تعداد نشریات | 418 |
تعداد شمارهها | 10,003 |
تعداد مقالات | 83,616 |
تعداد مشاهده مقاله | 78,250,188 |
تعداد دریافت فایل اصل مقاله | 55,303,263 |
A Secure Channel to Improve Energy Cost in Internet of Things | ||
Journal of Computer & Robotics | ||
مقاله 13، دوره 12، شماره 1، شهریور 2019، صفحه 123-130 اصل مقاله (266.64 K) | ||
نوع مقاله: Original Research (Full Papers) | ||
نویسندگان | ||
Mohammad Mehdi Gilanian Sadeghi* 1؛ Kobra Karkhaneh2 | ||
1Qazvin islamic azad university | ||
2Qazvin Islamic Azad University | ||
مراجع | ||
[1]Yan, Z.; Zhang, P., "A survey on trust management for Internet of Things", In Journal of Network and Computer Applications, vol. 42, no. 17, pp. 120-134(2014). [2]Prabhu, M.; Seethalakshmi, G., "Secured hearth care system in IoT", In International Journal of Pure and Applied Mathematics, vol. 118, no. 20, pp. 3239-3244 (2018). [3]Chen, X.Y.; Jin, Z.G., "Reseach on key technology and applications for Internet of things", In Physics Procedia, vol. 33, no. 12, pp. 561-566 (2012). [4]Healy, M.; Newe, T., "Efficiently securing data on a wireless sensor network", In Journal of Physics Conference Series, IOP Publishing, vol. 76, no. 1, p. 012063 (2007). [5]Law, Y.; Doumen, J., "Survey and benchmark of block ciphers for wireless sensor networks", In ACM Transactions on Sensor Networks (TOSN), vol. 2, no. 1, pp. 65–93 (2006). [6]Hankerson, D.; Menezes, A., "Guide to elliptic curve cryptography", Springer scince & business Media (2003). [7]Gupta, V.; Millard, M., "Sizzle: A standards-based end-to-end security architecture for the embedded Internet", In Pervasive and Mobile Computing, vol. 1, no. 4, pp. 425-445 (2005). [8]Liu, A.; Ning, P., "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks", In International Conference on Information Processing in Sensor Networks, IEEE, pp. 245-256 (2008). [9]Gura, N.; Patel, A., "Comparing elliptic curve cryptography and RSA on 8-bit CPUs", In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, pp. 119-132 (2004). [10]Piotrowski, K.; Langendoerfer, P., "How public key cryptography influences wireless sensor node lifetime", In Proceedings of the Fourth ACM Workshop on Security of ad hoc and sensor networks, ACM, NY, USA, pp. 169-176 (2006). [11]Hodjat, A.; Verbauwhede, I., "The energy cost of secrets in ad-hoc networks", In Proceeding of IEEE Circuits and Systems Workshop on Wireless Communications and Networking (2002). [12]Großschadl, J.; Szekely, A., "The energy cost of cryptographic key establishment in wireless sensor networks", In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ACM, pp. 380-382 (2007). [13]Wander, A.; Gura, N., "Energy analysis of public-key cryptography for wireless sensor networks", In Third IEEE International Conference on Pervasive Computing and Communications, pp. 324– 328 (2005). [14]Law, Y.; Doumen, J., "Survey and benchmark of block ciphers for wireless sensor networks", ACM Transactions on Sensor Networks, vol. 2, no. 1, pp. 65–93 (2016). [15]Abdmeziem, M.; Tandjaoui, D., "An end-to-end secure key management protocol for e-health applications", Computers and Electrical Engineering, vol. 44, no. 7, pp. 184-197 (2015). [16]Jianga, Qi.; Maa, J., "Efficient end-to-end authentication protocol for wearable health monitoring systems", Computers and Electrical Engineering, vol. 63, pp. 182-195 (2017). [17]Prabhu, M.; Seethalakshmi, G., "Secured hearth care system in IoT", In International Journal of Pure and Applied Mathematics, vol. 118, no. 20, pp. 3239-3244 (2018). | ||
آمار تعداد مشاهده مقاله: 378 تعداد دریافت فایل اصل مقاله: 199 |