17.1 Inline Network Encryption for Multimedia Wireless LANS

advertisement
INLINE NETWORK ENCRYPTION FOR
MULTIMEDIA WIRELESS LANS
Aura
Ganz*,
Se Hyun
x Multimedia
ECE
Park*,
Wireless
Department,
and
LAN
University
Amherst,
xx AIM
Ganz**
of Massachusetts
MA
ganz,shpark@Nikva
Zvi
Laboratory
01003
.ecs.umass.edu
Engineering
Inc.
zviQaime.com
case these
ABSTRACT
To secure
real-time
is pertinent
vices
in
uate
to implement
soflware
for
Layer
Service
wireless
Windows.
real
that
various
LANs
distributed
software
encryption
processing.
throughput
from
work,
ser-
algo-
LAN.
run
on
We present
the inhne
such
of various
the
2 for
algorithms
as video
data
con-
bases and
show
encryptors
fective
delivery
that
provides
by the above applications.
of these
In
1997 the
Wireless
was approved
dio
with
trum
employ
Wireless
Local
driven
as:
by
communication
consider
(SS)
radio
is very costly
Savings
without
need
the
installation
In these
process
to
Wireless
buildings
the
e.g.,
users
will
and
of exist-
or temporary,
admission
in front
to
3)
in hospi-
of the patient
the
in which
focus
require
on data
database
desk,
cost
effects
characteristics
4)
LAN
applications
the security
(DS)
SS and frequency
multimedia
like
applica-
videoconferencing.
of transmission
The
security
aspects
[11].
know
paging
guaranteed
service,
e.g.
of secure
through-
the
This
the
conferencing)
and
time
delay
variation,
for
system
services
provide
source
authors
security
direct
sequence
a chip
have
concluded
mechanism
the initial
spreading
intrusion
the
duration.
will
not
of multimedia
a more
interactive
strict
code like the
same
unde-
importance
applications
challenging
task.
applications
(e.g.
Quality
of throughput)
be
and implementa-
ion is of seminal
is even
the
area can
can be virtually
the design
been
that
in the same service
on the
and
The
SS distribute
of SS communication
with
(in terms
security
will
scarce
of Service
compete
network
rewith
and
resources.
data
rates
only
a number
Table
delay
information
is due to the fact that
we will
Spectrum
are also advantageous
since both
integration
services
Spec-
transmission.
(,FH)
communicant
Moreover,
The work was supported in part by NSF under contract number
CISE-CDA-9529462.
time
this
networks.
tively
maximum
and
paper
by another
hopping
The
[10]
and Ra-
techniques
jamming
[1], [3]. Therefore,
in wireless
In
put,
or detect
code
tectable
tion
only
802.11
Spread
of multi-pakh
Act ive intruders
Since the current
These
ef-
be severely
Spread
In this
spectrum
standpoint,
bits
video
Future
and
Infrared
or
employ
of SS modulation
flom
easily
which
to intentional
wit h security
of running
transactions.
need to support
teleconferencing,
applications
2) Extension
IEEE
layers,
techniques.
Spread
degrading
quirements
transfers
LANs
him
such
in which
etc.
examples
file
move
are
events
patients
is done
markets
or scenarios
temporary
be permanent
e.g.,
in old
is high,
email,
may
in terminals.
the
cables
for
or impossible,
which
tals in which
tions,
of applications
installation
ing networks
( WLAN)
quality
standard,
Narrowband
WLANS
techniques.
sufficient.
Networks
a number
1) LAN
wiring
Area
the
will
physical
either
use of SS as the
INTRODUCTION
met,
applications
LAN
for both
investigate ed in
I.
are not
degraded.
resist ante
encryptors
measurements
as required
in
WinSock
distributed
Our
implementation
enough
by
it
we eval-
are implemented
applications
collaborative
paper
encryption
of the wireless
multimedia
ferencing,
this
as defined
requirements
LANs
cryptographic
In
that
evaluated
is part
the throughput
time
based inline
Provider
The
each PC
in wireless
or hardware.
the use of soflware
rithms
for
communication
guarantees
low
ferencing,
Wireless
of up
LAN
to 10 Mbps,
technology
the
of multimedia
requirements
text
ht tp and
email,
the candidate
0-7803-4902-4/98/$10.00 (c) 1998 IEEE
can support
applications
bandwidth
1 shows
WLAN
can sustain
such
multimedia
applications
with
as video
relacon-
mail/notes.
with
their
re-
quired
throughput.
