Design, architecture and performance evaluation of the wireless transport layer security

被引:6
|
作者
Sklavos, N. [1 ]
Kitsos, P.
Papadopoulos, K.
Koufopavlou, O.
机构
[1] Univ Patras, Elect & Comp Engn Dept, Patras, Greece
[2] Siemens AE, Athens, Greece
[3] Univ Patras, Elect & Comp Engn Dept, Patras, Greece
来源
JOURNAL OF SUPERCOMPUTING | 2006年 / 36卷 / 01期
关键词
WTLS implementation; WAP security; wireless networks; wireless communications; security system;
D O I
10.1007/s11227-006-3549-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Communication protocols for wireless networks have specified security layers, with high-level encryption strength. The dedicated to security layer of Wireless Application Protocol (WAP), is the Wireless Transport Layer Security (WTLS). In this paper, an efficient architecture for the hardware implementation of WTLS is proposed. The introduced system supports bulk encryption, authentication and data integrity. The proposed architecture operates alternatively for a set of ciphers, IDEA, DES, RSA, D.H., SHA-1 and MD5. It is based on two reconfigurable design units: the Reconfigurable Authentication Unit and the Reconfigurable Integrity Unit. These units operate alternatively for different ciphers and achieve to allocate minimized resources, at the same time. The introduced security system has been implemented in an FPGA device. The supported ciphers performance is compared with previously published works, and it has been proven superior to them, in most of the cases. The system's synthesis results prove that the proposed architecture is a flexible and powerful solution for WTLS integration of today's and future wireless networks. The system can be applied to wireless communications servers and mobile devices also. Finally, the proposed architecture can be used as a powerful security engine, in WAP communication networks, with special security demands.
引用
收藏
页码:33 / 50
页数:18
相关论文
共 50 条
  • [1] Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security
    N. Sklavos
    P. Kitsos
    K. Papadopoulos
    O. Koufopavlou
    [J]. The Journal of Supercomputing, 2006, 36 : 33 - 50
  • [2] Redundant Bit Security in RFIDs: Architecture Design and Security Performance Evaluation
    Jeddi, Zahra
    Khattab, Ahmed
    Amini, Esmaeil
    Bayoumi, Madgy
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2017, 26 (09)
  • [3] Design and performance evaluation of meghadoot A hybrid wireless network architecture
    Ramana, B. Venkata
    Agrawal, Devesh
    Murthy, C. Siva Ram
    [J]. ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 605 - +
  • [4] Network layer security: Design for a cross layer architecture
    Ramachandran, S.
    Fairhurst, G.
    Luglio, M.
    Roseti, C.
    Provenzano, S.
    [J]. 2007 INTERNATIONAL WORKSHOP ON SATELLITE AND SPACE COMMUNICATIONS, IWSSC '07, CONFERENCE PROCEEDINGS, 2007, : 271 - +
  • [5] Performance evaluation of INDECT security architecture
    Machnik, Petr
    Niemiec, Marcin
    Uruena, Manuel
    Stoianov, Nikolai
    [J]. REVISTA ITECKNE, 2018, 15 (01): : 34 - 42
  • [6] Configurable link layer security architecture for Wireless Sensor Networks
    Jinwala, Devesh C.
    Patel, Dhiren R.
    Dasgupta, Kankar S.
    [J]. WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 776 - +
  • [7] An Architecture Design for Wireless Authentication Security in Bluetooth Network
    Mandal, Bijoy Kumar
    Bhattacharyya, Debnath
    Kim, Tai-Hoon
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 1 - 8
  • [8] Architecture Design and Security Evaluation of Secure Optical Transport Network Using Formal Verification
    Maeda, Shion
    Nakabayashi, Misato
    Okuda, Tetsuya
    [J]. 2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 1810 - 1815
  • [9] Architecture Design and Performance Evaluation for Future Green Small Cell Wireless Networks
    He, Gaoning
    Zhang, Shunqing
    Chen, Yan
    Xu, Shugong
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (IEEE ICC), 2013, : 1178 - 1182
  • [10] Wireless application protocol transport layer performance
    Kahraman, G
    Bilgen, S
    [J]. EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 2003, : 1141 - 1146