{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:11:48Z","timestamp":1725804708354},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319119571"},{"type":"electronic","value":"9783319119588"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11958-8_34","type":"book-chapter","created":{"date-parts":[[2014,9,11]],"date-time":"2014-09-11T11:24:40Z","timestamp":1410434680000},"page":"419-429","source":"Crossref","is-referenced-by-count":0,"title":["Security Level versus Energy Consumption in Wireless Protocols for Internet of Things"],"prefix":"10.1007","author":[{"given":"Algimantas","family":"Ven\u010dkauskas","sequence":"first","affiliation":[]},{"given":"Nerijus","family":"Jusas","sequence":"additional","affiliation":[]},{"given":"Jevgenijus","family":"Toldinas","sequence":"additional","affiliation":[]},{"given":"Egidijus","family":"Kazanavi\u010dius","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"Karimi, K., Atkinson, G.: What the Internet of Things (IoT) needs to become a reality, \n                    \n                      http:\/\/www.freescale.com\/files\/32bit\/doc\/white_paper\/INTOTHNGSWP.pdf"},{"volume-title":"The Internet of Things 2012: New Horizons","year":"2012","key":"34_CR2","unstructured":"Smith, I.G. (ed.): The Internet of Things 2012: New Horizons. Halifax, UK (2012)"},{"key":"34_CR3","unstructured":"Overcoming challenges of connecting intelligent nodes to the Internet of Things. Silicon Laboratories, Inc., \n                    \n                      http:\/\/www.silabs.com\/Support%20Documents\/TechnicalDocs\/bringing-the-internet-of-things-to-life.pdf"},{"key":"34_CR4","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"R.H. Webber","year":"2010","unstructured":"Webber, R.H.: Internet of Things \u2013 new security and privacy challenges. Computer Law & Security Review\u00a026, 23\u201330 (2010)","journal-title":"Computer Law & Security Review"},{"issue":"119","key":"34_CR5","first-page":"65","volume":"3","author":"E. Kazanavicius","year":"2012","unstructured":"Kazanavicius, E., Kazanavicius, V., Venckauskas, A., Paskevicius, R.: Securing web application by embedded firewall. Electronics and Electrical Engineering\u00a03(119), 65\u201368 (2012)","journal-title":"Electronics and Electrical Engineering"},{"key":"34_CR6","unstructured":"Gupta, V., Wurm, M.: The energy cost of SSL in Deeply Embedded Systems, Sun Microsystems Inc. Tech. Rep. SMLI TR-2008-173 (2008)"},{"key":"34_CR7","unstructured":"Pastore, M., Emmett, D.: COMPTIA SECURITY+ ST. GUIDE DELUXE. John Wiley & Sons (2006)"},{"key":"34_CR8","unstructured":"Lee, J.S., Su, Y.W., Shen, C.C.: A comparative study of wireless protocols. In: The 33rd Annual Conference on Bluetooth, UWB, ZigBee, and Wi-Fi, IEEE Industrial Electronics Society (IECON), Taiwan, ,pp. 46\u201351 (November 2007)"},{"issue":"7","key":"34_CR9","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1109\/TMC.2012.117","volume":"12","author":"R. Friedman","year":"2013","unstructured":"Friedman, R., Krivolapov, Y.: On Power and Throughput Tradeoffs of WiFi and Bluetooth in Smartphones. IEEE Transactions on Mobile Computing\u00a012(7), 1363\u20131376 (2013)","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"17","key":"34_CR10","doi-asserted-by":"publisher","first-page":"1716","DOI":"10.1016\/j.comcom.2004.05.022","volume":"27","author":"P. Prasithsangaree","year":"2004","unstructured":"Prasithsangaree, P., Krishnamurthy, P.: On a framework for energy-efficient security protocols in wireless networks. Computer Communications\u00a027(17), 1716\u20131729 (2004)","journal-title":"Computer Communications"},{"issue":"6","key":"34_CR11","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1016\/j.pmcj.2010.07.005","volume":"6","author":"A. Rice","year":"2010","unstructured":"Rice, A., Hay, S.: Measuring mobile phone energy consumption for 802.11 wireless networking. Pervasive and Mobile Computing Journal\u00a06(6), 595\u2013606 (2010)","journal-title":"Pervasive and Mobile Computing Journal"},{"key":"34_CR12","unstructured":"IEEE 802\u00ae: local and metropolitan area network standards, \n                    \n                      http:\/\/standards.ieee.org\/getieee802\/download\/802.15.1-2005.pdf"},{"key":"34_CR13","unstructured":"EEE 802\u00ae: local and metropolitan area network standards, \n                    \n                      http:\/\/standards.ieee.org\/getieee802\/download\/802.11-2012.pdf"},{"key":"34_CR14","unstructured":"Monk, S.: Getting Started with.NET Gadgeteer. O\u2019Reilly Media (2012)"},{"key":"34_CR15","volume-title":"Statistics for engineers and scientists","author":"W. Navidi","year":"2011","unstructured":"Navidi, W.: Statistics for engineers and scientists. McGraw-Hill, New York (2011)"},{"key":"34_CR16","unstructured":"Bluetooth Smart. Bluegiga Technologies (2012)"},{"key":"34_CR17","unstructured":"Halperin, D., Greenstein, B., Sheth, A., Wetherall, D.: Demystifying 802.11 n power consumption. In: Proceedings of the 2010 International Conference on Power Aware Computing and Systems. USENIX Association (October 2010)"},{"key":"34_CR18","unstructured":"Ven\u010dkauskas, A., Jusas, N., Kazanavi\u010dius, E., \u0160tuikys, V.: An energy efficient protocol for the internet of things. Journal of Electrical Engineering, 65(xx), pp. xx\u2013xx (2014) (submitted for publication)"}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11958-8_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T21:31:17Z","timestamp":1558992677000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11958-8_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319119571","9783319119588"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11958-8_34","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}