Click to open the HelpDesk interface
AECE - Front page banner

Menu:


FACTS & FIGURES

JCR Impact Factor: 0.459
JCR 5-Year IF: 0.442
Issues per year: 4
Current issue: Nov 2016
Next issue: Feb 2017
Avg review time: 97 days


PUBLISHER

Stefan cel Mare
University of Suceava
Faculty of Electrical Engineering and
Computer Science
13, Universitatii Street
Suceava - 720229
ROMANIA

Print ISSN: 1582-7445
Online ISSN: 1844-7600
WorldCat: 644266260
doi: 10.4316/AECE


TRAFFIC STATS

1,460,476 unique visits
469,501 downloads
Since November 1, 2009



No robots online now


SJR SCImago RANK

SCImago Journal & Country Rank


SEARCH ENGINES

aece.ro - Google Pagerank




TEXT LINKS

Anycast DNS Hosting
MOST RECENT ISSUES

 Volume 16 (2016)
 
     »   Issue 4 / 2016
 
     »   Issue 3 / 2016
 
     »   Issue 2 / 2016
 
     »   Issue 1 / 2016
 
 
 Volume 15 (2015)
 
     »   Issue 4 / 2015
 
     »   Issue 3 / 2015
 
     »   Issue 2 / 2015
 
     »   Issue 1 / 2015
 
 
 Volume 14 (2014)
 
     »   Issue 4 / 2014
 
     »   Issue 3 / 2014
 
     »   Issue 2 / 2014
 
     »   Issue 1 / 2014
 
 
 Volume 13 (2013)
 
     »   Issue 4 / 2013
 
     »   Issue 3 / 2013
 
     »   Issue 2 / 2013
 
     »   Issue 1 / 2013
 
 
  View all issues  


FEATURED ARTICLE

ABC Algorithm based Fuzzy Modeling of Optical Glucose Detection, SARACOGLU, O. G., BAGIS, A., KONAR, M., TABARU, T. E.
Issue 3/2016

AbstractPlus






LATEST NEWS

2016-Jun-14
Thomson Reuters published the Journal Citations Report for 2015. The JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.459, and the JCR 5-Year Impact Factor is 0.442.

2015-Dec-04
Starting with Issue 2/2016, the article processing charge is 300 EUR for each article accepted for publication. The charge of 25 EUR per page for papers over 8 pages will not be changed. Details are available in the For authors section.

2015-Jun-10
Thomson Reuters published the Journal Citations Report for 2014. The JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.529, and the JCR 5-Year Impact Factor is 0.476.

2015-Feb-09
Starting on the 9th of February 2015, we require all authors to identify themselves, when a submission is made, by entering their SCOPUS Author IDs, instead of the organizations, when available. This information will let us better know the publishing history of the authors and better assign the reviewers on different topics.

2015-Feb-08
We have more than 500 author names on the ban-list for cheating, including plagiarism, false signatures on the copyright form, false E-mail addresses and even tentative to impersonate well-known researchers in order to become a reviewer of our Journal. We maintain a full history of such incidents.

Read More »


    
 

  2/2013 - 4

STFTP: Secure TFTP Protocol for Embedded Multi-Agent Systems Communication

HORVAT, G. See more information about HORVAT, G. on SCOPUS See more information about HORVAT, G. on IEEExplore See more information about HORVAT, G. on Web of Science, ZAGAR, D. See more information about  ZAGAR, D. on SCOPUS See more information about  ZAGAR, D. on SCOPUS See more information about ZAGAR, D. on Web of Science, MARTINOVIC, G. See more information about MARTINOVIC, G. on SCOPUS See more information about MARTINOVIC, G. on SCOPUS See more information about MARTINOVIC, G. on Web of Science
 
Click to see author's profile on See more information about the author on SCOPUS SCOPUS, See more information about the author on IEEE Xplore IEEE Xplore, See more information about the author on Web of Science Web of Science

Download PDF pdficon (929 KB) | Citation | Downloads: 427 | Views: 2,484

Author keywords
software agents, embedded system, telecommunication, multiagent system, security, Secure TFTP, TFTP

References keywords
embedded(12), systems(11), agent(10), design(9), security(8), system(7), link(7), protocol(6), software(5), authentication(5)
Blue keywords are present in both the references section and the paper title.

