2015
DOI: 10.3390/s150305112
|View full text |Cite
|
Sign up to set email alerts
|

Opportunistic Mobility Support for Resource Constrained Sensor Devices in Smart Cities

Abstract: A multitude of wireless sensor devices and technologies are being developed and deployed in cities all over the world. Sensor applications in city environments may include highly mobile installations that span large areas which necessitates sensor mobility support. This paper presents and validates two mechanisms for supporting sensor mobility between different administrative domains. Firstly, EAP-Swift, an Extensible Authentication Protocol (EAP)-based sensor authentication protocol is proposed that enables l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 31 publications
(54 reference statements)
0
4
0
Order By: Relevance
“…Additional interoperability needs to be provided when nodes want to connect outside of their home network. Granlund et al [19] proposed the use of two mechanisms for enabling secure sensor mobility between different administrative domains. Authors have drawn parallels with EduRoam where academic institutions all over the world are interconnected using the RADIUS [20] Authentication, Authorization and Accounting (AAA) protocol in a tree-like structure.…”
Section: Privacy and Securitymentioning
confidence: 99%
“…Additional interoperability needs to be provided when nodes want to connect outside of their home network. Granlund et al [19] proposed the use of two mechanisms for enabling secure sensor mobility between different administrative domains. Authors have drawn parallels with EduRoam where academic institutions all over the world are interconnected using the RADIUS [20] Authentication, Authorization and Accounting (AAA) protocol in a tree-like structure.…”
Section: Privacy and Securitymentioning
confidence: 99%
“…The signaling messages service times differ from each other because of their functionality and different length. (Granlund et. al., 2015) ∆ There is a dependence of the VHO time on the intensity of VHO requests.…”
Section: Numerical Experimentsmentioning
confidence: 99%
“…Opportunistic communications [ 1 , 2 , 3 , 4 , 5 ] are increasingly considered a promising Smart City enabling communication technology. They are applicable to situations when, for example, the cellular network infrastructure has become inefficient due to too many requests, or when no communication infrastructure is available at all [ 6 , 7 ] .…”
Section: Introductionmentioning
confidence: 99%