Inline
security
ofApplications
Types
plemented
service
either
in
crypts/decrypts
in
ted/received
tions
is defined
hardware
network
of NSA’S
crypt ographic
boxes
communication
high
by a number
MISSI
security
these
multimedia
[6].
in a very
WLANS
due
low
used
in portable
mostly
In this
paper
inline
encryptors
to the
data
rates,
may
not
WLANS
devices,
Table
characteristics:
and
low
LAN,
run
3)
implemental
ion
disadvantage
the computer
and
is that
system
implementation
based
It is important
flexible
upgrades.
by
impedes
the
the throughput
Wireless
and
different
each
using
service
provider,
are forwarded
we can
aware
of us●
penalties
encountered
by other
communication
use any
the
to the
the packets
are intercepted
using
by the
CryptoAPIs
application.
has
the
●
Of
off-the-shelf
do not
need
oft he fact that
that
following
advan-
applications,
Ibe modified
to
suitable
tion
and
network
to choose
made
techniques.
interface
a network
encryption
the
card,
interface
capability
either
or software
easy upgrade
course
need
i.e.,
we use encryption
incorporates
in hardware
in
protocol
by
provided,
is sent down
are decrypted
architecture
we do not
card
by a packet
is generated
and
we can use any off-the-shelf
i.e.,
this deter-
We also con-
1).
At the destination
to the
be-
tages:
for two computer
loads.
resides
IIayer service
application
in
and the lower-level
that
CryptoAPIs
layer
functions
[7] that
2 DLL
at the
protocol.
proposed
Provider
packet
algorithms
service
(see Figure
is intercepted
to this
●
we have implemented
is obtained
source,
encryption
crypto
Service
belong
The
as
WinSock
that
of a number
delay
of the encryption
the
proposed
for very
high
speed
may
hinder
throughput
algorithms
implement
at ion
networks
the
may
since
use of the
not
be
the encryphigh
speed
channel.
layers.
measurements
of various
show
encryptors
by the above
paper
the
algorithms
and their
performance
the
conclusions
implementation
enough
III.
throughput
In the
software
next
section
architecture.
The
Encryption
In this
subsection
in software
perimental
is depicted
III.
(B...),
software
are provided
analysis
based
necessary
inline
in Section
Section
IV.
encryptors.
for
Throughput
Experimental
Re-
sults
we have implemented
in Section
EXPERIMENTS
as
A.
as follows.
the performance
proper
software
applications.
proposed
encryption
also provides
that
provides
is organized
we describe
choosing
for Multimedia
software
provider
is encrypted
encryption
To make
caused
The
the
by the ap-
in the system
III
At
and
is limited
is determined
which
throughput
2 Layered
the principal
applications
sider additional
The
[4]
base transport
and
hard-
the suitability
requirements.
configurations
than
intensive
encryptors
algorithms
The
is part
above
for
which
that
we have measured
of encryption
our
CryptoAPI
base transport
key cryptography.
to understand
throughput
required
[
IMPLEMENTATION
implemented
using
application
encryptors
listed
configuration
as public
software
inline
its performance
of computational
such
that
it is cheaper
more
based
2 for Windows.
characteristics
ware
Our
Applications
SOFTWARE
WinSock
in the Layer
on each PC
Software
for WLANS
The
system
MPEG video
Candidate
II.
We
cost,
4) a distributed
by WinSock
advantages:
software.
1.
be the best
are implemented
has the additional
mination
64kbps
FI lZ8kbps - lMbps
I 1.54Mbps
LANs
shared
the use of software
which
algorithms
wireless
are suitable
plication
(
tween
as defined
evaluated
ing inline
audio
high-speed
of Mbps).
