메뉴 건너뛰기




Volumn 24, Issue , 2015, Pages 77-90

A survey on energy-aware security mechanisms

Author keywords

Energy aware security; Green networking; Mobile devices; Security

Indexed keywords

MOBILE COMPUTING; NETWORK SECURITY; POWER MANAGEMENT; SURVEYS; MOBILE DEVICES;

EID: 84949088458     PISSN: 15741192     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.pmcj.2015.05.005     Document Type: Article
Times cited : (79)

References (73)
  • 5
    • 84862025419 scopus 로고    scopus 로고
    • An energy-aware dynamic {RWA} framework for next-generation wavelength-routed networks
    • Green communication networks. URL
    • S. Ricciardi, F. Palmieri, U. Fiore, D. Careglio, G. Santos-Boada, and J. Solé-Pareta An energy-aware dynamic {RWA} framework for next-generation wavelength-routed networks Comput. Netw. 56 10 2012 2420 2442 10.1016/j.comnet.2012.03.016 Green communication networks. URL http://www.sciencedirect.com/science/article/pii/S1389128612001156
    • (2012) Comput. Netw. , vol.56 , Issue.10 , pp. 2420-2442
    • Ricciardi, S.1    Palmieri, F.2    Fiore, U.3    Careglio, D.4    Santos-Boada, G.5    Solé-Pareta, J.6
  • 7
    • 79952808548 scopus 로고    scopus 로고
    • Energy efficiency in the future internet: A survey of existing approaches and trends in energy-aware fixed network infrastructures
    • R. Bolla, R. Bruschi, F. Davoli, and F. Cucchietti Energy efficiency in the future internet: A survey of existing approaches and trends in energy-aware fixed network infrastructures IEEE Commun. Surv. Tutor. 13 2 2011 223 244 10.1109/SURV.2011.071410.00073
    • (2011) IEEE Commun. Surv. Tutor. , vol.13 , Issue.2 , pp. 223-244
    • Bolla, R.1    Bruschi, R.2    Davoli, F.3    Cucchietti, F.4
  • 10
    • 85028295216 scopus 로고    scopus 로고
    • Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures
    • Palmieri F.,Ricciardi S.,Fiore U.,Castiglione A.,Ficco M.Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures.Journal of Supercomputing 71(5),2015.pp:1620-1641
    • (2015) Journal of Supercomputing , vol.71 , Issue.5 , pp. 1620-1641
    • Palmieri, F.1    Ricciardi, S.2    Fiore, U.3    Ficco, M.4    Castiglione, A.5
  • 11
    • 80053404893 scopus 로고    scopus 로고
    • A survey on energy-efficient data management
    • J. Wang, L. Feng, W. Xue, and Z. Song A survey on energy-efficient data management SIGMOD Rec. 40 2 2011 17 23 10.1145/2034863.2034867
    • (2011) SIGMOD Rec. , vol.40 , Issue.2 , pp. 17-23
    • Wang, J.1    Feng, L.2    Xue, W.3    Song, Z.4
  • 12
    • 84857778441 scopus 로고    scopus 로고
    • The energy impact of security mechanisms in modern mobile devices
    • L. Caviglione, and A. Merlo The energy impact of security mechanisms in modern mobile devices Netw. Secur. 2012 2 2012 11 14 10.1016/S1353-4858(12)70015-6
    • (2012) Netw. Secur. , vol.2012 , Issue.2 , pp. 11-14
    • Caviglione, L.1    Merlo, A.2
  • 16
    • 80055045001 scopus 로고    scopus 로고
    • Privacy problems with web 2.0
    • L. Caviglione, and M. Coccoli Privacy problems with web 2.0 Comput. Fraud Secur. 2011 10 2011 16 19
    • (2011) Comput. Fraud Secur. , vol.2011 , Issue.10 , pp. 16-19
    • Caviglione, L.1    Coccoli, M.2
  • 17
    • 84873741780 scopus 로고    scopus 로고
    • Energy management techniques in modern mobile handsets
    • N. Vallina-Rodriguez, and J. Crowcroft Energy management techniques in modern mobile handsets IEEE Commun. Surv. Tutor. 15 1 2013 179 198 10.1109/SURV.2012.021312.00045
    • (2013) IEEE Commun. Surv. Tutor. , vol.15 , Issue.1 , pp. 179-198
    • Vallina-Rodriguez, N.1    Crowcroft, J.2
  • 19
    • 84871233143 scopus 로고    scopus 로고
    • Revisiting storage for smartphones
    • H. Kim, N. Agrawal, and C. Ungureanu Revisiting storage for smartphones Trans. Storage 8 4 2012 14:1 14:25 10.1145/2385603.2385607