About this article
Date of Publication: 2013-05-31
Volume 13, Issue 2, Year 2013, On page(s): 23 - 32
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2013.02004
Web of Science Accession Number: 000322179400004
SCOPUS ID: 84878949461

Abstract
Quick view
Full text preview
Today's embedded systems have evolved into multipurpose devices moving towards an embedded multi-agent system (MAS) infrastructure. With the involvement of MAS in embedded systems, one remaining issues is establishing communication between agents in low computational power and low memory embedded systems without present Embedded Operating System (EOS). One solution is the extension of an outdated Trivial File Transfer Protocol (TFTP). The main advantage of using TFTP in embedded systems is the easy implementation. However, the problem at hand is the overall lack of security mechanisms in TFTP. This paper proposes an extension to the existing TFTP in a form of added security mechanisms: STFTP. The authentication is proposed using Digest Access Authentication process whereas the data encryption can be performed by various cryptographic algorithms. The proposal is experimentally tested using two embedded systems based on micro-controller architecture. Communication is analyzed for authentication, data rate and transfer time versus various data encryption ciphers and files sizes. STFTP results in an expected drop in performance, which is in the range of similar encryption algorithms. The system could be improved by using embedded systems of higher computational power or by the use of hardware encryption modules.


References | Cited By  «-- Click to see who has cited this paper

[1] J. Parab, S. A. Shinde, V. G. Shelake, R. K. Kamat, G. M. Naik, "Practical Aspects of Embedded System Design using Microcontrollers", Springer 2008, XXII, 150 p.
[CrossRef] [SCOPUS Record]


[2] J. P. Jamont, M. Occello. "Design of embedded multiagent systems: discussion about some specificities", Proc.of VII Agent-Oriented Software Engineering Technical Forum, Paris, France, 15. Dec. 2010.

[3] J. P. Jamont, M. Occello "Presentation on Design of embedded multiagent systems", VII Agent-Oriented Software Engineering Technical Forum, Paris, France, 15. Dec. 2010

[4] N. Tziritas, T. Loukopoulos, S. Lalis, P. Lampsas, "Agent placement in wireless embedded systems: Memory space and energy optimizations," Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW), 2010 IEEE International Symposium on , vol., no., pp.1-7, 19-23 April 2010
[CrossRef] [SCOPUS Record]


[5] L. Yun, W. Xun, F. Yulian, „Intelligence technology and information processing", Science Press, Beijing, 2003.

[6] M. Xinglu, Q. Yingjie, "Research on Embedded Agent System Architecture," International Conference on Embedded Software and Systems Symposia, 2008. ICESS Symposia '08., pp.142-145, 29-31 July 2008
[CrossRef] [SCOPUS Times Cited 1]


[7] Planning apart together - multi-agent system, [Online] Available: Temporary on-line reference link removed - see the PDF document

[8] R. Tynan, G.M.P. O'Hare, M.J. O'Grady, C. Muldoon, "Virtual Sensor Networks: An Embedded Agent Approach," Parallel and Distributed Processing with Applications, 2008. ISPA '08. International Symposium on, pp.926-932, 10-12 Dec. 2008
[CrossRef] [Web of Science Times Cited 6] [SCOPUS Times Cited 7]


[9] K. Sollins, "The TFTP Protocol (Revision 2)", RFC 1350, July 1992.

[10] G. Horvat, D. Sostaric, Z. Balkic "Cost-effective Ethernet Communication for Low Cost Microcontroller Architecture", International Journal of Electrical and Computer Engineering Systems, Vol 3. No 1, pp.1-8, 2012.

[11] G. Malkin, A. Harkin, "TFTP Option Extension", May 1998.

