere access of information via a variety of embedded systems---PDAs, cell phones, sensors---is enabling a host of personalized mobile services that involve storage, access, manipulation, and communication of sensitive data within insecure environments. Confidential communications over public wireless networks demand end-to-end secure connections to ensure data authentication, privacy and integrity. In fact, absence of a clear boundary and other physical constraints places stringent security constraints in wireless networks as compared to the wired networks. Security protocols used to establish secure communication channels over insecure public networks are communication and computation intensive. Due to their limited resources, such as computing power, memory, and battery capacity, design of secure embedded systems to support these services poses several unique and interesting challenges. Traditionally security protocols for wired networks have focused on security, complexity, and throughput metrics only. Limited battery life of mobile clients in a wireless network has elevated energy consumption into an important design metric.;This work identifies various sources of energy consumption during a secure wireless session and investigates their energy consumption characteristics. Techniques based on information compression, hardware acceleration, and protocol adaptations are presented to optimize the energy consumed by security protocols and the benefits of these techniques are validated by using real-life mobile test beds. It is shown that these techniques are platform independent followed by a discussion on the impact of platform specific characteristics, such as available system resources, on the presented techniques. Guidelines are presented to design a comprehensive framework for integrating various energy, security, and performance models for efficient and cost-effective management of security policies.;Goal of this research work is to design affordable and intuitive wireless security protocols for efficient management of resources and security respectively.
Keywords/Search Tags:Energy, Embedded, Security protocols, Secure, Wireless
Related items