首页> 外文OA文献 >Differentiating IEEE 802.11i resource and security requirement for mobile and non-mobile devices
【2h】

Differentiating IEEE 802.11i resource and security requirement for mobile and non-mobile devices

机译:区分移动设备和非移动设备的IEEE 802.11i资源和安全要求

摘要

AES-CCMP128 incorporates two sophisticated cryptographic techniques that are counter mode and CBC-MAC, and adapts them to Ethernet frames. This is to provide a robust security protocol between the mobile clients and furthermore the mobility characteristic of mobile devices makes it difficult for an eavesdropper to spot data patterns. However adding security functionality to mobile devices can reduce the Wi-Fi time connection rate due to the limited resources of mobile devices. Therefore, the lack of balance between the security level, resource usage and network speed required in mobile devices is eminent. The aim of this study is to speed up the Wi-Fi connection in mobile devices and also to optimize the resource usage by reducing two rounds of AES-CCMP resulting in 20% increase in network connection speed and optimization in the resource usage of mobile devices. Round 8 and Round 9 of AES-CCMP are the suggested results named “Short Time” (ST) and “Long Time” (LT) usage of mobile devices for less than two hours and more than two hours respectively. On the other hand, non-mobile devices do not have the same restrictions instead higher CPU, memory, battery charge and hardware. But on the other hand, the stationary characteristic makes non-mobile device an easy target to attack. Therefore, the security level they require is higher in comparison to that of mobile devices but the resource usage is yet to be optimized. Consequently, the possibility of AES-256 in 9 rounds has been investigated in this study for non-mobile devices considering Moore’s law and as such, 10% optimization has been achieved in the resource usage. The proposed scenarios of ST and LT are implemented by using C# language and the results are gained from execution time, memory usage, avalanche effect and crypt analysis for non-mobile and mobile devices
机译:AES-CCMP128结合了两种复杂的加密技术,即计数器模式和CBC-MAC,并使它们适应以太网帧。这是为了在移动客户端之间提供可靠的安全协议,此外,移动设备的移动性特征使窃听者很难发现数据模式。但是,由于移动设备的资源有限,向移动设备添加安全功能可能会降低Wi-Fi时间连接速率。因此,在移动设备所需的安全级别,资源使用和网络速度之间缺乏平衡的情况很明显。这项研究的目的是通过减少两轮AES-CCMP来加快移动设备中的Wi-Fi连接并优化资源使用,从而使网络连接速度提高20%,并优化移动设备的资源使用。 AES-CCMP的第8轮和第9轮是建议的结果,分别表示移动设备使用时间少于两个小时和超过两个小时的“短时间”(ST)和“长时间”(LT)。另一方面,非移动设备没有相同的限制,而是具有更高的CPU,内存,电池电量和硬件。但另一方面,静态特性使非移动设备容易成为攻击目标。因此,与移动设备相比,它们要求的安全级别更高,但是资源使用情况尚待优化。因此,在这项研究中,考虑了摩尔定律,针对非移动设备研究了9轮AES-256的可能性,因此,在资源使用方面实现了10%的优化。所提出的ST和LT方案是使用C#语言实现的,其结果是从执行时间,内存使用率,雪崩效应和非移动和移动设备的加密分析中获得的

著录项

  • 作者

    Naraei Parisa;

  • 作者单位
  • 年度 2013
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号