Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks
Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher...
Uložené v:
| Vydané v: | IEEE transactions on dependable and secure computing Ročník 4; číslo 4; s. 313 - 324 |
|---|---|
| Hlavní autori: | , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Washington
IEEE
01.10.2007
IEEE Computer Society |
| Predmet: | |
| ISSN: | 1545-5971, 1941-0018 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security.1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation (single and multirate), 4) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches. |
|---|---|
| AbstractList | Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors due to noise and burst errors due to fading. We note that the avalanche effect that makes a block cipher secure also causes them to be sensitive to bit errors. This results in a fundamental trade-off between security and throughput in encryption based wireless security.1 Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we propose a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches, this paper presents the following: 1) mathematical models to capture the security-throughput trade-off, 2) adversary models and their effects, 3) joint optimization of encryption and modulation (single and multirate), 4) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors, and 5) simulation results for Rijndael cipher. We observe that opportunistic encryption produces significant improvement in the performance compared to traditional approaches. Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network characteristics such as random bit errors and fading. For example, we note that properties such as the avalanche effect that make a block cipher secure also cause them to be sensitive to bit errors. Therefore, there is a fundamental trade-off between security and throughput in encryption based wireless security. Further, if there is an adversary with a certain attack strength present in the wireless network, we see an additional twist to the security-throughput trade-off issue. In this paper, we proposed a framework called opportunistic encryption that uses channel opportunities (acceptable signal to noise ratio) to maximize the throughput subject to desired security constraints. To illustrate this framework and compare it with some current approaches this paper presents the following: (a) mathematical models to capture the secuity-throughput trade-off; (b) adversary models and their effects; (c) joint encryption and modulation (single and multi-rate) optimization; (d) the use of forward error correcting (FEC) codes to protect encrypted packets from bit errors; and (e) simulation results for Rijndael cipher. We observe that opportunistic encryption produces signficant improvement in the performance compared to traditional approaches. [PUBLICATION ABSTRACT] |
| Author | Subbalakshmi, K.P. Chandramouli, R. Mathur, C.N. Haleem, M.A. |
| Author_xml | – sequence: 1 givenname: M.A. surname: Haleem fullname: Haleem, M.A. organization: Stevens Inst. of Technol., Hoboken – sequence: 2 givenname: C.N. surname: Mathur fullname: Mathur, C.N. organization: Stevens Inst. of Technol., Hoboken – sequence: 3 givenname: R. surname: Chandramouli fullname: Chandramouli, R. organization: Stevens Inst. of Technol., Hoboken – sequence: 4 givenname: K.P. surname: Subbalakshmi fullname: Subbalakshmi, K.P. organization: Stevens Inst. of Technol., Hoboken |
