Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks

Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:IEEE transactions on dependable and secure computing Ročník 4; číslo 4; s. 313 - 324
Hlavní autori: Haleem, M.A., Mathur, C.N., Chandramouli, R., Subbalakshmi, K.P.
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Washington IEEE 01.10.2007
IEEE Computer Society
Predmet:
ISSN:1545-5971, 1941-0018
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security.1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation (single and multirate), 4) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches.
AbstractList Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security.1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation (single and multirate), 4) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches.
Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors and fading. For example, we note that properties such as the avalanche effect that make a block cipher secure also cause them to be sensitive to bit errors. Therefore, there is a fundamental trade-off between security and throughput in encryption based wireless security. Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we proposed a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches this paper presents the following: (a) mathematical models to capture the secuity-throughput trade-off; (b) adversary models and their effects; (c) joint encryption and modulation (single and multi-rate) optimization; (d) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors; and (e) simulation results for Rijndael cipher. We observe that opportunistic encryption produces signficant improvement in the performance compared to traditional approaches. [PUBLICATION ABSTRACT]
Author Subbalakshmi, K.P.
Chandramouli, R.
Mathur, C.N.
Haleem, M.A.
Author_xml – sequence: 1
  givenname: M.A.
  surname: Haleem
  fullname: Haleem, M.A.
  organization: Stevens Inst. of Technol., Hoboken
– sequence: 2
  givenname: C.N.
  surname: Mathur
  fullname: Mathur, C.N.
  organization: Stevens Inst. of Technol., Hoboken
– sequence: 3
  givenname: R.
  surname: Chandramouli
  fullname: Chandramouli, R.
  organization: Stevens Inst. of Technol., Hoboken
– sequence: 4
  givenname: K.P.
  surname: Subbalakshmi
  fullname: Subbalakshmi, K.P.
  organization: Stevens Inst. of Technol., Hoboken
BookMark eNp9kT1vFDEQhi0UJPJVU9BYFFDtZbxrr2266AgQKeKKXIREY-3as8RhYy-2V-j-PXscokiRaqZ4nhnNvCfkKMSAhLxmsGIM9MX24-16VQPIlYSa8RfkmGnOKgCmjpZecFEJLdkrcpLzA0DNlebH5PtmmmIqc_C5eEuvgk27qfgYPtBLuk2dw2ozDLTH8hsx0Fu0c_JlR7vg6PY-xfnH_TQX6gP95hOOmDP9urAx_cxn5OXQjRnP_9VTcvfparv-Ut1sPl-vL28qy5ksVV-zdmCobI_aOnCcDdpaJWUDfW-ddFK52oHgWoHudaOUa_oWLIdOcqt4c0reH-ZOKf6aMRfz6LPFcewCxjkbpVvWKs3EQr57lmy4qEWr2gV8-wR8iHMKyxWmhlYwCUov0MUBsinmnHAwU_KPXdoZBmYfidlHYvaRmL-RLIZ4Ylhfuv23S-r8-Iz35uB5RPy_hTdCSRDNH5yZmn0
CODEN ITDSCM
CitedBy_id crossref_primary_10_1109_TWC_2016_2615605
crossref_primary_10_1109_TCOMM_2020_3024825
crossref_primary_10_1109_ACCESS_2020_2966596
crossref_primary_10_1109_JIOT_2021_3139222
crossref_primary_10_1109_JIOT_2020_2982417
crossref_primary_10_1109_COMST_2022_3191697
crossref_primary_10_1016_j_phycom_2017_08_002
crossref_primary_10_1016_j_comnet_2021_108031
crossref_primary_10_1016_j_proeng_2012_01_929
crossref_primary_10_1016_j_trc_2025_105352
crossref_primary_10_1109_ACCESS_2020_3017557
crossref_primary_10_1007_s10922_016_9384_x
crossref_primary_10_1007_s11276_014_0856_1
crossref_primary_10_1007_s11042_018_6015_4
crossref_primary_10_1109_TCOMM_2015_2474860
crossref_primary_10_1109_TII_2012_2209662
crossref_primary_10_1155_2012_720791
crossref_primary_10_1007_s10723_025_09797_3
crossref_primary_10_1016_j_adhoc_2013_07_006
crossref_primary_10_1109_TIE_2011_2178216
crossref_primary_10_1109_LWC_2017_2759113