    • (2012) Trans. Storage , vol.8 , Issue.4 , pp. 141-1425
    • Kim, H.1    Agrawal, N.2    Ungureanu, C.3
  • 21
    • 78149469823 scopus 로고    scopus 로고
    • A survey of energy efficient {MAC} protocols for {IEEE} 802.11 {WLAN}
    • S.-L. Tsao, and C.-H. Huang A survey of energy efficient {MAC} protocols for {IEEE} 802.11 {WLAN} Comput. Commun. 34 1 2011 54 67 10.1016/j.comcom.2010.09.008
    • (2011) Comput. Commun. , vol.34 , Issue.1 , pp. 54-67
    • Tsao, S.-L.1    Huang, C.-H.2
  • 22
    • 77951039985 scopus 로고    scopus 로고
    • Cloud computing for mobile users: Can offloading computation save energy?
    • K. Kumar, and Y.-H. Lu Cloud computing for mobile users: Can offloading computation save energy? Computer 43 4 2010 51 56 10.1109/MC.2010.98
    • (2010) Computer , vol.43 , Issue.4 , pp. 51-56
    • Kumar, K.1    Lu, Y.-H.2
  • 25
    • 35148848283 scopus 로고    scopus 로고
    • Design of a peer-to-peer system for optimized content replication
    • L. Caviglione, and C. Cervellera Design of a peer-to-peer system for optimized content replication Comput. Commun. 30 16 2007 3107 3116 10.1016/j.comcom.2007.05.041
    • (2007) Comput. Commun. , vol.30 , Issue.16 , pp. 3107-3116
    • Caviglione, L.1    Cervellera, C.2
  • 27
    • 47249127725 scopus 로고    scopus 로고
    • The case for energy-proportional computing
    • L.A. Barroso, and U. Hölzle The case for energy-proportional computing Computer 40 12 2007 33 37 10.1109/MC.2007.443
    • (2007) Computer , vol.40 , Issue.12 , pp. 33-37
    • Barroso, L.A.1    Hölzle, U.2
  • 28
    • 80052297709 scopus 로고    scopus 로고
    • Modeling the energy consumption of distributed ids: A step towards green security, in: A
    • MIPRO
    • M. Migliardi, A. Merlo, Modeling the energy consumption of distributed ids: A step towards green security, in: MIPRO, 2011 Proceedings of the 34th International Convention, 2011, pp. 1452-1457.
    • (2011) 2011 Proceedings of the 34th International Convention , pp. 1452-1457
    • Migliardi, M.1    Merlo, A.2
  • 30
    • 84888109639 scopus 로고    scopus 로고
    • Improving energy efficiency in distributed intrusion detection systems
    • M. Migliardi, and A. Merlo Improving energy efficiency in distributed intrusion detection systems J. High Speed Netw. 19 3 2013 251 264 10.3233/JHS-130476
    • (2013) J. High Speed Netw. , vol.19 , Issue.3 , pp. 251-264
    • Migliardi, M.1    Merlo, A.2
  • 38
    • 33750554225 scopus 로고    scopus 로고
    • An experimental study on energy consumption of video encryption for mobile handheld devices
    • ICME 2005
    • K. Lee, N. Dutt, and N. Venkatasubramanian An experimental study on energy consumption of video encryption for mobile handheld devices IEEE International Conference on Multimedia and Expo, 2005 ICME 2005 2005 1424 1427 10.1109/ICME.2005.1521698
    • (2005) IEEE International Conference on Multimedia and Expo, 2005 , pp. 1424-1427
    • Lee, K.1    Dutt, N.2    Venkatasubramanian, N.3
  • 39
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • URL
    • L. Atzori, A. Iera, and G. Morabito The internet of things: A survey Comput. Netw. 54 15 2010 2787 2805 10.1016/j.comnet.2010.05.010 URL http://dx.doi.org/10.1016/j.comnet.2010.05.010
    • (2010) Comput. Netw. , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 41
    • 84873537391 scopus 로고    scopus 로고
    • A defense strategy against energy exhausting attacks in wireless sensor networks
    • URL
    • D. Boubiche, A. Bilami, A defense strategy against energy exhausting attacks in wireless sensor networks, Journal of Emerging Technologies in Web Intelligence, 5 (1) URL http://ojs.academypublisher.com/index.php/jetwi/article/view/jetwi05011827.
    • Journal of Emerging Technologies in Web Intelligence , vol.5 , Issue.1