| BookMark | eNp9kT1vFDEQhi0UJPJVU9BYFFDtZbxrr2266AgQKeKKXIREY-3as8RhYy-2V-j-PXscokiRaqZ4nhnNvCfkKMSAhLxmsGIM9MX24-16VQPIlYSa8RfkmGnOKgCmjpZecFEJLdkrcpLzA0DNlebH5PtmmmIqc_C5eEuvgk27qfgYPtBLuk2dw2ozDLTH8hsx0Fu0c_JlR7vg6PY-xfnH_TQX6gP95hOOmDP9urAx_cxn5OXQjRnP_9VTcvfparv-Ut1sPl-vL28qy5ksVV-zdmCobI_aOnCcDdpaJWUDfW-ddFK52oHgWoHudaOUa_oWLIdOcqt4c0reH-ZOKf6aMRfz6LPFcewCxjkbpVvWKs3EQr57lmy4qEWr2gV8-wR8iHMKyxWmhlYwCUov0MUBsinmnHAwU_KPXdoZBmYfidlHYvaRmL-RLIZ4Ylhfuv23S-r8-Iz35uB5RPy_hTdCSRDNH5yZmn0 |
| CODEN | ITDSCM |
| CitedBy_id | crossref_primary_10_1109_TWC_2016_2615605 crossref_primary_10_1109_TCOMM_2020_3024825 crossref_primary_10_1109_ACCESS_2020_2966596 crossref_primary_10_1109_JIOT_2021_3139222 crossref_primary_10_1109_JIOT_2020_2982417 crossref_primary_10_1109_COMST_2022_3191697 crossref_primary_10_1016_j_phycom_2017_08_002 crossref_primary_10_1016_j_comnet_2021_108031 crossref_primary_10_1016_j_proeng_2012_01_929 crossref_primary_10_1016_j_trc_2025_105352 crossref_primary_10_1109_ACCESS_2020_3017557 crossref_primary_10_1007_s10922_016_9384_x crossref_primary_10_1007_s11276_014_0856_1 crossref_primary_10_1007_s11042_018_6015_4 crossref_primary_10_1109_TCOMM_2015_2474860 crossref_primary_10_1109_TII_2012_2209662 crossref_primary_10_1155_2012_720791 crossref_primary_10_1007_s10723_025_09797_3 crossref_primary_10_1016_j_adhoc_2013_07_006 crossref_primary_10_1109_TIE_2011_2178216 crossref_primary_10_1109_LWC_2017_2759113 crossref_primary_10_1007_s40747_022_00899_z crossref_primary_10_1109_TMC_2024_3489619 crossref_primary_10_1109_TAES_2021_3134988 crossref_primary_10_1109_TVT_2019_2899647 crossref_primary_10_1109_TIFS_2013_2248724 crossref_primary_10_1002_sec_1003 crossref_primary_10_1109_TCOMM_2022_3169813 crossref_primary_10_1007_s11277_013_1105_0 crossref_primary_10_1109_TWC_2023_3265458 |
| Cites_doi | 10.1109/25.350282 10.1109/26.891214 10.1002/9781119183471 10.1109/ACSSC.2004.1399231 10.1109/26.634685 10.1109/JSAC.1987.1146536 10.1002/9780470317037 10.1109/MMCS.1999.778609 10.1109/18.641562 10.1109/TBC.2002.804034 10.1109/ICC.2004.1313264 10.1007/3-540-45508-6_13 10.1109/9780470545287 10.1017/CBO9780511804441 10.1109/GLOCOM.2005.1577932 10.1109/ACSSC.2003.1292104 10.1109/25.293655 10.1109/TC.1979.1675242 |
| ContentType | Journal Article |
| Copyright | Copyright IEEE Computer Society Oct-Dec 2007 |
| Copyright_xml | – notice: Copyright IEEE Computer Society Oct-Dec 2007 |
| DBID | 97E RIA RIE AAYXX CITATION 3V. 7WY 7WZ 7XB 87Z 8AL 8FE 8FG 8FK 8FL ABJCF ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ K7- L.- L6V M0C M0N M7S P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI PRINS PTHSS PYYUZ Q9U 7SC 7SP 8FD F28 FR3 L7M L~C L~D |
| DOI | 10.1109/TDSC.2007.70214 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library CrossRef ProQuest Central (Corporate) ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials - QC ProQuest Central Business Premium Collection ProQuest Technology Collection ProQuest One Community College ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced ProQuest Engineering Collection ABI/INFORM Global Computing Database Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Business (UW System Shared) ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection ABI/INFORM Collection China ProQuest Central Basic Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) ABI/INFORM Complete (Alumni Edition) Engineering Collection Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing Engineering Database ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ABI/INFORM China ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Business (Alumni) ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) Business Premium Collection (Alumni) Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database ABI/INFORM Global (Corporate) Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 2 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1941-0018 |
