Type Here to Get Search Results !

Performance and Power Consumption Analysis of Symmetric Encryption Algorithms in Wireless Devices

Chapter 1

 Introduction

 Over the past few years, Internet-enabled business, or e-business, has drastically improved companies’ efficiency and revenue growth. E-business applications such as e-commerce, supply-chain management, and remote access allow companies to streamline processes, lower operating costs, and increase customer satisfaction. Such applications require mission-critical networks that accommodate voice, video, and data traffic, and these networks must be scalable to support increasing numbers of users and the need for greater capacity and performance. However, as networks enable more and more applications and are available to more and more users, they become ever more vulnerable to a wider range of security threats. To combat those threats and ensure that e-business transactions and vital information are not compromised, security technology must play a major role in today's networks [1]. Both wired and wireless networks can claim advantages over the other; both represent viable options for home and other local area networks (LANs). In theory, wireless LANs are less secure than wired LANs, because wireless communication signals travel through the air and can easily be intercepted. The increasing importance of wireless systems provides malicious persons greater incentives to step up their efforts to gain unauthorized access to the information being exchanged over the wireless link [2]. The security risks in the wireless environment are particularly important because the wireless devices in the recent past have not been developed with security of the systems in mind [3]. Cryptography is the conversion of data into a secret code for transmission over a public network. The data is protected (confidentiality) before transmission using an encryption algorithm to keep the data secure from an eavesdropper. Encryption is also essential for other security services such as authentication, data integrity and access control. Due to the intensive computation inherent in encryption algorithms, they tend to consume a substantial amount of energy or battery power. [4]. Studies have shown that the growth of wireless networks is being restricted by their perceived insecurity. Security protocols implement mechanisms through which security services can be provided. • The IEEE 802.11 standard uses the WEP protocol for security .It operates at the Data Link layer. • IP Security (IPSec) provides security at the Network Layer by extending the IP packet header (using additional protocol numbers, not options). • Secure Socket Layer (SSL) provides security at the Transport Layer for secure transmissions on the Internet. All the above-mentioned protocols rely on encryption to provide the security services. Encryption in this sense can be said to be the backbone of security services. The three protocols mentioned above have been designed for wired systems. In wireless networks, a security protocol needs to also consider the limited battery power, small memory and limited processing capabilities of the devices and the available bandwidth. Investigation of the energy consumption of the encryption algorithms in wireless devices is therefore fundamental in the design of energy efficient security protocols customized to the wireless environment

Project detailsContents
 
Number of Pages59 pages
Chapter one Introduction
Chapter two Literature review
Chapter three  methodology
Chapter  four  Data analysis
Chapter  five Summary,discussion & recommendations
ReferenceReference
QuestionnaireQuestionnaire
AppendixAppendix
Chapter summary1 to 5 chapters
Available documentPDF and MS-word format


DOWNLOAD COMPLETE WORK 

All  listed topics on our website are available project materials in PDF and MS word files, well supervised and approved by lecturers who are intellectual in their various fields of discipline,  documented to assist you with complete, quality and well organized researched work.  if you can't find what you're looking for feel free to contact us.





Feel free to contact us chat with us on WhatsApp
Hello, How can I help you? ...
Click me to start the chat...