Click to open the HelpDesk interface
AECE - Front page banner



JCR Impact Factor: 1.102
JCR 5-Year IF: 0.734
Issues per year: 4
Current issue: Nov 2020
Next issue: Feb 2021
Avg review time: 58 days


Stefan cel Mare
University of Suceava
Faculty of Electrical Engineering and
Computer Science
13, Universitatii Street
Suceava - 720229

Print ISSN: 1582-7445
Online ISSN: 1844-7600
WorldCat: 643243560
doi: 10.4316/AECE


2,748,270 unique visits
Since November 1, 2009

Robots online now


SCImago Journal & Country Rank


Anycast DNS Hosting

 Volume 20 (2020)
     »   Issue 4 / 2020
     »   Issue 3 / 2020
     »   Issue 2 / 2020
     »   Issue 1 / 2020
 Volume 19 (2019)
     »   Issue 4 / 2019
     »   Issue 3 / 2019
     »   Issue 2 / 2019
     »   Issue 1 / 2019
 Volume 18 (2018)
     »   Issue 4 / 2018
     »   Issue 3 / 2018
     »   Issue 2 / 2018
     »   Issue 1 / 2018
 Volume 17 (2017)
     »   Issue 4 / 2017
     »   Issue 3 / 2017
     »   Issue 2 / 2017
     »   Issue 1 / 2017
 Volume 16 (2016)
     »   Issue 4 / 2016
     »   Issue 3 / 2016
     »   Issue 2 / 2016
     »   Issue 1 / 2016
  View all issues  


A Fuzzy AHP Approach for Security Risk Assessment in SCADA Networks, MARKOVIC-PETROVIC, J. D., STOJANOVIC, M. D., BOSTJANCIC RAKAS, S. V.
Issue 3/2019


A New Approach for Estimating Insulation Condition of Field Transformers Using FRA, MOHD YOUSOF, M. F., AL-AMERI, S., AHMAD, H., ILLIAS, H. A., ARSHAD, S. N. M.
Issue 1/2020


Single-Phase Direct Boost AC-AC Converter, URSARU, O., LUCANU, M., AGHION, C., LUCANU, N.
Issue 4/2017


Real-Time Scheduling for Preventing Information Leakage with Preemption Overheads, BAEK, H., LEE, J., LEE, J., KIM, P., KANG, B. B.
Issue 2/2017


A Brief Review on the Validity and Reliability of Microsoft Kinect Sensors for Functional Assessment Applications, DIAZ-MONTERROSAS, P. R., POSADA-GOMEZ, R., MARTINEZ-SIBAJA, A., AGUILAR-LASSERRE, A. A., JUAREZ-MARTINEZ, U., TRUJILLO-CABALLERO, J. C.
Issue 1/2018


Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data, SMITHAMOL, M. B., RAJESWARI, S.
Issue 2/2017



Clarivate Analytics published the InCites Journal Citations Report for 2019. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 1.102 (1.023 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.734.

Starting on the 15th of June 2020 we wiil introduce a new policy for reviewers. Reviewers who provide timely and substantial comments will receive a discount voucher entitling them to an APC reduction. Vouchers (worth of 25 EUR or 50 EUR, depending on the review quality) will be assigned to reviewers after the final decision of the reviewed paper is given. Vouchers issued to specific individuals are not transferable.

Starting on the 15th of December 2019 all paper authors are required to enter their SCOPUS IDs. You may use the free SCOPUS ID lookup form to find yours in case you don't remember it.

Clarivate Analytics published the InCites Journal Citations Report for 2018. The JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.650, and the JCR 5-Year Impact Factor is 0.639.

Starting today, the minimum number a pages for a paper is 8, so all submitted papers should have 8, 10 or 12 pages. No exceptions will be accepted.