crossref_primary_10_1007_s40747_022_00899_z
crossref_primary_10_1109_TMC_2024_3489619
crossref_primary_10_1109_TAES_2021_3134988
crossref_primary_10_1109_TVT_2019_2899647
crossref_primary_10_1109_TIFS_2013_2248724
crossref_primary_10_1002_sec_1003
crossref_primary_10_1109_TCOMM_2022_3169813
crossref_primary_10_1007_s11277_013_1105_0
crossref_primary_10_1109_TWC_2023_3265458
Cites_doi 10.1109/25.350282
10.1109/26.891214
10.1002/9781119183471
10.1109/ACSSC.2004.1399231
10.1109/26.634685
10.1109/JSAC.1987.1146536
10.1002/9780470317037
10.1109/MMCS.1999.778609
10.1109/18.641562
10.1109/TBC.2002.804034
10.1109/ICC.2004.1313264
10.1007/3-540-45508-6_13
10.1109/9780470545287
10.1017/CBO9780511804441
10.1109/GLOCOM.2005.1577932
10.1109/ACSSC.2003.1292104
10.1109/25.293655
10.1109/TC.1979.1675242
ContentType Journal Article
Copyright Copyright IEEE Computer Society Oct-Dec 2007
Copyright_xml – notice: Copyright IEEE Computer Society Oct-Dec 2007
DBID 97E
RIA
RIE
AAYXX
CITATION
3V.
7WY
7WZ
7XB
87Z
8AL
8FE
8FG
8FK
8FL
ABJCF
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
HCIFZ
JQ2
K60
K6~
K7-
L.-
L6V
M0C
M0N
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
PYYUZ
Q9U
7SC
7SP
8FD
F28
FR3
L7M
L~C
L~D
DOI 10.1109/TDSC.2007.70214
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE/IET Electronic Library
CrossRef
ProQuest Central (Corporate)
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Computing Database (Alumni Edition)
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni)
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials - QC
ProQuest Central
Business Premium Collection
ProQuest Technology Collection
ProQuest One Community College
ProQuest Central
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
ProQuest Engineering Collection
ABI/INFORM Global
Computing Database
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
Proquest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Business (UW System Shared)
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
ABI/INFORM Collection China
ProQuest Central Basic
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
ABI/INFORM Global (Corporate)
ProQuest Business Collection (Alumni Edition)
ProQuest One Business
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ABI/INFORM Complete
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
ABI/INFORM Complete (Alumni Edition)
Engineering Collection
Advanced Technologies & Aerospace Collection
Business Premium Collection
ABI/INFORM Global
ProQuest Computing
Engineering Database
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ABI/INFORM China
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Business Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
ProQuest One Business (Alumni)
ProQuest One Academic
ProQuest Central (Alumni)
ProQuest One Academic (New)
Business Premium Collection (Alumni)
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
ANTE: Abstracts in New Technology & Engineering
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

ABI/INFORM Global (Corporate)
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
– sequence: 2
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1941-0018
EndPage 324
ExternalDocumentID 1375612171
10_1109_TDSC_2007_70214
4358705
Genre orig-research
Feature
GroupedDBID .4S
.DC
0R~
29I
4.4
5GY
5VS
6IK
7WY
8FE
8FG
8FL
8R4
8R5
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJCF
ABQJQ
ABUWG
ABVLG
ACGFO
ACIWK
AENEX
AETIX
AFKRA
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
ATWAV
AZQEC
BEFXN
BENPR
BEZIV
BFFAM
BGLVJ
BGNUA
BKEBE
BPEOZ
BPHCQ
CCPQU
CS3
DU5
DWQXO
EBS
EDO
EJD
FRNLG
GNUQQ
HCIFZ
HZ~
IEDLZ
IFIPE
IPLJI
ITG
ITH
JAVBF
K60
K6V
K6~
K7-
L6V
LAI
M0C
M43
M7S
O9-
OCL
P2P
P62
PHGZM
PHGZT
PQBIZ
PQBZA
PQGLB
PQQKQ
PROAC
PTHSS
PUEGO
Q2X
RIA
RIE
RNI
RNS
RZB
AAYXX
AFFHD
CITATION
3V.
