2 RELATED WORK
Measuring and characterizing the current limits of
portable devices in terms of both communication ca-
pabilities and energy consumption, to mention just a
few aspects, are issues that have been gaining atten-
tion recently. This topic grows in importance when
secure wireless communications are demanded. Since
a lot of extra computation is required to guarantee
properties such as authentication, privacy, and in-
tegrity, the feasibility to run a variety of applications
is directly affected.
Potlapally, Ravi, Raghunathan, and Jha present in
(Potlapally et al., 2003) an analysis of the energy con-
sumed by mobile devices when using several com-
binations of security mechanisms in SSL-based ap-
plications. Various cryptography (RSA, DSA, and
ECDSA) and hashing (MD2, MD4, MD5, SHA,
SHA1, and HMAC) algorithms have been used in the
experiments.
Other work related to PDA energy consumption
was published by Karri and Mishra in (Karri and
Mishra, 2003). The authors measure the energy con-
sumed by the device (i) when secure WAP (Wireless
Application Protocol) sessions are established and (ii)
during secured data transfer. An additional contri-
bution of the paper is the proposal of techniques to
reduce energy consumption. By applying techniques
based on information compression, session negotia-
tion protocol optimization, and hardware acceleration
of crypto-mechanisms, the energy consumed for ses-
sion establishment has been reduced by more than 6.5
times, when compared to the normal power consump-
tion. Similarly, the energy for data transmission has
diminished more than 1.5 times.
The overhead introduced by WEP (Wireless Equiv-
alent Privacy) and IPSec protocols in IEEE 802.11b
wireless networks has been measured by Maciel et al.
in (Maciel et al., 2003). The data throughput achieved
by desktop computers (with wireless cards attached
to them) has been calculated under two different con-
figurations: employing (i) solely WEP and (ii) both
WEP and IPSec. This comparison is of little practi-
cal utility, however. WEP becomes unnecessary when
IPSec is used, because besides being vulnerable, the
first leads to an undesired additional overhead.
In this paper we measure the data reception rate and
the energy consumed by a Personal Digital Assistant
with and without the employment of IPSec protocol.
We identify the type of applications that can be ef-
ficiently executed by the portable device even when
security mechanisms are employed. We also charac-
terize how much these mechanisms impact the auton-
omy of the PDA.
3 A SECURE WIRELESS LOCAL
AREA NETWORK SETUP
There are several approaches that can be applied to
secure current IEEE 802.11b wireless networks with
no extra investments in hardware: IPSec (IP Secu-
rity) (Kent and Atkinson, 2004), CIPE (Crypto IP En-
capsulation) (cip, 2004), and VTUN (Virtual Tunnel)
(vtu, 2004) at the network-layer; SSL (Secure Socket
Layer) (Freier et al., 1996) at the transport-layer;
SET (Secure Electronic Transaction) (set, 2004), and
OpenVPN (ope, 2004) at the application layer.
CIPE, VTUN, and OpenVPN are not supported
by mobile device operating systems such as PalmOS
and PocketPC 2003. SSL and IPSec are by far the
most deployed schemes. The former is used to pro-
vide application-specific end-to-end encrypted trans-
fers. The latter, on the other hand, offers a general
purpose cryptographic tunnel capable of providing se-
cured communication to any application running on
the PDA. Due to this generality, we have chosen to
use IPSec in our experiments.
The setup is composed of a L2TP (Layer 2 Tun-
neling Protocol) (Townsley et al., 1999) and an IPSec
server (FreeS/WAN (fre, 2004)) running on the gate-
way (figure 1). L2TP/IPsec is one the mechanisms
that can be used by Pocket PC 2003 to acquire a
virtual IP address from the internal network. This
scheme has been chosen because (i) it is used by
Pocket PC 2003’s built-in VPN client (which is free!)
and (ii) it is an official IETF standard.
We have configured the IPSec server to run in tun-
nel mode, i.e. both the header and the payload of
packets sent/received by the PDA to/from the gateway
are encrypted. Although this is a very conservative
setup, it has been used so that worst case measure-
ments could be made.
The authentication process used was PSK (Pre-
shared Key). A Pre-shared Key is a secret pass-
word that is shared by both sides of the IPSec tun-
nel. Preferably, the PSK is distributed through “out-
of-band” medium, such as phone call, paper, face to
face, and should not be transmitted over public net-
works.
Figure 1: IPSec-based PDAs access to 802.11b wireless
LANs
ICETE 2005 - WIRELESS COMMUNICATION SYSTEMS AND NETWORKS
74