Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/66
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Agrawal, Jayantilal G. | - |
dc.date.accessioned | 2007-07-06T04:48:48Z | - |
dc.date.available | 2007-07-06T04:48:48Z | - |
dc.date.issued | 2007-06-01 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/66 | - |
dc.description.abstract | As embedded devices are increasingly integrated into personal and commercial infrastructures, security becomes a paramount issue. The design of security for embedded systems differs from traditional security design because these systems are resource constrained in their capacities and easily accessible to adversaries at the physical layer. Implementing security in wireless embedded devices arises new challenges due to the unique characteristics of battery powered embedded systems. The work is focused on an important constraint of such devices - battery life and examines how it is impacted by the use of security protocols. Software power consumption minimization is becoming more important and a very relevant issue in the design of embedded systems, in particular those dedicated to mobile devices. This motivates the need for minimizing power consumption from the point of view of software rather than at circuit and gate level, which is cumbersome. This dissertation aims at reviewing state of the art of different cryptography protocol implementations and optimizations for reducing the power and energy consumption. It also restricts the size of lookup tables and imposes constraints on the code size where run-time memory and program ROM are scarce resources. The protocols are implemented in C language. Using the gcc compiler with Sim–Power Analyzer as the simulation kernel protocols have been evaluated on the ARM cores. Different coding methods have been identified aiming at reducing the power consumption for the ARM processors. The performance improvement of cryptography algorithms is demonstrated on different ARM processors such as Intel StrongARM -1110, ARM7 and ARM9TDMI, where Intel’s StrongARM-1110 found to be low energy processors i.e. it consumes low energy as compared to other processors. Also AES found to be the most energy efficient symmetric algorithm and RSA among the asymmetric implemented algorithms. So, AES in combination with RSA on the StrongARM-1110 processor can be the best choice for implementing security protocol. | en |
dc.language.iso | en_US | en |
dc.publisher | Institute of Technology | en |
dc.relation.ispartofseries | 05MCE001 | en |
dc.subject | Computer 2005 | en |
dc.subject | Project Report 2005 | en |
dc.subject | Computer Project Report | en |
dc.subject | Project Report | en |
dc.subject | 05MCE | en |
dc.subject | 05MCE001 | en |
dc.title | Implementing Security Protocols in Wireless Embedded System: A Power Performance Analysis | en |
dc.type | Dissertation | en |
Appears in Collections: | Dissertation, CE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
05MCE001.pdf | 05MCE001 | 3.83 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.