Abstract
The Internet of Things is a rapidly evolving technology, which creates new challenges to security and energy consumption of devices at the various environmental conditions. Wireless communication technologies are one of the bases of IoT. In this paper, we proposed the security requirements of IoT applications to relate with the operating modes of wireless protocols. In addition, we presented the measurement and analysis of energy consumption and data transfer rates of Wi-Fi and Bluetooth protocols, depending on the security requirements of applications and conditions of environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Karimi, K., Atkinson, G.: What the Internet of Things (IoT) needs to become a reality, http://www.freescale.com/files/32bit/doc/white_paper/INTOTHNGSWP.pdf
Smith, I.G. (ed.): The Internet of Things 2012: New Horizons. Halifax, UK (2012)
Overcoming challenges of connecting intelligent nodes to the Internet of Things. Silicon Laboratories, Inc., http://www.silabs.com/Support%20Documents/TechnicalDocs/bringing-the-internet-of-things-to-life.pdf
Webber, R.H.: Internet of Things – new security and privacy challenges. Computer Law & Security Review 26, 23–30 (2010)
Kazanavicius, E., Kazanavicius, V., Venckauskas, A., Paskevicius, R.: Securing web application by embedded firewall. Electronics and Electrical Engineering 3(119), 65–68 (2012)
Gupta, V., Wurm, M.: The energy cost of SSL in Deeply Embedded Systems, Sun Microsystems Inc. Tech. Rep. SMLI TR-2008-173 (2008)
Pastore, M., Emmett, D.: COMPTIA SECURITY+ ST. GUIDE DELUXE. John Wiley & Sons (2006)
Lee, J.S., Su, Y.W., Shen, C.C.: A comparative study of wireless protocols. In: The 33rd Annual Conference on Bluetooth, UWB, ZigBee, and Wi-Fi, IEEE Industrial Electronics Society (IECON), Taiwan, ,pp. 46–51 (November 2007)
Friedman, R., Krivolapov, Y.: On Power and Throughput Tradeoffs of WiFi and Bluetooth in Smartphones. IEEE Transactions on Mobile Computing 12(7), 1363–1376 (2013)
Prasithsangaree, P., Krishnamurthy, P.: On a framework for energy-efficient security protocols in wireless networks. Computer Communications 27(17), 1716–1729 (2004)
Rice, A., Hay, S.: Measuring mobile phone energy consumption for 802.11 wireless networking. Pervasive and Mobile Computing Journal 6(6), 595–606 (2010)
IEEE 802®: local and metropolitan area network standards, http://standards.ieee.org/getieee802/download/802.15.1-2005.pdf
EEE 802®: local and metropolitan area network standards, http://standards.ieee.org/getieee802/download/802.11-2012.pdf
Monk, S.: Getting Started with.NET Gadgeteer. O’Reilly Media (2012)
Navidi, W.: Statistics for engineers and scientists. McGraw-Hill, New York (2011)
Bluetooth Smart. Bluegiga Technologies (2012)
Halperin, D., Greenstein, B., Sheth, A., Wetherall, D.: Demystifying 802.11 n power consumption. In: Proceedings of the 2010 International Conference on Power Aware Computing and Systems. USENIX Association (October 2010)
Venčkauskas, A., Jusas, N., Kazanavičius, E., Štuikys, V.: An energy efficient protocol for the internet of things. Journal of Electrical Engineering, 65(xx), pp. xx–xx (2014) (submitted for publication)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Venčkauskas, A., Jusas, N., Toldinas, J., Kazanavičius, E. (2014). Security Level versus Energy Consumption in Wireless Protocols for Internet of Things. In: Dregvaite, G., Damasevicius, R. (eds) Information and Software Technologies. ICIST 2014. Communications in Computer and Information Science, vol 465. Springer, Cham. https://doi.org/10.1007/978-3-319-11958-8_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-11958-8_34
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11957-1
Online ISBN: 978-3-319-11958-8
eBook Packages: Computer ScienceComputer Science (R0)