Read More »


  2/2013 - 4


STFTP: Secure TFTP Protocol for Embedded Multi-Agent Systems Communication

HORVAT, G. See more information about HORVAT, G. on SCOPUS See more information about HORVAT, G. on IEEExplore See more information about HORVAT, G. on Web of Science, ZAGAR, D. See more information about  ZAGAR, D. on SCOPUS See more information about  ZAGAR, D. on SCOPUS See more information about ZAGAR, D. on Web of Science, MARTINOVIC, G. See more information about MARTINOVIC, G. on SCOPUS See more information about MARTINOVIC, G. on SCOPUS See more information about MARTINOVIC, G. on Web of Science
Click to see author's profile in See more information about the author on SCOPUS SCOPUS, See more information about the author on IEEE Xplore IEEE Xplore, See more information about the author on Web of Science Web of Science

Download PDF pdficon (929 KB) | Citation | Downloads: 681 | Views: 4,765

Author keywords
software agents, embedded system, telecommunication, multiagent system, security, Secure TFTP, TFTP

References keywords
embedded(12), systems(11), agent(10), design(9), security(8), system(7), link(7), protocol(6), software(5), authentication(5)
Blue keywords are present in both the references section and the paper title.

About this article
Date of Publication: 2013-05-31
Volume 13, Issue 2, Year 2013, On page(s): 23 - 32
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2013.02004
Web of Science Accession Number: 000322179400004
SCOPUS ID: 84878949461

Quick view
Full text preview
Today's embedded systems have evolved into multipurpose devices moving towards an embedded multi-agent system (MAS) infrastructure. With the involvement of MAS in embedded systems, one remaining issues is establishing communication between agents in low computational power and low memory embedded systems without present Embedded Operating System (EOS). One solution is the extension of an outdated Trivial File Transfer Protocol (TFTP). The main advantage of using TFTP in embedded systems is the easy implementation. However, the problem at hand is the overall lack of security mechanisms in TFTP. This paper proposes an extension to the existing TFTP in a form of added security mechanisms: STFTP. The authentication is proposed using Digest Access Authentication process whereas the data encryption can be performed by various cryptographic algorithms. The proposal is experimentally tested using two embedded systems based on micro-controller architecture. Communication is analyzed for authentication, data rate and transfer time versus various data encryption ciphers and files sizes. STFTP results in an expected drop in performance, which is in the range of similar encryption algorithms. The system could be improved by using embedded systems of higher computational power or by the use of hardware encryption modules.

References | Cited By  «-- Click to see who has cited this paper

[1] J. Parab, S. A. Shinde, V. G. Shelake, R. K. Kamat, G. M. Naik, "Practical Aspects of Embedded System Design using Microcontrollers", Springer 2008, XXII, 150 p.
[CrossRef] [SCOPUS Times Cited 5]

[2] J. P. Jamont, M. Occello. "Design of embedded multiagent systems: discussion about some specificities", Proc.of VII Agent-Oriented Software Engineering Technical Forum, Paris, France, 15. Dec. 2010.

[3] J. P. Jamont, M. Occello "Presentation on Design of embedded multiagent systems", VII Agent-Oriented Software Engineering Technical Forum, Paris, France, 15. Dec. 2010

[4] N. Tziritas, T. Loukopoulos, S. Lalis, P. Lampsas, "Agent placement in wireless embedded systems: Memory space and energy optimizations," Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), 2010 IEEE International Symposium on , vol., no., pp.1-7, 19-23 April 2010
[CrossRef] [SCOPUS Times Cited 9]

[5] L. Yun, W. Xun, F. Yulian, „Intelligence technology and information processing", Science Press, Beijing, 2003.

[6] M. Xinglu, Q. Yingjie, "Research on Embedded Agent System Architecture," International Conference on Embedded Software and Systems Symposia, 2008. ICESS Symposia '08., pp.142-145, 29-31 July 2008
[CrossRef] [SCOPUS Times Cited 3]

[7] Planning apart together - multi-agent system, [Online] Available: Temporary on-line reference link removed - see the PDF document

[8] R. Tynan, G.M.P. O'Hare, M.J. O'Grady, C. Muldoon, "Virtual Sensor Networks: An Embedded Agent Approach," Parallel and Distributed Processing with Applications, 2008. ISPA '08. International Symposium on, pp.926-932, 10-12 Dec. 2008
[CrossRef] [Web of Science Times Cited 8] [SCOPUS Times Cited 13]

[9] K. Sollins, "The TFTP Protocol (Revision 2)", RFC 1350, July 1992.