2) relatively
we investigate
Provider
algorithms
Applicafiom
videa con ferenctig
environment.
of the
< 103kbps
notes
Multimedia
telephone-quality
These
are usually
hardware
1) relatively
Service
Interactive
TACLANE
hundreds
boxes
applica-
the very high
and
family)
or
en-
transmit-
of computers.
choice
The
(tens
cost,
cryptography
mobile
into
are a necessity
Dedicated
for
FASTLANE
network
to their
plugged
e.g.,
I ~a
im-
that
packet
Some military
boxes
lines,
software
every
by the application.
(members
Due
or
real-time
use cryptography
speed
as a mechanism,
we provide
results,
we have
in terms
obtained
a description
of encryption
for
a number
of the
ex-
throughput
of encryption
algorithms.
To obtain
the encryption
computer
configurate
0-7803-4902-4/98/$10.00 (c) 1998 IEEE
ions:
throughput
we have used two
1) configuration
M 1:
Pen-
Throughpu,
I
hkasumd
Bulk
Etw@on
Al@?rifhms
I
Ml
M2
11
Memory
B
AwihUe
Resources
I
I
I
.%mdzwdWimock 2.0 DLL
I
.+kd”k
r---”---------------i---------------------!
:
Enc.
1 3il
Dec
f 4N
RG!
Enc
Dec
\ 3.6
I 3.5
RSA
Enc.
Da
, 8,6
RC2
!
............
CPU ~% ,h_,,
—
Table
I 161
Ml
: Pentium MMX 166MHz, 16M Main Memory, 512U L2 Cache,Window 95
M2
: Pentium Pro 2CQMHZ,32M Main Memory, 256K Ir,temal L2 Gcha, Windows NT
Enc
: Encryption
2.
Bulk
Dec
Encryption
: Decryption
Algorithms
Measured
Through-
put
i
Wi?zhs,
Network
M.+.
Cad
timedia
Figure
1. Software Inline
(ISLSP) Architecture
Secure Layered
Service
Provider
1) the
put,
applications.
wireless
166MHz,
and
Windows
95),
Pro
200MHz,
32M
cache and
We
16M main
and
have
encryption
RC2
(block
in
cipher),
and
We have
also integrated
other
symmetric
in the
and
RSA
processed
per second.
from
main
These
encryption
From
tools
2 we observe
encryption
the encryption
In
en-
use the
same
key.
much
slower
algorithms
the
number
main
of throughput
almost
and decryption
such as RSA
petition
on
WLAN.
Therefore,
Multimedia
Wireless
this
based
subsection
inline
for
WLANS
we
process
●
In
is in
●
for
time
support
effective
(bps),
i.e.,
and
com-
nodes
in
bandwidth
the WLAN
data
the
can be
rate.
by the application
(bps).
at the source(bps)
mul-
overhead
time
a packet
ical
layer,
and
transport
TDOH
at
in all
data
the
destination
layer,
layer).
This
delay
protocol
the time
overhead
spent
time
and
layers
driver,
to
(physnetwork
also includes
any
layers.
by a packet
includes
its
at the
required
:protocol
in these
This
time
clevice
delays
a packet
the
time
queueing
at the
required
delay
all the
layers.
Bs the maximum
source
rate at which
interface
a packet
rate
to the
ways a packet
0-7803-4902-4/98/$10.00 (c) 1998 IEEE
bandwidth
the source
card,
available
9 BD the maximum
data
by a packet
the
the
link
to process
imum
spent
includes
destination.
protocol
use of software
that
en-
by other
noise
other
throughput
This
maximum
the
from
this
less than
the
source.
queueing
LANs
we investigate
encryption
Encryption
incurred
channel
channel
decryption
w TSOH
ways
Inline
the
encryption
network
of Software
and
section),
bandwidth
the
throughput
in
throughput.
Suitability
effective
account
requested
throughput
algorithms.
into
B.n.
on output
the bottleneck
LAN
we take
B.PP bandwidth
for each bulk
identical
size (bits)
●
of
95/NT,
configuration
notations:
●
Ml
determinants
of Windows
packet
BW wireless
in
resources
2. Based
of
that
(bps)
reported
Available
the following
●
9 .B&C
of bytes
configurations
in terms
in the previous
overhead
with
D data
encryption
as through-
throughput
computer
(as shown
processing
significantly
than
consideration
such
layers.
