ON CAPACITY TRADEOFFS IN SECURE DS-CDMA PACKET COMMUNICATIONS WITH QOS CONSTRAINTS
Abstract
This paper presents a mathematical framework for analysis of effect of counter mode (CTR) encryption on the traffic capacity of packet communication systems based on direct-sequence, code-division, multiple-access (DS-CDMA). We specify QoS constraints in terms of minimum acceptable mean opinion score (MOS) of voice payload, maximum permissible resource utilization for CTR-mode re-keying and DS-CDMA processing gain. We quantify the trade-offs in system capacity as a function of these constraints. Results show that application of CTR encryption causes error expansion and respecting the QoS constraints while satisfying the desired encryption parameters results in reduction of traffic capacityReferences
F. Sattar and M. Mufti, Lecture Notes in
Computer, Springer-Verlag, Berlin Heidelberg
(2008) p. 507-516.
J. M. Reason and D. G. Messerschmitt,
Proceedings of the 4th IFIP/IEEE
International Conference on Management of
Multimedia Networks and Services:
Management of Multimedia on the Internet
Springer-Verlag, 2001, Berlin Heidelberg
(2001) p. 175-192.
Olteanu, Alina, Yang Xiao, Proceedings of
the 2009 IEEE International Conference on
Communications, IEEE Press, Piscataway,
NJ, USA (2009) p.575-579.
W. Liang and W. Wang, INFOCOM, 24th
Annual Joint Conference of the IEEE
Computer and Communications Societies
IEEE Proceedings, Vol.2 (2005) p. 1478-
M. Dworkin, NIST Special Publication 800-
A, Computer Security Division, ITL NIST,
Gaithersburg (2001) p.15-16.
H. Lipmaa, P. Rogaway and D. Wagner,
Comment to NIST concerning AES Modes of
operations: CTR-Mode Encryption (January
p.2-3.
S. Moshavi, IEEE Communications Magazine
, No.10 (1996) 124.
W.C.Y. Lee, IEEE Transactions on Vehicular
Technology 40, No.2 (1991) 291.
R.L. Pickholtz, L.B. Milstein, D.L. Schilling,
IEEE Transactions on Vehicular Technology
, No.2 (1991) 313.
Housley, IETF RFC 3686, Network Working
Group, The Internet Society (January 2004).
IEEE Std 802.11i, IEEE Standard for
Information Technology - Telecommunication
and information exchange between systems -
Local and metropolitan area networks -
Specific requirements - Part 11: Wireless
LAN Medium Access Control (MAC) and
Physical Layer (PHY) Specifications.
Amendment 6: Media Access Control (MAC)
Security Enhancements (July 2004).
L. Yun and D.G. Messerschmitt, Proceedings
of IEEE Military Communications
Conference MILCOM '94, Fort Monmouth, NJ
(Oct. 2-4, 1994) p. 178 -182.
International Teleommunication Union,
Telecommunication Standardization Sector of
ITU, ITU-T Recommendation G.107 (March
.
J. Reason, Ph.D. dissertation, University of
California, Berkeley (Dec. 2000) p. 72-98.
S. T. Chung and A. J. Goldsmith, IEEE
Transactions on Communications
(September 2001) p. 1561-71.
F. Sattar and M.Mufti, International Journal of
Network Security 8, No.2 (2009) 119.
R. Forre, Proceedings on Advances in
Cryptology, Springer-Verlag, New York, NY,
USA, August 21-25 (1988) p.450-468.
National Institute of Standards and
Technology, FIPS Pub 197: Advanced
Encryption Standard (AES) (Nov. 2001).
A. Benyassine, E. Shlomot, H.-Y. Su,
D. Massaloux and C. Lamblin, J.-P. Petit,
IEEE Communications Magazine 35, No. 9
(1997) 64.
C. Bormann et al., IETF RFC 3095, Network
Working Group (July 2001).
R. C. Dixon, Spread Spectrum Systems with
Commercial Applications, Wiley & Sons,
(1994).