[10] G. Horvat, D. Sostaric, Z. Balkic "Cost-effective Ethernet Communication for Low Cost Microcontroller Architecture", International Journal of Electrical and Computer Engineering Systems, Vol 3. No 1, pp.1-8, 2012.

[11] G. Malkin, A. Harkin, "TFTP Option Extension", May 1998.

[12] Shamshirband, S. S., Shirgahi, H., Setayeshi, S., "Designing of Rescue Multi Agent System Based on Soft Computing Techniques," Advances in Electrical and Computer Engineering, vol. 10, no. 1, pp. 79-83, 2010,
[CrossRef] [Full Text] [Web of Science Times Cited 4] [SCOPUS Times Cited 5]

[13] Microchip Technology Inc., [Online] Available: Temporary on-line reference link removed - see the PDF document

[14] P. Kocher, R. Lee, G. McGraw, A. Raghunathan, S. Ravi, "Security as a new dimension in embedded system design," Proc. of. 41st Design Automation Conference, pp.753-760, 7-11 July 2004 [CiteSeerX]

[15] Z., Hengwei; W., Wei; G., Qiang; , "Research and Design of Secure Transmission Protocol Applied to Embedded System," Proc. of (ICICTA), 2012, pp.276-279, 12-14 Jan. 2012
[CrossRef] [SCOPUS Record]

[16] D. V. Bernardo, D. Hoang, "Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API," Emerging Security Information Systems and Technologies (SECURWARE), 2010 Fourth International Conference on , vol., no., pp.266-272, 18-25 July 2010
[CrossRef] [SCOPUS Times Cited 7]

[17] B. Groza, P.-S. Murvay, I. Silea, T. Ionica, "Cryptographic Authentication on the Communication from an 8051 Based Development Board over UDP," Internet Monitoring and Protection, 2008. ICIMP '08. The Third International Conference on, pp.92-97, June 29 2008-July 5 2008
[CrossRef] [SCOPUS Times Cited 3]

[18] Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A. and L. Stewart, "HTTP Authentication: Basic and Digest Access Authentication", RFC 2617, June 1999.

[19] Fanbao Liu; , "On the Security of Digest Access Authentication," Proc. of CSE 2011, pp.427-434, 24-26 Aug. 2011,
[CrossRef] [SCOPUS Times Cited 9]

[20] Metzger, P.; Simpson, W., "IP Authentication using Keyed SHA"," RFC 1852, October 1995

[21] S. Manuel, "Classification and generation of disturbance vectors for collision attacks against SHA-1", In Proc. of Des. Codes Cryptography, 2011, pp.247-263.

[22] Z. Balkic; D. Sostaric and G. Horvat, "GeoHash and UUID Identifier for Multi-Agent Systems", Agent and Multi-Agent Systems. Technologies and Applications, Lecture Notes in Computer Science, , Volume 7327/2012, pp.290-298. Springer, June 2012.
[CrossRef] [SCOPUS Times Cited 28]

[23] Xie, T., Feng, D. "How to find weak input differences for MD5 collision attacks", IACR Cryptology ePrint Archive, Report 2009

[24] David J. Wheeler, Roger M. Needham, "TEA, a Tiny Encryption Algorithm" The Computer Laboratory, Cambridge University, 1994

[25] "Trivial File Transfer Protocol", [Online] Available: Temporary on-line reference link removed - see the PDF document

[26] C. M. Chu-Jenq, "Implementing a Secure Communication Protocol for Embedded Systems", [Online] Available: Temporary on-line reference link removed - see the PDF document

[27] Ali E. Taki El_Deen, Noha A. Hikal, "Microcontroller Application in Cryptography Techniques", Canadian Journal on Electrical and Electronics Engineering Vol. 1, No. 4, June 2010 [CiteSeerX]

[28] M. Pavlin, "Encription using low cost microcontrollers", Proc. of MIDEM - Society for Microelectronics, Electronic Components and Materials, cop. 2006, pp. 189-194

[29] G. Meiser, T. Eisenbarth, K. Lemke-Rust and C. Paar, "Software implementation of eSTREAM profile I ciphers on embedded 8-bit AVR microcontrollers", Workshop Record State of the Art of Stream Ciphers (SASC 07), 2007.