●
key algorithm
measurements
for Table
the range
key algorithms
algorithms
protocol
algorithm.
of symmetric
B.
both
as the
are the
management
Table
public
that
encryption
loads.
memory
have determined
CryptoAPI:
are
imply
for two computer
the experiments
system
of
which
We measured
and M2 as well as different
and
number
cipher)
data
is defined
2 were taken
a
[5] public
above
layer.
which
CPU
and 4) additional
L2
.
the
throughput
choosing
Pent ium
internal
by
operations
decrypts
all
application
Table
(stream
algorithms
tested
ISLSP
which
decryption
encrypts
M2:
256K
provided
RC4
crypt ion
have
our
algorithms
which
cryption
We proceed
algorithms
symmetric-key
L2 cache
ion
memory,
into
QoS requirements
by the
512K
NT.
integrated
bulk
We
2) configurate
main
Windows
memory,
take
3) encryption/decrylption
is determined
MMX
will
characteristics
2) the applications’
throughput,
tium
We
LAN
assuming
at which
available
that
to be sent from
destination
application,
(bps),
the
the max-
PC sends data
bandwidth
destination
assuming
that
to the
there
is al-
the source.
(bps),
the
PC
sends
there
is al-
to be sent to the destination
Distance
Source
I
, Wireless
Channel
De4ination
I
:Ik!=l:l:a
Wrm”
TCPI’JP
I
‘c
‘“
DIBw
II ‘ttqE,...i..
I
NIC
: Netwmk
Grd
[nterke
D.1..
:
h
Zone for
2.
from
Application-to-Application
the
(A)
. the decryption
delay
(&)
To
2 depicts
using
sustain
the
Packet
end-to-end
with
bandwidth
packet
size D,
mzn(Bs,
now
widths,
compute
BD
the
13s and BD,
We compute
the
and destination
in all
source
PC.
required
by
an
there
spent
Since
one
layer
and
that
layers
and
a packet
DD
destination
band-
of the protocols’
at the source
CPU
(worst
(1)
over-
throughput.
by a packet
algorithms
is always
application
at the
source
and at the des-
handles
the
including
In
this
case we can
assuming
case computation)
loads,
from
BdeC
(2) and
equations
=
z&”
deci-
software
encryption
with
TSOH
use this inline
software
encryptor
(Fig-
For example:
for a videoconferencing
wireless
bandwidth
LAN
= 510psec, the inline
TSOH
of lMbps,
D = 64Bytes,
and
throughput
l?enc
encr~yptor
256 Mbps.
Equation
bandwidth,
session
of 2 Mbps,
(6) and
asssuming
(7) the
maximum
BW > B.PP,
application
is given by:
B~pz
the
(2)
(3)
example:
of 4 Mbps,
64Bytes,
sustain
(3) we obtain:
&_+
following
Bapp, and
(4)
> B.PP
value
for
an inline
wireless
and
TSoH
applications
For given
Bs
the
we obtain:
+ TDOH
1
with
ure 3).
For
DD
—=—
BD
up
the use of inline
If B ~nc ~ Bg~
Using
encryp-
high
for transmission
Given:
come
Ben.:
has to be at least
protocols
the
– —
-t TSOH
– BenC
~
Using
Encryptor
(7)
sion regarding
app
and decryption
communication
tion/decryption
i.e.,
2
as a function
time
we have
the
Security
packet
~~pp we require:
, &J)
head and of the encryption
tination
Zone of Inline
notations.
throughput
We
3.
Journey
application-to-application
the above
the
application
En.vptor
(6)
delay
Figure
Software
network.
. the encryption
journey
Inline
Data Liok
Figure
Figure
A,
nun
‘-”K,
B .. q
Encryptiommpt,on Thro.ghpul(lpi)
highei @,
values
of TSOH,
the required
LAN
=
encryptor
lmsec,
the
of at most
denoted
bandwidth
of 2 Mbps,
inline
encryptor
D
=
can
454 Kbps.
of Bw, B.pp, B..,,
application
with
bandwidth
by TS&ff
bandwidth
and D, the m=imum
that
will
still
is given
provide
by:
emc
1
BD
The
minimal
sustain
tem
the
=
1
, TDOE
Bale= ‘
D
encryption
application
parameters
is given
and
decryption
bandwidth
by
(5)
> B.pp
with
throughput
the
given
(9)
to
Figure
sys-
values
tion
5 show= TS~#
as a function
of Bapp, and D.
