Have a personal or library account? Click to login
An Energy Efficient Protocol For The Internet Of Things Cover

An Energy Efficient Protocol For The Internet Of Things

Open Access
|Mar 2015

References

  1. [1] The Internet of Things, International Telecommunication Union, 2005. www.itu.int/osg/spu/publications/internetofthings/.
  2. [2] GAVRAS, A.—KARILA, A.—FDIDA, S.—MAY, M.—POTTS, M.: Future Internet Research and Experimentation, SIGCOMM Computer Communication, rev. 37 No. 3 (July 2007), 89–92.10.1145/1273445.1273460
  3. [3] REED, D. A.—GANNON, D. B.—LARUS, J. R.: Imagining the Future: Thoughts on Computing, Computer 45 No. 1 (Jan 2012), 25–30.10.1109/MC.2011.327
  4. [4] WEBER, R. H.: Internet of Things — New Security and Privacy Challenges, Computer Law & Security Review 26 No. 1 (Jan 2010), 23–30.10.1016/j.clsr.2009.11.008
  5. [5] KAZANAVICIUS, E.—KAZANAVICIUS, V.—VENCKAUSKAS, A.—PASKEVICIUS, R.: Securing Web Application by Embedded Firewall, Electronics and Electrical Engineering 3(119) (2012), 65–68.10.5755/j01.eee.119.3.1366
  6. [6] FREIER, A.—KARLTON, P.—KOCHER, P.: The Secure Sockets Layer (SSL) Protocol Version 3.0, www.rfc-editor.org/rfc/rfc6101.txt.
  7. [7] GUPTA, V.—WURM, M.: The Energy Cost of SSL in Deeply Embedded Systems, Sun Microsystems Inc., Tech. Rep. SMLI TR-2008-173, 2008.
  8. [8] KAMEL, M.—BOUDAOUD, K.—LEQUEUX, S.—RIVEILL, M.: Designing Security Protocols Adapted to the Constraints of Mobile Environments, Embedded and Ubiquitous Computing (EUC), IEEE/IFIP 8th International Conference on, 11-13 Dec 2010, pp. 624–629.10.1109/EUC.2010.100
  9. [9] PRASITHSANGAREE, P.—KRISHNAMURTHY, P.: On a Framework for Energy-Efficient Security Protocols in Wireless Networks, Computer Communications 27 No. 17 (Nov 2004), 1716–1729.10.1016/j.comcom.2004.05.022
  10. [10] CANO, M. D.—DOMENECH-ASENSI, G.: A Secure Energy-Efficient m-Banking Application for Mobile Devices, Journal of Systems and Software 84 No. 11 (Nov 2011), 1899–1909.10.1016/j.jss.2011.06.024
  11. [11] POTLAPALLY, N. R.—RAVI, S.—RAGHUNATHAN, A.—LEE, R. B.—JHA, N. K.: Configuration and Extension of Embedded Processors to Optimize IPSec Protocol Execution, IEEE Transactions on Very Large Scale Integration (VLSI) Systems 15 No. 5 (May 2007), 605–609.10.1109/TVLSI.2007.896912
  12. [12] VENČKAUSKAS, A.—JUSAS, N.—KIŽAUSKIENE, L.—KAZANAVIČIUS, E.—KAZANAVIČIUS, V.: Security Method of Embedded Software for Mechatronic Systems, Mechanika 18 No. 2 (2012), 196–202.
  13. [13] VENČKAUSKAS, A.—JUSAS, N.—MIKUCKIENĖ, I.—MACIULEVIČIUS, S.: Generation of the Secret Encryption Key using the Signature of the Embedded System, Information Technology and Control 41 No. 4 (2012), 368–375.
  14. [14] MARLER, R.—ARORA, J.: Survey of Multi-Objective Optimization Methods for Engineering, Structural and Multidisciplinary Optimization 26 No. 6 (2004), 369–395.10.1007/s00158-003-0368-6
  15. [15] PASTORE, M.—EMMETT, D.: COMPTIA SECURITY+ ST. GUIDE DELUXE, John Wiley & Sons, 2006, OpenSSL Software Distribution. http://www.openssl.org/.
  16. [16] TOLDINAS, J.—STUIKYS, V.—DAMASEVICIUS, R.—ZIBERKAS, G.—BANIONIS, M.: Energy Efficiency Comparison with Cipher Strength of AES and Rijndael Cryptographic Algorithms in Mobile Devices, Electronics and Electrical Engineering 2(108) (2011), 11–14.10.5755/j01.eee.108.2.134
  17. [17] KANSAL, A.—FENG ZHAO—JIE LIU—KOTHARI, N.—BHATTACHARYA, A. A.: Virtual Machine Power Metering and Provisioning, In Proceedings of the 1st ACM Symposium on Cloud Computing (SoCC ’10), ACM, New York, NY, USA, 2010, pp. 39–50.10.1145/1807128.1807136
DOI: https://doi.org/10.1515/jee-2015-0007 | Journal eISSN: 1339-309X | Journal ISSN: 1335-3632
Language: English
Page range: 47 - 52
Submitted on: Jan 15, 2014
|
Published on: Mar 11, 2015
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2015 Algimantas Venčkauskas, Nerijus Jusas, Egidijus Kazanavičius, Vytautas Štuikys, published by Slovak University of Technology in Bratislava
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.