7XB
8AL
8FK
JQ2
L.-
M0N
PKEHL
PQEST
PQUKI
PRINS
Q9U
7SC
7SP
8FD
F28
FR3
L7M
L~C
L~D
ID FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843
IEDL.DBID RIE
ISICitedReferencesCount 55
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000250530900006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1545-5971
IngestDate Sun Nov 09 09:48:53 EST 2025
Thu Oct 02 04:58:07 EDT 2025
Mon Nov 10 02:51:28 EST 2025
Sat Nov 29 08:09:00 EST 2025
Tue Nov 18 21:35:26 EST 2025
Wed Aug 27 02:55:59 EDT 2025
IsPeerReviewed false
IsScholarly true
Issue 4
Keywords Security and Privacy Protection
and protection
Emerging technologies
Wireless systems
Security
Optimization
Wireless communication
integrity
Algorithms
Data encryption
Simulation
Dynamic programming
Cost/performance
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
PQID 206517089
PQPubID 23500
PageCount 12
ParticipantIDs crossref_primary_10_1109_TDSC_2007_70214
proquest_journals_206517089
proquest_miscellaneous_34525686
crossref_citationtrail_10_1109_TDSC_2007_70214
proquest_miscellaneous_896168915
ieee_primary_4358705
PublicationCentury 2000
PublicationDate 2007-10-01
PublicationDateYYYYMMDD 2007-10-01
PublicationDate_xml – month: 10
  year: 2007
  text: 2007-10-01
  day: 01
PublicationDecade 2000
PublicationPlace Washington
PublicationPlace_xml – name: Washington
PublicationTitle IEEE transactions on dependable and secure computing
PublicationTitleAbbrev TDSC
PublicationYear 2007
Publisher IEEE
IEEE Computer Society
Publisher_xml – name: IEEE
– name: IEEE Computer Society
References ref13
ref11
Sklar (ref2) 1988
ref1
Bertsekas (ref10) 1995
ref18
(ref12) 2001
Stintson (ref19) 2005
ref24
ref26
ref25
Daemen (ref16) 2006
ref22
Reason (ref17) 2000
Cormen (ref23) 2003
ref28
ref27
Stallings (ref15) 2003
ref29
ref8
ref7
Trappe (ref14) 2002
ref9
ref4
ref3
ref6
ref5
Cover (ref20) 1991
Lin (ref21) 2004
References_xml – ident: ref7
  doi: 10.1109/25.350282
– volume-title: Error Control Coding
  year: 2004
  ident: ref21
– ident: ref8
  doi: 10.1109/26.891214
– volume-title: Introduction to Algorithms
  year: 2003
  ident: ref23
– volume-title: AES Proposal: Rijndael
  year: 2006
  ident: ref16
– ident: ref11
  doi: 10.1002/9781119183471
– ident: ref28
  doi: 10.1109/ACSSC.2004.1399231
– ident: ref5
  doi: 10.1109/26.634685
– ident: ref18
  doi: 10.1109/JSAC.1987.1146536
– ident: ref9
  doi: 10.1002/9780470317037
– ident: ref29
  doi: 10.1109/MMCS.1999.778609
– ident: ref4
  doi: 10.1109/18.641562
– start-page: 27
  volume-title: Cryptography and Network Security
  year: 2003
  ident: ref15
– ident: ref26
  doi: 10.1109/TBC.2002.804034
– ident: ref24
  doi: 10.1109/ICC.2004.1313264
– ident: ref1
  doi: 10.1007/3-540-45508-6_13
– ident: ref3
  doi: 10.1109/9780470545287
– ident: ref6
  doi: 10.1017/CBO9780511804441
– ident: ref25
  doi: 10.1109/GLOCOM.2005.1577932
– ident: ref27
  doi: 10.1109/ACSSC.2003.1292104
– volume-title: Dynamic Programming and Optimal Control
  year: 1995
  ident: ref10
– volume-title: Federal Information Processing Standards Publication 197
