Download Now Free registration required
In a smart world, smart objects will play an important role giving users the chance for life-logging in smart environments. However, the limitations of smart devices with regard to memory, resources and computation power bring a variety of security challenges and constraints. One of the most important constraints is the consumed energy. In order to investigate the impact on energy consumption due to critical security attacks, an experimental test-bed was developed including two interconnected users and one smart attacker, who attempts to intercept transmitted messages or destroy the communication channel. Several mitigation factors, such as power control, channel assignment and AES-128 encryption were applied for secure life-logging. Finally, research into the degradation of the consumed energy regarding the described intrusions is presented.
- Format: PDF
- Size: 256.78 KB