| EndPage | 324 |
| ExternalDocumentID | 1375612171 10_1109_TDSC_2007_70214 4358705 |
| Genre | orig-research Feature |
| GroupedDBID | .4S .DC 0R~ 29I 4.4 5GY 5VS 6IK 7WY 8FE 8FG 8FL 8R4 8R5 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJCF ABQJQ ABUWG ABVLG ACGFO ACIWK AENEX AETIX AFKRA AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS ATWAV AZQEC BEFXN BENPR BEZIV BFFAM BGLVJ BGNUA BKEBE BPEOZ BPHCQ CCPQU CS3 DU5 DWQXO EBS EDO EJD FRNLG GNUQQ HCIFZ HZ~ IEDLZ IFIPE IPLJI ITG ITH JAVBF K60 K6V K6~ K7- L6V LAI M0C M43 M7S O9- OCL P2P P62 PHGZM PHGZT PQBIZ PQBZA PQGLB PQQKQ PROAC PTHSS PUEGO Q2X RIA RIE RNI RNS RZB AAYXX AFFHD CITATION 3V. 7XB 8AL 8FK JQ2 L.- M0N PKEHL PQEST PQUKI PRINS Q9U 7SC 7SP 8FD F28 FR3 L7M L~C L~D |
| ID | FETCH-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 55 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000250530900006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1545-5971 |
| IngestDate | Sun Nov 09 09:48:53 EST 2025 Thu Oct 02 04:58:07 EDT 2025 Mon Nov 10 02:51:28 EST 2025 Sat Nov 29 08:09:00 EST 2025 Tue Nov 18 21:35:26 EST 2025 Wed Aug 27 02:55:59 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 4 |
| Keywords | Security and Privacy Protection and protection Emerging technologies Wireless systems Security Optimization Wireless communication integrity Algorithms Data encryption Simulation Dynamic programming Cost/performance |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c417t-b216f1e8cbe9cd0d41f9cc87730bbcd7d78d2d0549809b9388d3b60c40a74c843 |
| Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
| PQID | 206517089 |
| PQPubID | 23500 |
| PageCount | 12 |
| ParticipantIDs | crossref_primary_10_1109_TDSC_2007_70214 proquest_journals_206517089 proquest_miscellaneous_34525686 crossref_citationtrail_10_1109_TDSC_2007_70214 proquest_miscellaneous_896168915 ieee_primary_4358705 |
| PublicationCentury | 2000 |
| PublicationDate | 2007-10-01 |
| PublicationDateYYYYMMDD | 2007-10-01 |
| PublicationDate_xml | – month: 10 year: 2007 text: 2007-10-01 day: 01 |
| PublicationDecade | 2000 |
| PublicationPlace | Washington |
| PublicationPlace_xml | – name: Washington |
| PublicationTitle | IEEE transactions on dependable and secure computing |
| PublicationTitleAbbrev | TDSC |
| PublicationYear | 2007 |
| Publisher | IEEE IEEE Computer Society |
| Publisher_xml | – name: IEEE – name: IEEE Computer Society |
| References | ref13 ref11 Sklar (ref2) 1988 ref1 Bertsekas (ref10) 1995 ref18 (ref12) 2001 Stintson (ref19) 2005 ref24 ref26 ref25 Daemen (ref16) 2006 ref22 Reason (ref17) 2000 Cormen (ref23) 2003 ref28 ref27 Stallings (ref15) 2003 ref29 ref8 ref7 Trappe (ref14) 2002 ref9 ref4 ref3 ref6 ref5 Cover (ref20) 1991 Lin (ref21) 2004 |