  year: 2001
  ident: ref12
– volume-title: Digital Communications: Fundamentals and Applications
  year: 1988
  ident: ref2
– volume-title: Introduction to Cryptography: With Coding Theory
  year: 2002
  ident: ref14
– year: 2000
  ident: ref17
  article-title: End-to-End Confidentiality for Continuous-Media Applications in Wireless Systems
– volume-title: Elements of Information Theory
  year: 1991
  ident: ref20
– volume-title: Cryptography Theory and Practice
  year: 2005
  ident: ref19
– ident: ref22
  doi: 10.1109/25.293655
– ident: ref13
  doi: 10.1109/TC.1979.1675242
SSID ssj0024894
Score 2.052083
Snippet Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 313
SubjectTerms Algorithms
and protection
Codes
Communication system security
Cost/performance
Cryptography
Data encryption
Digital Object Identifier
Dynamic programming
Emerging technologies
Encryption
Error correction
Error correction codes
Errors
Fading
integrity
Mathematical model
Mathematical models
Modulation coding
Network security
Networks
Optimization
Propagation
Security
Security and Privacy Protection
Signal to noise ratio
Simulation
Studies
Throughput
Tradeoffs
Wireless communication
Wireless networks
Wireless sensor networks
Wireless systems
SummonAdditionalLinks – databaseName: Computer Science Database
  dbid: K7-
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT9xADLZ4HbiUUkCk9DGHHnqZkslrPL1UiIIqUS2V2FaolyjziLQSyi6bBYl_3_FkdlFVwaXnOA_F9md7bPkD-CDopLExlvvg7HjhTME1moZLJ61sFWobOrq_vsvRCK-v1Y84m9PHscolJgagtlNDZ-S-SK9KIVNUX2a3nEijqLkaGTTWYVNkmSAzv5D8cdUeBh5EShK4z5tF3OwjUnU8_np1OuwvlLQ07K-gFFhW_oHmEG_Od_7zS1_Ci5hospPBMnZhzXWvYGdJ4sCiT-_B78sZpeDU1faS7Kwz84cAI5_ZCfORzDp-2bYsznOxq8h3x5rOsvFA8uOfyCYdo0HaGw-cbDSMlvf78PP8bHz6jUfCBW4KIRdcZ6JqhUOjnTI2tYVolTEoPQpobazXHtrM-iRPYaq0yhFtrqvUFGkjC4NFfgAb3bRzh8C0pro7z1zlsGgzjU3WlGXZeDjLnVYygU_LP16buI2cSDFu6lCVpKomFRFJpqyDihL4uLphNizieFp0j1S4EvMZoUelMoGjpb7q6Kh9vVJWAu9XV72HUduk6dz0rq9zav1WWCXAnpBAVYkKlShfP_uKI9gOJ8NhFPANbCzmd-4tbJn7xaSfvwu2-weS1vXg
  priority: 102
  providerName: ProQuest
Title Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks
URI https://ieeexplore.ieee.org/document/4358705
https://www.proquest.com/docview/206517089
https://www.proquest.com/docview/34525686
https://www.proquest.com/docview/896168915
Volume 4
WOSCitedRecordID wos000250530900006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE/IET Electronic Library
  customDbUrl:
  eissn: 1941-0018
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0024894
  issn: 1545-5971
  databaseCode: RIE
  dateStart: 20040101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
– providerCode: PRVPQU
  databaseName: ABI/INFORM Collection
  customDbUrl:
  eissn: 1941-0018
  dateEnd: 20120531
  omitProxy: false
  ssIdentifier: ssj0024894
  issn: 1545-5971
  databaseCode: 7WY
  dateStart: 20040101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/abicomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ABI/INFORM Global
  customDbUrl:
  eissn: 1941-0018
  dateEnd: 20120531
  omitProxy: false