Figure
of Bent
for various
0-7803-4902-4/98/$10.00 (c) 1998 IEEE
values
of ~enc for various
4 shows
of TSOH.
B~P&
as a fine.
We observe:
next
step
timedia
is to test
the
encryption
algorithm
in a mul-
testbed.
References
[1]
S.H. Park, A. Ganz, and Z. Ganz, “Security Protocol for
IEEE 802.11 Wireless Local Area Networks,” to appear in
ACM Mobile Net works Journal Sp,ecial Issue on Wireless Local Area
Networks.
[2]
A. Ganz,
D. Awduche,
A.
Phonphoem,
and
J. Euh,
I. Kim,
Z. Ganz,
E. Hasiett,
“Multimedia
S.H. Park,
Wireless
LAN
Third Telecommunication
R(!4D Conference
Massachusetts, Lowell, MA, Nov. 1997.
Prototype?
[3]
A. Aziz and W. Diffie,
less Local
First
[4]
Quarter,
Microsoft,
R.L.
Interface,”
Rivest,
A.
Cryptography
Version
Shamir,
Digital
G .N.
Cohen,
and
Microsoft,
L.M.
Adleman,
Method
Cryptosys-
of the ACM, v. 21, n. 2, Feb. 1978,
Kamenel,
Virginia,
“Windows
Pro-
“A
and Public-Key
and
C.M.
Kubic,
IP-ATM/Tactical-Strategic
96, McLean,
[7]
B.
Application
2.o, 1997.
Signatures
tems,”
Communications
pp. 120-126.
Integrated
for Wke-
Communicationsj
1994, pp. 25-31.
for Obtaining
[6]
and Authentication
IEEE Personal
‘(CryptoAPI:
gramming
[5]
“Privacy
Area Networks,”
in
(let.
“Security
1996, IProceedings,
Sockets
2 Service
pp. 456-460.
Provider
Interface,”
Revision
[8]
2.2.2, Aug. 7, 1997.
Security
Product
J. Banes, “Internet
for
MILCOM
Networks;’
from
ie.07
-.06
0..06
7e. c6
!%.06
5..06
,e+ce
a.m
Enmyp!,o.lDec,ypl,on BanOw,dlh(+s)
2.+08
,..G3
[9]
o
[10]
Flgure5.
Z’S~&
versus B..C
for D = 256Bytes
Microsoft
Intel,
‘(Common
Draft
Release
IEEE
Standard
H. Imai,
increases
spent
for encryption
overhead
●
For
as B.nC
increases.
decreases,
As
the
time
the remaining
Proceedings
ASIACRYPT
time
increases.
increased
decreases
application
since
bandwidth
less time
I?.PP, TS~&
can be spent
on the com-
puter.
IV.
In this
based
paper
inline
encryption
throughput
for
different
software
two
loads.
based
cations,
inline
per packet
data
In cooperation
Wireless
sachusetts
WLANS
We have
computer
To
at
that
use of software
integrated
and
encryption
a number
measured
systems
determine
their
configurate
the
the multimedia
of
appli-
application
size, the time
protocols
ions
suitability
for multimedia
the packet
for communication
the WLAN
the
algorithms
we have considered
request ed bandwidth,
media
investigated
encryptors.
of popular
and
SUMMARY
we have
overhead
processing,
and
rate.
with
LAN
Amherst
surmort
. .
AIM
Engineering
Laboratory
at University
is developing
multimedia
Inc.,
the
Multiof Mas-
a prototype
abdications
. .
802.11
“Information
Systems,”
TS&?f
Data
1.2, Mar.
Version
Security
Unit ,“ Internet
0.7, Nov.
Architecture
Draft
1996.
Specification,”
1997.
for
Wireless
LAN,
IEEE
P802. 11,
1997.
[11]
●
Corporation,
for
.121.
. Our
0-7803-4902-4/98/$10.00 (c) 1998 IEEE
Security
Aspects
of the Advances
’94, 1994, pp. 195-208.
of Spread
in
Spectrum
Cryptography
-
Download