URI | http://purl.tuc.gr/dl/dias/35ED36AB-A4B3-4C51-8CA5-599F38F82850 | - |
Αναγνωριστικό | https://doi.org/10.1109/CCNC.2009.4784732 | - |
Γλώσσα | en | - |
Τίτλος | On the Power Consumption of security algorithms employed in wireless networks | en |
Δημιουργός | Papaefstathiou Ioannis | en |
Δημιουργός | Παπαευσταθιου Ιωαννης | el |
Δημιουργός | Meintanis D. | en |
Εκδότης | Institute of Electrical and Electronics Engineers | en |
Περίληψη | Supporting high levels of security in wireless networks is a challenging issue because of the specific problems this environment poses; the provided security by small mobile systems, such as PDAs and mobile phones, is often restricted by their limited battery power and their limited processing power. Driven by these restrictions, the designer will have to decide whether to implement the wireless network security schemes in software or to add special purpose hardware units to the system, executing those CPU intensive tasks. This paper demonstrates and compares the Hardware and Software implementations of a number of widely used security applications employed in wireless networks. We measured the total energy consumption for each security algorithm when implemented in reconfigurable hardware devices and we compared it with the total energy consumption of the equivalent software applications. We demonstrate, that the hardware implementations on a state-of-the-art FPGA are significantly faster while they consume three orders of magnitude less power when compared with the software implementations executed on a state-of-the-art hard-core CPU which is embedded in the same FPGA device. | en |
Τύπος | Πλήρης Δημοσίευση σε Συνέδριο | el |
Τύπος | Conference Full Paper | en |
Άδεια Χρήσης | http://creativecommons.org/licenses/by/4.0/ | en |
Ημερομηνία | 2015-11-16 | - |
Ημερομηνία Δημοσίευσης | 2009 | - |
Βιβλιογραφική Αναφορά | I. Papaefstathiou, D. Meintanis, "On the Power Consumption of Security Algorithms Employed in Wireless Networks," in 6th IEEE Consumer Communications and Networking Conference, 2009, pp. 1 - 5. doi: 10.1109/CCNC.2009.4784732 | en |