A Framework for Smart Home Services with Secure and QoS-aware Communications
Abstract
Full Text:
PDFReferences
Smart Home Services Research Project. (2011). [Online]. Available:
http://www.smart-home-services.de/
ACX GmbH. (2011) ViciOne Home and Building
Automation. [Online]. Available: http://www.acx-gmbh.de/de/
home-building-automation/index.html
M. A. Zamora-Izquierdo, J. Santa, and A. F. Gomez-Skarmeta, “An
Integral and Networked Home Automation Solution for Indoor Ambient
Intelligence,” IEEE Pervasive Computing, vol. 9, pp. 66–77, October
[Online]. Available: http://dx.doi.org/10.1109/MPRV.2010.20
Smart Home der Bundeswehr Universitaet Muenchen. (2011). [Online].
Available: http://www.unibw.de/eit8 2/forschung/projekte/shfilm/
Smarter Wohnen
R NRW, Fraunhofer IMS, Fraunhofer ISST, HGW.
(2011). [Online]. Available: http://www.smarterwohnennrw.de
Service Centric Home. (2011). [Online]. Available: http://www.sercho.de
IEEE 802.1 Audio/Video Bridging Task Group Home Page. (2011).
[Online]. Available: http://www.ieee802.org/1/pages/avbridges.html
Bannazadeh H. and Leon-Garcia A., “A Distributed Ethernet Traffic
Shaping System,” Local and Metropolitan Area Networks (LANMAN),
17th IEEE Workshop on, May 2010.
Y. Zhang, R. Yu, S. Xie, W. Yao, Y. Xiao, and M. Guizani, “Home
M2M Networks: Architectures, Standards, and QoS Improvement,”
Communications Magazine, IEEE, vol. 49, no. 4, April 2011.
G. McAlpine, “Congestion Control for Switched Ethernet,” High Performance
Interconnects for Distributed Computing, 2005.
N. Ferguson and B. Schneier, “Practical Cryptography,” Wiley Publishing,
Indianapolis, ISBN 0-471-22357-3, 2003.
N. W. Group, “A Stream Cipher Encryption Algorithm ’Arcfour’,”
Internet Engineering Task Force, 1997.
W. Diffie and M. E. Hellman, “New Directions in Cryptography,” In
IEEE Transactions on Information Theory. 22, Nr. 6, 1976.
RSA Security. (1991) Public Key Cryptography Standards Number
: Diffie Hellman Key Agreement Standard. [Online]. Available:
http://www.rsa.com/rsalabs/node.asp?id=2126
N. W. Group, “RFC 2631: Diffie-Hellman Key Agreement Method,”
Internet Engineering Task Force, 1999.
B. Kaliski, RSA Security. (2003) TWIRL and RSA Key Size. [Online].
Available: http://www.rsa.com/rsalabs/node.asp?id=2004
W. Diffie, P. C. V. Oorschot, and M. J. Wiener, “Authentication and
Authenticated Key Exchanges,” Designs, Codes and Cryptography,
vol. 2, no. 2, pp. 107 – 125, 1992.
H. D. B. Preneel, A. Bosselaers, “The Cryptographic Hash Function
RIPEMD-160,” CryptoBytes, Vol. 3, Nr. 2, 1997.
M. Hager, S. Schellenberg, J. Seitz, S. Mann, and G. Schorcht, “Secure
and QoS-aware Communications for Smart Home Services,” in Telecommunications
and Signal Processing (TSP), 2012 35th International
Conference on, july 2012.
G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, “The keccak
reference,” Submission to NIST (Round 3), 2011. [Online]. Available:
http://keccak.noekeon.org/Keccak-reference-3.0.pdf
N. I. for Standards and Technology, “Winner of the cryptographic
hash algorithm competition for sha-3,” 2012. [Online]. Available:
http://www.nist.gov/itl/csd/sha-100212.cfm
Jayadeva, S. Shah, R. Kothari, and S. Chandra, “Debugging ants: How
ants find the shortest route,” in Information, Communications and Signal
Processing (ICICS) 2011 8th International Conference on, dec. 2011.
S. Reinemo, T. Skeie, and M. Wadekar, “Ethernet for high-performance
data centers: On the new ieee datacenter bridging standards,” Micro,
IEEE, vol. 30, no. 4, pp. 42 –51, july-aug. 2010.
W. Noureddine, F. Tobagi, W. Noureddine, and F. Tobagi, “Selective
back-pressure in switched ethernet lans,” in Proceedings of IEEE
GLOBECOM, 1999, pp. 1256–1263.
M. e. a. Alizadeh, “Data center transport mechanisms: Congestion
control theory and ieee standardization,” in Communication, Control,
and Computing, 2008 46th Annual Allerton Conference on, sept. 2008.
W. Jiang, F. Ren, C. Lin, and I. Stojmenovic, “Analysis of backward
congestion notification with delay for enhanced ethernet networks,” in
INFOCOM, 2012 Proceedings IEEE, march 2012, pp. 2961 –2965.
M. Hagen and R. Zarick, “Performance evaluation of dcb’s prioritybased
flow control,” in Network Computing and Applications (NCA),
10th IEEE International Symposium on, aug. 2011, pp. 328 –333.
R. Sofia, “A survey of advanced ethernet forwarding approaches,”
Communications Surveys Tutorials, IEEE, vol. 11, no. 1, quarter 2009.
R. Perlman, “Challenges and Opportunities in the Design of TRILL: A
Routed Layer 2 Technology,” in GLOBECOM Workshops, IEEE, 2009.
K. Miyazaki, K. Nishimura, J. Tanaka, and S. Kotabe, “First-Come First-
Served Routing for the Data Center Network: Low Latency Loop-Free
Routing,” in World Telecommunications Congress (WTC),, march 2012.
D. Allan, J. Farkas, and S. Mansfield, “Intelligent load balancing for
shortest path bridging,” Communications Magazine, IEEE, july 2012.
DOI: http://dx.doi.org/10.11601/ijates.v2i1.14
Refbacks
- There are currently no refbacks.