Skip to main content

Security Level versus Energy Consumption in Wireless Protocols for Internet of Things

  • Conference paper
Information and Software Technologies (ICIST 2014)

Abstract

The Internet of Things is a rapidly evolving technology, which creates new challenges to security and energy consumption of devices at the various environmental conditions. Wireless communication technologies are one of the bases of IoT. In this paper, we proposed the security requirements of IoT applications to relate with the operating modes of wireless protocols. In addition, we presented the measurement and analysis of energy consumption and data transfer rates of Wi-Fi and Bluetooth protocols, depending on the security requirements of applications and conditions of environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karimi, K., Atkinson, G.: What the Internet of Things (IoT) needs to become a reality, http://www.freescale.com/files/32bit/doc/white_paper/INTOTHNGSWP.pdf

  2. Smith, I.G. (ed.): The Internet of Things 2012: New Horizons. Halifax, UK (2012)

    Google Scholar 

  3. Overcoming challenges of connecting intelligent nodes to the Internet of Things. Silicon Laboratories, Inc., http://www.silabs.com/Support%20Documents/TechnicalDocs/bringing-the-internet-of-things-to-life.pdf

  4. Webber, R.H.: Internet of Things – new security and privacy challenges. Computer Law & Security Review 26, 23–30 (2010)

    Article  Google Scholar 

  5. Kazanavicius, E., Kazanavicius, V., Venckauskas, A., Paskevicius, R.: Securing web application by embedded firewall. Electronics and Electrical Engineering 3(119), 65–68 (2012)

    Google Scholar 

  6. Gupta, V., Wurm, M.: The energy cost of SSL in Deeply Embedded Systems, Sun Microsystems Inc. Tech. Rep. SMLI TR-2008-173 (2008)

    Google Scholar 

  7. Pastore, M., Emmett, D.: COMPTIA SECURITY+ ST. GUIDE DELUXE. John Wiley & Sons (2006)

    Google Scholar 

  8. Lee, J.S., Su, Y.W., Shen, C.C.: A comparative study of wireless protocols. In: The 33rd Annual Conference on Bluetooth, UWB, ZigBee, and Wi-Fi, IEEE Industrial Electronics Society (IECON), Taiwan, ,pp. 46–51 (November 2007)

    Google Scholar 

  9. Friedman, R., Krivolapov, Y.: On Power and Throughput Tradeoffs of WiFi and Bluetooth in Smartphones. IEEE Transactions on Mobile Computing 12(7), 1363–1376 (2013)

    Article  Google Scholar 

  10. Prasithsangaree, P., Krishnamurthy, P.: On a framework for energy-efficient security protocols in wireless networks. Computer Communications 27(17), 1716–1729 (2004)

    Article  Google Scholar 

  11. Rice, A., Hay, S.: Measuring mobile phone energy consumption for 802.11 wireless networking. Pervasive and Mobile Computing Journal 6(6), 595–606 (2010)

    Article  Google Scholar 

  12. IEEE 802®: local and metropolitan area network standards, http://standards.ieee.org/getieee802/download/802.15.1-2005.pdf

  13. EEE 802®: local and metropolitan area network standards, http://standards.ieee.org/getieee802/download/802.11-2012.pdf

  14. Monk, S.: Getting Started with.NET Gadgeteer. O’Reilly Media (2012)

    Google Scholar 

  15. Navidi, W.: Statistics for engineers and scientists. McGraw-Hill, New York (2011)

    Google Scholar 

  16. Bluetooth Smart. Bluegiga Technologies (2012)

    Google Scholar 

  17. Halperin, D., Greenstein, B., Sheth, A., Wetherall, D.: Demystifying 802.11 n power consumption. In: Proceedings of the 2010 International Conference on Power Aware Computing and Systems. USENIX Association (October 2010)

    Google Scholar 

  18. Venčkauskas, A., Jusas, N., Kazanavičius, E., Štuikys, V.: An energy efficient protocol for the internet of things. Journal of Electrical Engineering, 65(xx), pp. xx–xx (2014) (submitted for publication)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Venčkauskas, A., Jusas, N., Toldinas, J., Kazanavičius, E. (2014). Security Level versus Energy Consumption in Wireless Protocols for Internet of Things. In: Dregvaite, G., Damasevicius, R. (eds) Information and Software Technologies. ICIST 2014. Communications in Computer and Information Science, vol 465. Springer, Cham. https://doi.org/10.1007/978-3-319-11958-8_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11958-8_34

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11957-1

  • Online ISBN: 978-3-319-11958-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics