URI | http://purl.tuc.gr/dl/dias/35ED36AB-A4B3-4C51-8CA5-599F38F82850 | - |
Identifier | https://doi.org/10.1109/CCNC.2009.4784732 | - |
Language | en | - |
Title | On the Power Consumption of security algorithms employed in wireless networks | en |
Creator | Papaefstathiou Ioannis | en |
Creator | Παπαευσταθιου Ιωαννης | el |
Creator | Meintanis D. | en |
Publisher | Institute of Electrical and Electronics Engineers | en |
Content Summary | Supporting high levels of security in wireless networks is a challenging issue because of the specific problems this environment poses; the provided security by small mobile systems, such as PDAs and mobile phones, is often restricted by their limited battery power and their limited processing power. Driven by these restrictions, the designer will have to decide whether to implement the wireless network security schemes in software or to add special purpose hardware units to the system, executing those CPU intensive tasks. This paper demonstrates and compares the Hardware and Software implementations of a number of widely used security applications employed in wireless networks. We measured the total energy consumption for each security algorithm when implemented in reconfigurable hardware devices and we compared it with the total energy consumption of the equivalent software applications. We demonstrate, that the hardware implementations on a state-of-the-art FPGA are significantly faster while they consume three orders of magnitude less power when compared with the software implementations executed on a state-of-the-art hard-core CPU which is embedded in the same FPGA device. | en |
Type of Item | Πλήρης Δημοσίευση σε Συνέδριο | el |
Type of Item | Conference Full Paper | en |
License | http://creativecommons.org/licenses/by/4.0/ | en |
Date of Item | 2015-11-16 | - |
Date of Publication | 2009 | - |
Bibliographic Citation | I. Papaefstathiou, D. Meintanis, "On the Power Consumption of Security Algorithms Employed in Wireless Networks," in 6th IEEE Consumer Communications and Networking Conference, 2009, pp. 1 - 5. doi: 10.1109/CCNC.2009.4784732 | en |