    • Boubiche, D.1    Bilami, A.2
  • 42
    • 46249119386 scopus 로고    scopus 로고
    • Esecrout: An energy efficient secure routing for sensor networks
    • URL
    • J. Yin, and S.K. Madria Esecrout: An energy efficient secure routing for sensor networks Int. J. Distrib. Sens. Netw. 4 2 2008 67 82 URL http://dx.doi.org/10.1080/15501320802001101
    • (2008) Int. J. Distrib. Sens. Netw. , vol.4 , Issue.2 , pp. 67-82
    • Yin, J.1    Madria, S.K.2
  • 44
    • 84871820851 scopus 로고    scopus 로고
    • Vampire attacks: Draining life from wireless ad hoc sensor networks
    • E. Vasserman, and N. Hopper Vampire attacks: Draining life from wireless ad hoc sensor networks IEEE Trans. Mobile Comput. 12 2 2013 318 332 10.1109/TMC.2011.274
    • (2013) IEEE Trans. Mobile Comput. , vol.12 , Issue.2 , pp. 318-332
    • Vasserman, E.1    Hopper, N.2
  • 49
    • 50049091842 scopus 로고    scopus 로고
    • Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery
    • R. Racic, D. Ma, and H. Chen Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery 2006 Securecomm and Workshops 2006 1 10 10.1109/SECCOMW.2006.359550
    • (2006) 2006 Securecomm and Workshops , pp. 1-10
    • Racic, R.1    Ma, D.2    Chen, H.3
  • 60
    • 84862117123 scopus 로고    scopus 로고
    • Monitoring smartphones for anomaly detection
    • MOBILWARE '08 ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) ICST, Brussels, Belgium, Belgium URL
    • A.-D. Schmidt, F. Peters, F. Lamour, and S. Albayrak Monitoring smartphones for anomaly detection Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications MOBILWARE '08 2007 ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) ICST, Brussels, Belgium, Belgium 40:1 40:6 URL http://dl.acm.org/citation.cfm?id=1361492.1361542
    • (2007) Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications , pp. 401-406
    • Schmidt, A.-D.1    Peters, F.2    Lamour, F.3    Albayrak, S.4
  • 62
  • 67
    • 84869034068 scopus 로고    scopus 로고
    • Appscope: Application energy metering framework for android smartphones using kernel activity monitoring
    • USENIX ATC'12 USENIX Association Berkeley, CA, USA
    • C. Yoon, D. Kim, W. Jung, C. Kang, and H. Cha Appscope: Application energy metering framework for android smartphones using kernel activity monitoring Proceedings of the 2012 USENIX Conference on Annual Technical Conference USENIX ATC'12 2012 USENIX Association Berkeley, CA, USA 36
    • (2012) Proceedings of the 2012 USENIX Conference on Annual Technical Conference , pp. 36
    • Yoon, C.1    Kim, D.2    Jung, W.3    Kang, C.4    Cha, H.5
  • 68
  • 70
    • 84859195111 scopus 로고    scopus 로고
    • Chameleon: A color-adaptive web browser for mobile oled displays
    • M. Dong, and L. Zhong Chameleon: A color-adaptive web browser for mobile oled displays IEEE Trans. Mob. Comput. 11 5 2012 724 738 10.1109/TMC.2012.40
    • (2012) IEEE Trans. Mob. Comput. , vol.11 , Issue.5 , pp. 724-738
    • Dong, M.1    Zhong, L.2
  • 72
    • 84892873906 scopus 로고    scopus 로고
    • A denial of service attack to gsm networks via attach procedure
    • A. Cuzzocrea, C. Kittl, D. Simos, E. Weippl, L. Xu, Lecture Notes in Computer Science Springer Berlin Heidelberg URL
    • N. Gobbo, A. Merlo, and M. Migliardi A denial of service attack to gsm networks via attach procedure A. Cuzzocrea, C. Kittl, D. Simos, E. Weippl, L. Xu, Security Engineering and Intelligence Informatics Lecture Notes in Computer Science vol. 8128 2013 Springer Berlin Heidelberg 361 376 10.1007/978-3-642-40588-4-25 URL http://dx.doi.org/10.1007/978-3-642-40588-4-25
    • (2013) Security Engineering and Intelligence Informatics , vol.8128 , pp. 361-376
    • Gobbo, N.1    Merlo, A.2    Migliardi, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.