| References_xml | – ident: ref7 doi: 10.1109/25.350282 – volume-title: Error Control Coding year: 2004 ident: ref21 – ident: ref8 doi: 10.1109/26.891214 – volume-title: Introduction to Algorithms year: 2003 ident: ref23 – volume-title: AES Proposal: Rijndael year: 2006 ident: ref16 – ident: ref11 doi: 10.1002/9781119183471 – ident: ref28 doi: 10.1109/ACSSC.2004.1399231 – ident: ref5 doi: 10.1109/26.634685 – ident: ref18 doi: 10.1109/JSAC.1987.1146536 – ident: ref9 doi: 10.1002/9780470317037 – ident: ref29 doi: 10.1109/MMCS.1999.778609 – ident: ref4 doi: 10.1109/18.641562 – start-page: 27 volume-title: Cryptography and Network Security year: 2003 ident: ref15 – ident: ref26 doi: 10.1109/TBC.2002.804034 – ident: ref24 doi: 10.1109/ICC.2004.1313264 – ident: ref1 doi: 10.1007/3-540-45508-6_13 – ident: ref3 doi: 10.1109/9780470545287 – ident: ref6 doi: 10.1017/CBO9780511804441 – ident: ref25 doi: 10.1109/GLOCOM.2005.1577932 – ident: ref27 doi: 10.1109/ACSSC.2003.1292104 – volume-title: Dynamic Programming and Optimal Control year: 1995 ident: ref10 – volume-title: Federal Information Processing Standards Publication 197 year: 2001 ident: ref12 – volume-title: Digital Communications: Fundamentals and Applications year: 1988 ident: ref2 – volume-title: Introduction to Cryptography: With Coding Theory year: 2002 ident: ref14 – year: 2000 ident: ref17 article-title: End-to-End Confidentiality for Continuous-Media Applications in Wireless Systems – volume-title: Elements of Information Theory year: 1991 ident: ref20 – volume-title: Cryptography Theory and Practice year: 2005 ident: ref19 – ident: ref22 doi: 10.1109/25.293655 – ident: ref13 doi: 10.1109/TC.1979.1675242 |
| SSID | ssj0024894 |
| Score | 2.052083 |
| Snippet | Wireless network security based on encryption is widely prevalent at this time. However, encryption techniques do not take into account wireless network... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 313 |
| SubjectTerms | Algorithms and protection Codes Communication system security Cost/performance Cryptography Data encryption Digital Object Identifier Dynamic programming Emerging technologies Encryption Error correction Error correction codes Errors Fading integrity Mathematical model Mathematical models Modulation coding Network security Networks Optimization Propagation Security Security and Privacy Protection Signal to noise ratio Simulation Studies Throughput Tradeoffs Wireless communication Wireless networks Wireless sensor networks Wireless systems |
| SummonAdditionalLinks | – databaseName: Computer Science Database dbid: K7- link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT9xADLZ4HbiUUkCk9DGHHnqZkslrPL1UiIIqUS2V2FaolyjziLQSyi6bBYl_3_FkdlFVwaXnOA_F9md7bPkD-CDopLExlvvg7HjhTME1moZLJ61sFWobOrq_vsvRCK-v1Y84m9PHscolJgagtlNDZ-S-SK9KIVNUX2a3nEijqLkaGTTWYVNkmSAzv5D8cdUeBh5EShK4z5tF3OwjUnU8_np1OuwvlLQ07K-gFFhW_oHmEG_Od_7zS1_Ci5hospPBMnZhzXWvYGdJ4sCiT-_B78sZpeDU1faS7Kwz84cAI5_ZCfORzDp-2bYsznOxq8h3x5rOsvFA8uOfyCYdo0HaGw-cbDSMlvf78PP8bHz6jUfCBW4KIRdcZ6JqhUOjnTI2tYVolTEoPQpobazXHtrM-iRPYaq0yhFtrqvUFGkjC4NFfgAb3bRzh8C0pro7z1zlsGgzjU3WlGXZeDjLnVYygU_LP16buI2cSDFu6lCVpKomFRFJpqyDihL4uLphNizieFp0j1S4EvMZoUelMoGjpb7q6Kh9vVJWAu9XV72HUduk6dz0rq9zav1WWCXAnpBAVYkKlShfP_uKI9gOJ8NhFPANbCzmd-4tbJn7xaSfvwu2-weS1vXg priority: 102 providerName: ProQuest |
| Title | Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks |
| URI | https://ieeexplore.ieee.org/document/4358705 https://www.proquest.com/docview/206517089 https://www.proquest.com/docview/34525686 https://www.proquest.com/docview/896168915 |
| Volume | 4 |
