{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:36:22Z","timestamp":1761896182289,"version":"3.37.3"},"reference-count":19,"publisher":"SAGE Publications","issue":"11","license":[{"start":{"date-parts":[[2015,11,1]],"date-time":"2015-11-01T00:00:00Z","timestamp":1446336000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,11,1]]},"abstract":"<jats:p> Jini security framework that is being maintained in Apache River project requires roughly 3 sequential tasks in every connection to cope with security threats in communication between clients and servers in the IoT sensor application. These tasks are sequentially proxy preparation, certification of identity and its credential for mutual authentication, and cryptographic operation for session encryption. Since the proxy preparation task is time spent on preparing a secure and trustable stub for both client\/server sides, it is not one of the substantial communication-delay factors. We propose a method of improving proxy preparation reducing service connection delay by completing the preparation of mutual authentication data and session key while on proxy preparation task. Through experiments on a test-bed, we have confirmed that service connection delay time can be reduced by about 2.6 times in proportion to the message sizes through our proposed method. Our work presents an approach to reduce the additional overhead that would be paid for by applying the Jini security framework to the development of sensor application based on Jini IoT. <\/jats:p>","DOI":"10.1155\/2015\/205793","type":"journal-article","created":{"date-parts":[[2015,11,3]],"date-time":"2015-11-03T21:01:54Z","timestamp":1446584514000},"page":"205793","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["Reducing Security Overhead to Enhance Service Delivery in Jini IoT"],"prefix":"10.1177","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9832-6839","authenticated-orcid":false,"given":"Sung-Ki","family":"Kim","sequence":"first","affiliation":[{"name":"School of Mechanical and ICT Convergence Engineering, Sun Moon University, 100 Kalsan-ri, Tangjeong-myeon, Asan-si 336-708, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6555-3464","authenticated-orcid":false,"given":"Byung-Gyu","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sun Moon University, 100 Kalsan-ri, Tangjeong-myeon, Asan-si 336-708, Republic of Korea"}]},{"given":"Byoung-Joon","family":"Min","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Incheon National University, 119 Academy-ro, Yeonsu-gu, Incheon 406-772, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2015,11,3]]},"reference":[{"key":"B1-2015-205793","doi-asserted-by":"publisher","DOI":"10.1145\/1340771.1340774"},{"key":"B2-2015-205793","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/616838"},{"key":"B4-2015-205793","doi-asserted-by":"publisher","DOI":"10.1186\/2192-1962-3-1"},{"key":"B5-2015-205793","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-011-0083-x"},{"key":"B6-2015-205793","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-009-0043-x"},{"key":"B7-2015-205793","doi-asserted-by":"publisher","DOI":"10.1109\/etfa.2010.5641336"},{"key":"B9-2015-205793","unstructured":"de Vos M. P.Integration of WSN with a SOA [M.S. thesis]2009Eindhoven, The NetherlandsDepartment of Mathematical and Computer Science, Eindhoven University of Technology"},{"key":"B10-2015-205793","doi-asserted-by":"publisher","DOI":"10.1109\/etfa.2010.5641336"},{"first-page":"630","volume-title":"Proceedings of the 31st IEEE Conference on Local Computer Networks (LCN '06)","author":"King J.","key":"B11-2015-205793"},{"key":"B12-2015-205793","doi-asserted-by":"publisher","DOI":"10.1145\/306549.306582"},{"key":"B13-2015-205793","doi-asserted-by":"publisher","DOI":"10.1109\/VIMS.2002.1009359"},{"volume-title":"Jini Starter Kit 2.0 Tightens Jini's Security Framework","year":"2003","author":"Sommers F.","key":"B16-2015-205793"},{"volume-title":"Proceedings of the Blackhat Europe","author":"Sch\u00f6nefeld M.","key":"B17-2015-205793"},{"key":"B18-2015-205793","doi-asserted-by":"publisher","DOI":"10.1007\/10722515_16"},{"first-page":"161","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS '01)","author":"Eronen P.","key":"B19-2015-205793"},{"first-page":"276","volume-title":"Proceedings of the 4th International Conference on Electronic Commerce Research (ICECR-4 '01)","author":"Schoch T.","key":"B20-2015-205793"},{"issue":"4","key":"B22-2015-205793","first-page":"29","volume":"3","author":"Chen C.-W.","year":"2012","journal-title":"Journal of Convergence"},{"issue":"2","key":"B23-2015-205793","first-page":"25","volume":"3","author":"Truong T.-T.","year":"2012","journal-title":"Journal of Convergence"},{"key":"B24-2015-205793","doi-asserted-by":"publisher","DOI":"10.3745\/jips.2013.9.2.247"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/205793","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/205793","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/205793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T17:27:52Z","timestamp":1620408472000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/205793"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,1]]},"references-count":19,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2015,11,1]]}},"alternative-id":["10.1155\/2015\/205793"],"URL":"https:\/\/doi.org\/10.1155\/2015\/205793","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,11,1]]}}}