Optimizing the energy consumed by secure wireless sessions wireless transport layer security case study

Ramesh Karri, Piyush Mishra

Research output: Contribution to journalArticlepeer-review


In this paper we identified the various sources of energy consumption during the setup, operation and tear down of a secure wireless session by considering the wireless transport layer security protocol. Our analysis showed that data transfers during a secure wireless transaction, number and size of messages exchanged during secure session establishment and cryptographic computations used for data authentication and privacy during secure data transactions in that order are the main sources of energy consumption during a secure wireless session. We developed techniques based on information compression, session negotiation protocol optimization and hardware acceleration of crypto-mechanisms to reduce the energy consumed by a secure session. A mobile test bed was developed to verify our energy management schemes and to study the energy consumption versus security tradeoffs. Using our proposed schemes we were able to reduce the session establishment energy by more than 6.5x and the secure data transaction energy by more than 1.5x during data transmission and by more than 2.5x during data reception.

Original languageEnglish (US)
Pages (from-to)177-185
Number of pages9
JournalMobile Networks and Applications
Issue number2
StatePublished - Apr 2003


  • Energy-efficient
  • Mobile
  • Secure session
  • Security
  • WTLS
  • Wireless

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Hardware and Architecture
  • Computer Networks and Communications


Dive into the research topics of 'Optimizing the energy consumed by secure wireless sessions wireless transport layer security case study'. Together they form a unique fingerprint.

Cite this