To read this content please select one of the options below:

DRKH: A Power Efficient Encryption Protocol for Wireless Devices

Ahmad M. Kholaif (Department of Electrical and Computer Engineering McMaster University, Hamilton, Ontario, Canada)
Magda B. Fayek (Department of Computer Engineering Cairo University, Giza, Egypt)
Hussein S. Eissa (National Research Centre, Giza, Egypt)
Hoda A. Baraka (Faculty of Engineering Cairo University, Giza, Egypt)

International Journal of Pervasive Computing and Communications

ISSN: 1742-7371

Article publication date: 31 December 2006

246

Abstract

In this paper, we present Dynamic Re‐keying with Key Hopping (DRKH) encryption protocol that uses RC4 encryption technique to ensure a strong security level with the advantage of low execution cost compared to other IEEE 802.11 security schemes. Low computational complexity makes DRKH suitable for solar‐ and battery‐powered handheld devices such as nodes in Solar ESS (Extended Service Set) and wireless sensor networks. Our design goal is to eventually integrate DRKH with different emerging wireless technologies. However, in this paper, we will focus on the integration of DRKH with 802.11 standard since it is the most widely deployed wireless technology. The results and analysis show that DRKH overcomes all the security threats with Wired Equivalent Privacy (WEP) protocol while consuming a much lower power than WEP, Wi‐Fi Protected Access (WPA) 1.0 and WPA 2.0.

Keywords

Citation

Kholaif, A.M., Fayek, M.B., Eissa, H.S. and Baraka, H.A. (2006), "DRKH: A Power Efficient Encryption Protocol for Wireless Devices", International Journal of Pervasive Computing and Communications, Vol. 2 No. 4, pp. 321-331. https://doi.org/10.1108/17427370780000162

Publisher

:

Emerald Group Publishing Limited

Copyright © 2006, Emerald Group Publishing Limited

Related articles