Signal-Flow-Based Analysis of Wireless Security Protocols

Security protocols operating over wireless channels can incur significant communication costs (e.g., energy, delay), especially under adversarial attacks unique to the wireless environment such as signal jamming, fake signal transmission, etc. Since wireless devices are resource constrained, it is important to optimize security protocols for wireless environments by taking into account their communication costs. Towards this paper, the authors first present a novel application of a signal-flow-based approach to analyze the communication costs of security protocols in the presence of adversaries.

Provided by: IBM Topic: Security Date Added: May 2012 Format: PDF

Find By Topic