A Secure Channel to Improve Energy Cost in Internet of Things
الموضوعات : Journal of Computer & RoboticsMohammad Mehdi Gilanian Sadeghi 1 , Kobra Karkhaneh 2
1 - Qazvin islamic azad university
2 - Qazvin Islamic Azad University
الکلمات المفتاحية:
ملخص المقالة :
[1]Yan, Z.; Zhang, P., "A survey on trust management for Internet of Things", In Journal of Network and Computer Applications, vol. 42, no. 17, pp. 120-134(2014).
[2]Prabhu, M.; Seethalakshmi, G., "Secured hearth care system in IoT", In International Journal of Pure and Applied Mathematics, vol. 118, no. 20, pp. 3239-3244 (2018).
[3]Chen, X.Y.; Jin, Z.G., "Reseach on key technology and applications for Internet of things", In Physics Procedia, vol. 33, no. 12, pp. 561-566 (2012).
[4]Healy, M.; Newe, T., "Efficiently securing data on a wireless sensor network", In Journal of Physics Conference Series, IOP Publishing, vol. 76, no. 1, p. 012063 (2007).
[5]Law, Y.; Doumen, J., "Survey and benchmark of block ciphers for wireless sensor networks", In ACM Transactions on Sensor Networks (TOSN), vol. 2, no. 1, pp. 65–93 (2006).
[6]Hankerson, D.; Menezes, A., "Guide to elliptic curve cryptography", Springer scince & business Media (2003).
[7]Gupta, V.; Millard, M., "Sizzle: A standards-based end-to-end security architecture for the embedded Internet", In Pervasive and Mobile Computing, vol. 1, no. 4, pp. 425-445 (2005).
[8]Liu, A.; Ning, P., "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks", In International Conference on Information Processing in Sensor Networks, IEEE, pp. 245-256 (2008).
[9]Gura, N.; Patel, A., "Comparing elliptic curve cryptography and RSA on 8-bit CPUs", In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, pp. 119-132 (2004).
[10]Piotrowski, K.; Langendoerfer, P., "How public key cryptography influences wireless sensor node lifetime", In Proceedings of the Fourth ACM Workshop on Security of ad hoc and sensor networks, ACM, NY, USA, pp. 169-176 (2006).
[11]Hodjat, A.; Verbauwhede, I., "The energy cost of secrets in ad-hoc networks", In Proceeding of IEEE Circuits and Systems Workshop on Wireless Communications and Networking (2002).
[12]Großschadl, J.; Szekely, A., "The energy cost of cryptographic key establishment in wireless sensor networks", In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ACM, pp. 380-382 (2007).
[13]Wander, A.; Gura, N., "Energy analysis of public-key cryptography for wireless sensor networks", In Third IEEE International Conference on Pervasive Computing and Communications, pp. 324– 328 (2005).
[14]Law, Y.; Doumen, J., "Survey and benchmark of block ciphers for wireless sensor networks", ACM Transactions on Sensor Networks, vol. 2, no. 1, pp. 65–93 (2016).
[15]Abdmeziem, M.; Tandjaoui, D., "An end-to-end secure key management protocol for e-health applications", Computers and Electrical Engineering, vol. 44, no. 7, pp. 184-197 (2015).
[16]Jianga, Qi.; Maa, J., "Efficient end-to-end authentication protocol for wearable health monitoring systems", Computers and Electrical Engineering, vol. 63, pp. 182-195 (2017).
[17]Prabhu, M.; Seethalakshmi, G., "Secured hearth care system in IoT", In International Journal of Pure and Applied Mathematics, vol. 118, no. 20, pp. 3239-3244 (2018).