scholarly journals Scalable and Self-Adaptive Service Selection Method for the Internet of Things

2017 ◽  
Vol 167 (10) ◽  
pp. 43-49 ◽  
Author(s):  
Manel Mejri ◽  
Nadia Ben
Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2744 ◽  
Author(s):  
Dmitry Bankov ◽  
Evgeny Khorov ◽  
Andrey Lyakhov ◽  
Ekaterina Stepanova ◽  
Le Tian ◽  
...  

Wi-Fi HaLow is an adaptation of the widespread Wi-Fi technology for the Internet of Things scenarios. Such scenarios often involve numerous wireless stations connected to a shared channel, and contention for the channel significantly affects the performance in such networks. Wi-Fi HaLow contains numerous solutions aimed at handling the contention between stations, two of which, namely, the Centralized Authentication Control (CAC) and the Distributed Authentication Control (DAC), address the contention reduction during the link set-up process. The link set-up process is special because the access point knows nothing of the connecting stations and its means of control of these stations are very limited. While DAC is self-adaptive, CAC does require an algorithm to dynamically control its parameters. Being just a framework, the Wi-Fi HaLow standard neither specifies such an algorithm nor recommends which protocol, CAC or DAC, is more suitable in a given situation. In this paper, we solve both issues by developing a novel robust close-to-optimal algorithm for CAC and compare CAC and DAC in a vast set of experiments.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 85939-85949 ◽  
Author(s):  
Mehdi Hosseinzadeh ◽  
Quan Thanh Tho ◽  
Saqib Ali ◽  
Amir Masoud Rahmani ◽  
Alireza Souri ◽  
...  

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 187384-187399
Author(s):  
Christian Krupitzer ◽  
Timur Temizer ◽  
Thomas Prantl ◽  
Claudia Raibulet

Author(s):  
Tae-Ho Cho

The Internet of Things (IoT) is an ever evolving infrastructure of physical objects and Internet-enabled devices and systems featuring IP addresses for connectivity. Physical objects consist of home appliances, electronic gadgets, machinery, healthcare items, wearable devices and anything that could be connected to the Internet. Each type of connection requires particular types of security service. Security algorithms in user devices are fixed by default and selected based on preferences. This limitation causes energy waste since a user might be using all services in an algorithm, even those the user does not need. In order to counter this problem, we propose an energy aware security service selection method that saves energy by selecting only particular types of security service required by a given connection. In this paper, we compared the energy consumption of each communication to provide integrity, authentication, and confidentiality in Secure Sockets Layer/Transport Layer Security (SSL/TLS) with our proposed method. The experimental results demonstrate the validity of our proposed method. Our proposed method saved 54.94% energy for integrity and 74.52% for authentication.


Sign in / Sign up

Export Citation Format

Share Document