[30] S. Rinne, T. Eisenbarth, C. Paar, "Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers", Horst Gortz Institute for IT Security Ruhr University Bochum Germany, 2007.

[31] Eisenbarth, T.; Kumar, S.; , "A Survey of Lightweight-Cryptography Implementations," Design & Test of Computers, IEEE , vol.24, no.6, pp.522-533, Nov.-Dec. 2007
[CrossRef] [Web of Science Times Cited 188] [SCOPUS Times Cited 293]

[32] Lu Jiqiang, "Related-key rectangle attack on 36 rounds of the XTEA block cipher", International Journal of Information Security, Vol: 8 (1): pp. 1-11, 2009
[CrossRef] [Web of Science Times Cited 22] [SCOPUS Times Cited 34]

[33] A. Bogdanov, D. Khovratovich, C. Rechberger, "Biclique Cryptanalysis of the Full AES". IACR Cryptology ePrint Archive 2011: 449 (2011)

[34] Jiqiang Lu, "Cryptanalysis of Block Ciphers"; Technical Report RHUL-MA-2008-19, Department of Mathematics Royal Holloway, University of London, 2008

[35] C. C. Lu; S. Y. Tseng;, "Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter," Application-Specific Systems, Architectures and Processors, 2002. Proceedings. The IEEE International Conference on, pp. 277- 285, 2002
[CrossRef] [Web of Science Times Cited 59] [SCOPUS Times Cited 91]

[36] Knezevic M., Rozic V., Verbauwhede I., "Design Methods for Embedded Security", TELFOR Journal, Vol.1, No. 2, 2009,

[37] Ambrose, J. A.; Ragel, R. G.; Parameswaran, S.; , "A smart random code injection to mask power analysis based side channel attacks" Proc. of International Conference on Hardware/Software Codesign and System Synthesis 2007 5th, pp.51-56
[CrossRef] [SCOPUS Times Cited 13]

[38] Atmel AVR XMEGA A Manual, [Online] Available: Temporary on-line reference link removed - see the PDF document

[39] El. Equipment Manufacturer: MikroElektronika, [Online] Available: Temporary on-line reference link removed - see the PDF document

[40] Schramm, K.; Paar, C.; , "IT security project: implementation of the Advanced Encryption Standard (AES) on a smart card," Proceedings International Conference on Information Technology: Coding and Computing, 2004., vol.1, pp. 176- 180 Vol.1, 5-7 April 2004
[CrossRef] [Web of Science Times Cited 4] [SCOPUS Times Cited 6]

[41] Narayan, S.; Kolahi, S.S.; Sunarto, Y.; Nguyen, D.D.T.; Mani, P.; , "The Influence of Wireless 802.11g LAN Encryption Methods on Throughput and Round Trip Time for Various Windows Operating Systems," Proc. of CNSR 2008. 6th Annual, pp.171-175, 5-8 May 2008

[42] A. Murabito, "A comparison of efficiency, throughput, and energy requirements of wireless access points", University of New Hampshire, InterOperability Laboratory, March 2009.

[43] WireShark - Network Protocol Analyzer: [Online] Available: Temporary on-line reference link removed - see the PDF document

References Weight

Web of Science® Citations for all references: 285 TCR
SCOPUS® Citations for all references: 519 TCR

Web of Science® Average Citations per reference: 6 ACR
SCOPUS® Average Citations per reference: 12 ACR

TCR = Total Citations for References / ACR = Average Citations per Reference

We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more

Citations for references updated on 2021-01-26 20:45 in 106 seconds.

Note1: Web of Science® is a registered trademark of Clarivate Analytics.
Note2: SCOPUS® is a registered trademark of Elsevier B.V.
Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site.

Copyright ©2001-2021
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania

All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.

Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.

Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.

Website loading speed and performance optimization powered by: