The Cloud Begins with Coal, 2013. ,
, 3GPP. Proximity-based Services (ProSe, 2017.
, Service requirements for Machine-Type Communications, 3GPP, 2017.
, Most powerful millimeter-scale energy harvester generates electricity from vibrations, 2011.
Reinforcement Learning: An Introduction, 2018. ,
, Karl Norrman, and Mats Naslund. MIKEY: Multimedia Internet KEYing
Analyzing the energy consumption of security protocols, Proceedings of the 2003 International Symposium on Low Power Electronics and Design, 2003. ISLPED '03, pp.30-35, 2003. ,
The Energy Budget for Wireless Security: Extended Version, IACR Cryptology ePrint Archive, p.1029, 2015. ,
Practical security overview of IEEE 802.15.4, 2016 International Conference on Engineering MIS (ICEMIS), pp.1-9, 2016. ,
Survey on secure communication protocols for the Internet of Things, Ad Hoc Networks, vol.32, pp.17-31, 2015. ,
Transforming e-Government to Smart Government: A South Australian Perspective, Intelligent Computing, Communication and Devices, pp.9-16 ,
, , 2015.
Sensor Networks for Smart Environments, Journal of Telecommunications System & Management, vol.3, pp.1-2, 2014. ,
Smart cities and the future internet: towards cooperation frameworks for open innovation, The Future Internet, pp.431-446, 2011.,
URL : https://hal.archives-ouvertes.fr/hal-00949037
Smart cities and the Internet of Things, 2015 Portland International Conference on Management of Engineering and Technology (PICMET), pp.485-494, 2015. ,
Feasibility Study on Disaster Management with Hybrid Network of LTE and Satellite Links. The Computing Research Repository, 2016. ,
Smart cities: The Singapore case, Cities, vol.16, issue.1, pp.13-18, 1999. ,
Information and communication technology and local governance: understanding the difference between cities in developed and emerging economies. Computers, Environment and Urban Systems, vol.27, pp.585-607, 2003. ,
Effecting social change in the 'smart city': the West End connect community project, Social Change in the 21 st Century, pp.1-16, 2005. ,
A literature survey on smart cities, Science China Information Sciences, vol.58, issue.10, 2015.,
URL : https://hal.archives-ouvertes.fr/hal-01267110
, Evert Meijers, Dipling Christian Fertner, Dipling Dr, and Hans Kramar. City-ranking of European Medium-Sized Cities, 2007.
Developing and validating a citizen-centric typology for smart city services, Government Information Quarterly, vol.31, pp.93-105, 2014. ,
Sensors Used in Structural Health Monitoring, Archives of Computational Methods in Engineering, vol.25, issue.4, pp.901-918, 2018. ,
Energy cost of security in an energy-harvested IEEE 802.15.4 Wireless Sensor Network, 3rd Mediterranean Conference on Embedded Computing (MECO), pp.198-201, 2014. ,
Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT, 2014 IEEE International Conference on Communications (ICC), pp.725-730, 2014. ,
Analyzing energy and time overhead of security mechanisms in Wireless Sensor Networks, 15th International Conference on Systems, Signals and Image Processing, pp.137-140, 2008. ,
On the Energy Cost of Channel Based Key Agreement, Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED '16, pp.31-41, 2016. ,
Energy cost of cryptographic session key establishment in a wireless sensor network, 6th International ICST Conference on Communications and Networking in China (CHINACOM), pp.335-339, 2011. ,
Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks, vol.7886, pp.34-49,
URL : https://hal.archives-ouvertes.fr/hal-01485932
, , 2013.
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp.580-585, 2008. ,
, System improvements for Machine-Type Communications, 3GPP, 2012.
, Proximity-based services (ProSe), 3GPP, 2017.
An Estimation of Sensor Energy Consumption, Progress In Electromagnetics Research, vol.12, pp.259-295, 2009. ,
Modeling of Node Energy Consumption for Wireless Sensor Networks, Wireless Sensor Network, vol.3, issue.1, pp.720-726, 2011. ,
Guide to Bluetooth Security. Special Publication (NIST SP) -800-121 Rev 2, 2017. ,
, , 2019.
Wireless sensor networks powered by ambient energy harvesting (WSN-HEAP) -Survey and challenges, 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology, pp.1-5, 2009. ,
, A review on thermoelectric renewable energy: Principle parameters that affect their performance, Renewable and Sustainable Energy Reviews, vol.30, pp.337-355, 2014.
, Design and analysis of a thermoelectric energy harvesting system for powering sensing nodes in nuclear power plant -Semantic Scholar
Modeling and Simulation of a Piezoelectric Vibration Energy Harvester, Procedia Engineering, vol.144, pp.568-575, 2016. ,
Broadband piezoelectric power generation on highenergy orbits of the bistable Duffing oscillator with electromechanical coupling, Journal of Sound and Vibration, vol.330, issue.10, pp.2339-2353, 2011. ,
Harvesting Wireless Power: Survey of Energy-Harvester Conversion Efficiency in Far-Field, Wireless Power Transfer Systems, IEEE Microwave Magazine, vol.15, issue.4, pp.108-120, 2014. ,
Terminology for Constrained-Node Networks ,
Deep Learning, 2016. ,
An Energy Model for the IoT: Secure Networking Perspective, 2018. ,
A Realistic Power Consumption Model for Wireless Sensor Network Devices, 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, vol.1, pp.286-295, 2006. ,
, Modeling Energy Consumption of Wireless Sensor Networks by SystemC
A novel multi-hop secure LTE-D2d communication protocol for IoT scenarios, 23rd International Conference on Telecommunications (ICT), pp.1-6, 2016. ,
Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity, IEEE Trustcom/BigDataSE/ISPA, vol.1, pp.826-833, 2015. ,
Green-Aware Security: Towards a new Research Field, p.10 ,
Energy-aware secure multicast communication in ad-hoc networks using geographic location information, IEEE International Conference on Acoustics, Speech, and Signal Processing, vol.4, p.201, 2003. ,
DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things, 2015 IEEE International Conference on Consumer Electronics (ICCE), pp.196-197, 2015. ,
An energy-efficient and security aware route selection protocol for wireless sensor networks, vol.7, pp.2015-2038, 2014. ,
SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks, Computer Communications, vol.30, issue.11, pp.2401-2412, 2007. ,
, Energy Consumption of Cryptographic Algorithms in Mobile Devices
Modeling energy-efficient secure communications in multi-mode wireless mobile devices, Journal of Computer and System Sciences, vol.81, issue.8, pp.1464-1478, 2015. ,
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications, 2013 5th International Conference on Intelligent Networking and Collaborative Systems, pp.157-165, 2013. ,
An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications, IEEE Internet of Things Journal, vol.1, issue.1, pp.58-69, 2014. ,
TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network, IEEE Sensors Journal, vol.15, issue.12, pp.6962-6972, 2015. ,
, Energy-efficient mechanisms in security of the internet of things: A survey
, Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks
A Routing Protocol Based on Energy and Link Quality for Internet of Things Applications, Sensors, vol.13, issue.2, pp.1942-1964, 2013. ,
, SCAVENGE-Sustainable Cellular Network Harvesting Ambient Energy. WP2-Energy Models, 2018.
The Power of Models: Modeling Power Consumption for IoT Devices, IEEE Sensors Journal, vol.15, issue.10, pp.5777-5789, 2015. ,
Modeling Energy Consumption of Wireless Sensor Networks by SystemC, 2010 Fifth International Conference on Systems and Networks Communications, pp.94-98, 2010. ,
Security establishment for IoT environments in 5g: Direct MTC-UE communications, IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp.1-5, 2017.,
URL : https://hal.archives-ouvertes.fr/cea-01888850
Simple Traffic Modeling Framework for Machine Type Communication, ISWCS 2013; The Tenth International Symposium on Wireless Communication Systems, pp.1-5, 2013. ,
A study of the energy consumption characteristics of cryptographic algorithms and security protocols, IEEE Transactions on Mobile Computing, vol.5, issue.2, pp.128-143, 2006. ,
Redundant Transmission in Wireless Networked Control System over IEEE 802.15.4e, Proceedings of the 2013 International Conference on Information Networking (ICOIN), ICOIN '13, pp.628-631, 2013. ,
, Cooperative effort based wireless sensor network clustering algorithm for smart home application
CIRF: Constructive interferencebased reliable flooding in asynchronous duty-cycle wireless sensor networks, 2014 IEEE Wireless Communications and Networking Conference (WCNC), pp.2734-2738, 2014. ,
, Ericsson Mobility Report. SectionStartPage, 2019.
Cellular Systems and Infrastructure-Based Wireless Networks, 2005. ,
, Security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements, 3GPP, 2016.
, The Keyed-Hash Message Authentication Code (HMAC), 2008.
Recommendation for block cipher modes of operation: the CMAC mode for authentication, 2016. ,
Recommendation for key derivation using pseudorandom functions (revised), 2009. ,
Automatic verification of correspondences for security protocols*, Journal of Computer Security, vol.17, issue.4, pp.363-434, 2009. ,
LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks, 2013 IEEE Global Communications Conference (GLOBECOM), pp.832-837, 2013. ,
, 3GPP. Proximity-based Services
Measuring the Energy Consumption of Cyber Security, IEEE Communications Magazine, vol.55, issue.7, pp.58-63, 2017. ,
Energy Consumption of Cryptographic Algorithms in Mobile Devices, Elektronika ir Elektrotechnika, vol.20, issue.5, pp.158-161, 2014. ,
, ICT Facts and Figures, 2017.
A survey on ambient energy sources and harvesting methods for structural health monitoring applications, Advances in Mechanical Engineering, vol.9, issue.4, p.168781401769621, 2017. ,
A comprehensive review on vibration energy harvesting: Modelling and realization, Renewable and Sustainable Energy Reviews, vol.74, pp.1-18, 2017. ,
, How Long is the Lifetime of a Wireless Sensor Network, IEEE Conference Publication
, Zigbee Alliance. ZigBee Specification, 2012.
, IEEE 802.15.4-2015 -IEEE Standard for Low-Rate Wireless Networks, 2015.
Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices, ACM Comput. Surv, vol.48, issue.1, 2015. ,
A survey of network anomaly detection techniques, Journal of Network and Computer Applications, vol.60, pp.19-31, 2016. ,
Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality, 2007. ,
Recommendation for Block Cipher Modes of Operation: Methods and Techniques, Technical Report NIST Special Publication (SP), pp.800-838, 2001. ,
Actor-Critic Algorithms, p.7 ,
, Mastering the game of Go without human knowledge | Nature
Playing Atari with Deep Reinforcement Learning, 2013. ,
Policy Gradient Methods for Reinforcement Learning with Function Approximation, Proceedings of the 12th International Conference on Neural Information Processing Systems, NIPS'99, pp.1057-1063, 1999. ,
Adam: A Method for Stochastic Optimization, 2014. ,