  ssIdentifier: ssj0024894
  issn: 1545-5971
  databaseCode: M0C
  dateStart: 20040101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/abiglobal
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 1941-0018
  dateEnd: 20120531
  omitProxy: false
  ssIdentifier: ssj0024894
  issn: 1545-5971
  databaseCode: P5Z
  dateStart: 20040101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database
  customDbUrl:
  eissn: 1941-0018
  dateEnd: 20120531
  omitProxy: false
  ssIdentifier: ssj0024894
  issn: 1545-5971
  databaseCode: K7-
  dateStart: 20040101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Engineering Database
  customDbUrl:
  eissn: 1941-0018
  dateEnd: 20120531
  omitProxy: false
  ssIdentifier: ssj0024894
  issn: 1545-5971
  databaseCode: M7S
  dateStart: 20040101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1941-0018
  dateEnd: 20120531
  omitProxy: false
  ssIdentifier: ssj0024894
  issn: 1545-5971
  databaseCode: BENPR
  dateStart: 20040101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9QwEB61hQMXChTUUFh84MABt3FetrmVZSskYLtiFyi9RLE9kSpV2WofSPx7xo53EYIeuFiJMk4ij-dhz3g-gJfC7zQ21nEyzsgLtAU3yjZconSy1cq4ENH9-lGOx-riQk924PX2LAwihuQzPPaXIZbv5nbtt8pOyLTT9Cp3YVdK2Z_V-l1XTwXQQ-8RcHKSRSzjI1J9Mns3HfbFCqWvEPaHBQqQKn_p4WBczvb_77cewP3oRLLTnusPYQe7R7C_AWhgUV4P4PL8xrvXPmJNlGzU2cXPoCLesFNGVsohP29bFnO12DRi2bGmc2zWA_jQG9lVx3yS7DUpRTbu08aXj-HL2Wg2fM8jmAK3hZArbjJRtQKVNaitS10hWm2tkiThxlhHnFEuc-TAaZVqo3OlXG6q1BZpIwurivwJ7HXzDg-BGePX1HmGFaqizYxqsqYsy4ZUVY5GywSONwNc21hp3ANeXNdhxZHq2nPEA2DKOnAkgVfbDjd9kY3bSQ88A7ZkcewTONpwsI5CuKReVSlkqnQCL7ZPSXp8SKTpcL5e1rkP61aqSoDdQqF0JSqlRfn0318-gnthuzfk9z2DvdVijc_hrv2xulouBjRTv30fwJ23o_HkM919kJzaT-nQt3JK7aS8HISZ_AuA9uwb
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1bT9RAFD5BNNEXEdFYUZkHSHwZ7bTTzgyJMWSBQFgWE1ZDfKmdSxMS0l23i4Yf5X_kzLRdQgy-8eBzT6eX-XruPR_AJvOZxtJYisbZUe4Mp1qakgonrKiU1DZUdL8NxWgkz87UlyX40_8L49sqe50YFLWdGJ8jxyA9z5iIpfo8_Uk9aZQvrvYMGi0qjtzVb4zYmk-Hu7i9W0myvzceHNCOVIAazsSc6oTlFXPSaKeMjS1nlTJGCkS61sbiHUqbWHRklIyVVqmUNtV5bHhcCm4kT3HdB_CQc_wafKdgPLgZ7ScD76J3Sij66aybJMRi9XG8ezpo5yUKP6TslhEMrC5_mYJg3_ZX_rM38wyedo402WmRvwpLrn4OKz1JBel01hp8P5n6EMNX7VGS7NVmdhXU5DbZIWipraMnVUW6fjVy2vH5kbK2ZNySGOGK5LwmvlH4Ag0DGbWt880L-HovT_gSlutJ7V4B0drnFdLE5U7yKtGyTMosy0pU16nTSkTwod_hwnTT1j3px0URoq5YFR4SngRUFAESEbxfnDBtB43cLbrmIbMQQ48XtW4WwXqPj6JTRE2xAEcEG4ujqEF8Wais3eSyKVJf2s5lHgG5Q0KqnOVSsez1Py-xAY8PxsfDYng4OlqHJyELHtoe38DyfHbp3sIj82t-3szehe-GwI_7huM1DJpTYQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Opportunistic+Encryption%3A+A+Trade-Off+between+Security+and+Throughput+in+Wireless+Networks&rft.jtitle=IEEE+transactions+on+dependable+and+secure+computing&rft.au=Haleem%2C+MA&rft.au=Mathur%2C+C+N&rft.au=Chandramouli%2C+R&rft.au=Subbalakshmi%2C+K+P&rft.date=2007-10-01&rft.issn=1545-5971&rft.volume=4&rft.issue=4&rft_id=info:doi/10.1109%2FTDSC.2007.70214&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1545-5971&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1545-5971&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1545-5971&client=summon