Differentiating IEE 802.11i resource and security requirement for mobile and non-mobile devices

AES-CCMP128 incorporates two sophisticated cryptographic techniques that are counter mode and CBC-MAC, and adapts them to Ethernet frames. This is to provide a robust security protocol between the mobile clients and furthermore the mobility characteristic of mobile devices makes it difficult for an...

全面介紹

Saved in:
書目詳細資料
主要作者: Naraei, Parisa
格式: Thesis
語言:English
出版: 2013
主題:
在線閱讀:http://eprints.utm.my/id/eprint/36762/1/ParisaNaraeiMFSKS2013.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
id my-utm-ep.36762
record_format uketd_dc
spelling my-utm-ep.367622017-09-20T03:33:13Z Differentiating IEE 802.11i resource and security requirement for mobile and non-mobile devices 2013 Naraei, Parisa QA75 Electronic computers. Computer science AES-CCMP128 incorporates two sophisticated cryptographic techniques that are counter mode and CBC-MAC, and adapts them to Ethernet frames. This is to provide a robust security protocol between the mobile clients and furthermore the mobility characteristic of mobile devices makes it difficult for an eavesdropper to spot data patterns. However adding security functionality to mobile devices can reduce the Wi-Fi time connection rate due to the limited resources of mobile devices. Therefore, the lack of balance between the security level, resource usage and network speed required in mobile devices is eminent. The aim of this study is to speed up the Wi-Fi connection in mobile devices and also to optimize the resource usage by reducing two rounds of AES-CCMP resulting in 20% increase in network connection speed and optimization in the resource usage of mobile devices. Round 8 and Round 9 of AES-CCMP are the suggested results named “Short Time” (ST) and “Long Time” (LT) usage of mobile devices for less than two hours and more than two hours respectively. On the other hand, non-mobile devices do not have the same restrictions instead higher CPU, memory, battery charge and hardware. But on the other hand, the stationary characteristic makes non-mobile device an easy target to attack. Therefore, the security level they require is higher in comparison to that of mobile devices but the resource usage is yet to be optimized. Consequently, the possibility of AES-256 in 9 rounds has been investigated in this study for non-mobile devices considering Moore’s law and as such, 10% optimization has been achieved in the resource usage. The proposed scenarios of ST and LT are implemented by using C# language and the results are gained from execution time, memory usage, avalanche effect and crypt analysis for non-mobile and mobile devices. 2013 Thesis http://eprints.utm.my/id/eprint/36762/ http://eprints.utm.my/id/eprint/36762/1/ParisaNaraeiMFSKS2013.pdf application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:70080?site_name=Restricted Repository masters Universiti Teknologi Malaysia, Faculty of Computing Faculty of Computing
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic QA75 Electronic computers
Computer science
spellingShingle QA75 Electronic computers
Computer science
Naraei, Parisa
Differentiating IEE 802.11i resource and security requirement for mobile and non-mobile devices
description AES-CCMP128 incorporates two sophisticated cryptographic techniques that are counter mode and CBC-MAC, and adapts them to Ethernet frames. This is to provide a robust security protocol between the mobile clients and furthermore the mobility characteristic of mobile devices makes it difficult for an eavesdropper to spot data patterns. However adding security functionality to mobile devices can reduce the Wi-Fi time connection rate due to the limited resources of mobile devices. Therefore, the lack of balance between the security level, resource usage and network speed required in mobile devices is eminent. The aim of this study is to speed up the Wi-Fi connection in mobile devices and also to optimize the resource usage by reducing two rounds of AES-CCMP resulting in 20% increase in network connection speed and optimization in the resource usage of mobile devices. Round 8 and Round 9 of AES-CCMP are the suggested results named “Short Time” (ST) and “Long Time” (LT) usage of mobile devices for less than two hours and more than two hours respectively. On the other hand, non-mobile devices do not have the same restrictions instead higher CPU, memory, battery charge and hardware. But on the other hand, the stationary characteristic makes non-mobile device an easy target to attack. Therefore, the security level they require is higher in comparison to that of mobile devices but the resource usage is yet to be optimized. Consequently, the possibility of AES-256 in 9 rounds has been investigated in this study for non-mobile devices considering Moore’s law and as such, 10% optimization has been achieved in the resource usage. The proposed scenarios of ST and LT are implemented by using C# language and the results are gained from execution time, memory usage, avalanche effect and crypt analysis for non-mobile and mobile devices.
format Thesis
qualification_level Master's degree
author Naraei, Parisa
author_facet Naraei, Parisa
author_sort Naraei, Parisa
title Differentiating IEE 802.11i resource and security requirement for mobile and non-mobile devices
title_short Differentiating IEE 802.11i resource and security requirement for mobile and non-mobile devices
title_full Differentiating IEE 802.11i resource and security requirement for mobile and non-mobile devices
title_fullStr Differentiating IEE 802.11i resource and security requirement for mobile and non-mobile devices
title_full_unstemmed Differentiating IEE 802.11i resource and security requirement for mobile and non-mobile devices
title_sort differentiating iee 802.11i resource and security requirement for mobile and non-mobile devices
granting_institution Universiti Teknologi Malaysia, Faculty of Computing
granting_department Faculty of Computing
publishDate 2013
url http://eprints.utm.my/id/eprint/36762/1/ParisaNaraeiMFSKS2013.pdf
_version_ 1747816455355760640