| WOSCitedRecordID | wos000250530900006&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE/IET Electronic Library customDbUrl: eissn: 1941-0018 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0024894 issn: 1545-5971 databaseCode: RIE dateStart: 20040101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE – providerCode: PRVPQU databaseName: ABI/INFORM Collection customDbUrl: eissn: 1941-0018 dateEnd: 20120531 omitProxy: false ssIdentifier: ssj0024894 issn: 1545-5971 databaseCode: 7WY dateStart: 20040101 isFulltext: true titleUrlDefault: https://www.proquest.com/abicomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ABI/INFORM Global customDbUrl: eissn: 1941-0018 dateEnd: 20120531 omitProxy: false ssIdentifier: ssj0024894 issn: 1545-5971 databaseCode: M0C dateStart: 20040101 isFulltext: true titleUrlDefault: https://search.proquest.com/abiglobal providerName: ProQuest – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 1941-0018 dateEnd: 20120531 omitProxy: false ssIdentifier: ssj0024894 issn: 1545-5971 databaseCode: P5Z dateStart: 20040101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 1941-0018 dateEnd: 20120531 omitProxy: false ssIdentifier: ssj0024894 issn: 1545-5971 databaseCode: K7- dateStart: 20040101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Engineering Database customDbUrl: eissn: 1941-0018 dateEnd: 20120531 omitProxy: false ssIdentifier: ssj0024894 issn: 1545-5971 databaseCode: M7S dateStart: 20040101 isFulltext: true titleUrlDefault: http://search.proquest.com providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1941-0018 dateEnd: 20120531 omitProxy: false ssIdentifier: ssj0024894 issn: 1545-5971 databaseCode: BENPR dateStart: 20040101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Lb9QwEB61hQMXChTUUFh84MABt3FetrmVZSskYLtiFyi9RLE9kSpV2WofSPx7xo53EYIeuFiJMk4ij-dhz3g-gJfC7zQ21nEyzsgLtAU3yjZconSy1cq4ENH9-lGOx-riQk924PX2LAwihuQzPPaXIZbv5nbtt8pOyLTT9Cp3YVdK2Z_V-l1XTwXQQ-8RcHKSRSzjI1J9Mns3HfbFCqWvEPaHBQqQKn_p4WBczvb_77cewP3oRLLTnusPYQe7R7C_AWhgUV4P4PL8xrvXPmJNlGzU2cXPoCLesFNGVsohP29bFnO12DRi2bGmc2zWA_jQG9lVx3yS7DUpRTbu08aXj-HL2Wg2fM8jmAK3hZArbjJRtQKVNaitS10hWm2tkiThxlhHnFEuc-TAaZVqo3OlXG6q1BZpIwurivwJ7HXzDg-BGePX1HmGFaqizYxqsqYsy4ZUVY5GywSONwNc21hp3ANeXNdhxZHq2nPEA2DKOnAkgVfbDjd9kY3bSQ88A7ZkcewTONpwsI5CuKReVSlkqnQCL7ZPSXp8SKTpcL5e1rkP61aqSoDdQqF0JSqlRfn0318-gnthuzfk9z2DvdVijc_hrv2xulouBjRTv30fwJ23o_HkM919kJzaT-nQt3JK7aS8HISZ_AuA9uwb |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1bT9RAFD5BNNEXEdFYUZkHSHwZ7bTTzgyJMWSBQFgWE1ZDfKmdSxMS0l23i4Yf5X_kzLRdQgy-8eBzT6eX-XruPR_AJvOZxtJYisbZUe4Mp1qakgonrKiU1DZUdL8NxWgkz87UlyX40_8L49sqe50YFLWdGJ8jxyA9z5iIpfo8_Uk9aZQvrvYMGi0qjtzVb4zYmk-Hu7i9W0myvzceHNCOVIAazsSc6oTlFXPSaKeMjS1nlTJGCkS61sbiHUqbWHRklIyVVqmUNtV5bHhcCm4kT3HdB_CQc_wafKdgPLgZ7ScD76J3Sij66aybJMRi9XG8ezpo5yUKP6TslhEMrC5_mYJg3_ZX_rM38wyedo402WmRvwpLrn4OKz1JBel01hp8P5n6EMNX7VGS7NVmdhXU5DbZIWipraMnVUW6fjVy2vH5kbK2ZNySGOGK5LwmvlH4Ag0DGbWt880L-HovT_gSlutJ7V4B0drnFdLE5U7yKtGyTMosy0pU16nTSkTwod_hwnTT1j3px0URoq5YFR4SngRUFAESEbxfnDBtB43cLbrmIbMQQ48XtW4WwXqPj6JTRE2xAEcEG4ujqEF8Wais3eSyKVJf2s5lHgG5Q0KqnOVSsez1Py-xAY8PxsfDYng4OlqHJyELHtoe38DyfHbp3sIj82t-3szehe-GwI_7huM1DJpTYQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Opportunistic+Encryption%3A+A+Trade-Off+between+Security+and+Throughput+in+Wireless+Networks&rft.jtitle=IEEE+transactions+on+dependable+and+secure+computing&rft.au=Haleem%2C+MA&rft.au=Mathur%2C+C+N&rft.au=Chandramouli%2C+R&rft.au=Subbalakshmi%2C+K+P&rft.date=2007-10-01&rft.issn=1545-5971&rft.volume=4&rft.issue=4&rft_id=info:doi/10.1109%2FTDSC.2007.70214&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1545-5971&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1545-5971&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1545-5971&client=summon |