[12] Shamshirband, S. S., Shirgahi, H., Setayeshi, S., "Designing of Rescue Multi Agent System Based on Soft Computing Techniques," Advances in Electrical and Computer Engineering, vol. 10, no. 1, pp. 79-83, 2010,
[CrossRef] [Full Text] [Web of Science Times Cited 4] [SCOPUS Times Cited 4]


[13] Microchip Technology Inc., [Online] Available: Temporary on-line reference link removed - see the PDF document

[14] P. Kocher, R. Lee, G. McGraw, A. Raghunathan, S. Ravi, "Security as a new dimension in embedded system design," Proc. of. 41st Design Automation Conference, pp.753-760, 7-11 July 2004 [CiteSeerX]

[15] Z., Hengwei; W., Wei; G., Qiang; , "Research and Design of Secure Transmission Protocol Applied to Embedded System," Proc. of (ICICTA), 2012, pp.276-279, 12-14 Jan. 2012
[CrossRef] [SCOPUS Record]


[16] D. V. Bernardo, D. Hoang, "Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API," Emerging Security Information Systems and Technologies (SECURWARE), 2010 Fourth International Conference on , vol., no., pp.266-272, 18-25 July 2010
[CrossRef] [SCOPUS Times Cited 2]


[17] B. Groza, P.-S. Murvay, I. Silea, T. Ionica, "Cryptographic Authentication on the Communication from an 8051 Based Development Board over UDP," Internet Monitoring and Protection, 2008. ICIMP '08. The Third International Conference on, pp.92-97, June 29 2008-July 5 2008
[CrossRef] [SCOPUS Times Cited 3]


[18] Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A. and L. Stewart, "HTTP Authentication: Basic and Digest Access Authentication", RFC 2617, June 1999.

[19] Fanbao Liu; , "On the Security of Digest Access Authentication," Proc. of CSE 2011, pp.427-434, 24-26 Aug. 2011,
[CrossRef] [SCOPUS Times Cited 4]


[20] Metzger, P.; Simpson, W., "IP Authentication using Keyed SHA"," RFC 1852, October 1995

[21] S. Manuel, "Classification and generation of disturbance vectors for collision attacks against SHA-1", In Proc. of Des. Codes Cryptography, 2011, pp.247-263.

[22] Z. Balkic; D. Sostaric and G. Horvat, "GeoHash and UUID Identifier for Multi-Agent Systems", Agent and Multi-Agent Systems. Technologies and Applications, Lecture Notes in Computer Science, , Volume 7327/2012, pp.290-298. Springer, June 2012.
[CrossRef] [SCOPUS Times Cited 2]


[23] Xie, T., Feng, D. "How to find weak input differences for MD5 collision attacks", IACR Cryptology ePrint Archive, Report 2009

[24] David J. Wheeler, Roger M. Needham, "TEA, a Tiny Encryption Algorithm" The Computer Laboratory, Cambridge University, 1994

[25] "Trivial File Transfer Protocol", [Online] Available: Temporary on-line reference link removed - see the PDF document

[26] C. M. Chu-Jenq, "Implementing a Secure Communication Protocol for Embedded Systems", [Online] Available: Temporary on-line reference link removed - see the PDF document

[27] Ali E. Taki El_Deen, Noha A. Hikal, "Microcontroller Application in Cryptography Techniques", Canadian Journal on Electrical and Electronics Engineering Vol. 1, No. 4, June 2010 [CiteSeerX]

[28] M. Pavlin, "Encription using low cost microcontrollers", Proc. of MIDEM - Society for Microelectronics, Electronic Components and Materials, cop. 2006, pp. 189-194

[29] G. Meiser, T. Eisenbarth, K. Lemke-Rust and C. Paar, "Software implementation of eSTREAM profile I ciphers on embedded 8-bit AVR microcontrollers", Workshop Record State of the Art of Stream Ciphers (SASC 07), 2007.

[30] S. Rinne, T. Eisenbarth, C. Paar, "Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers", Horst Gortz Institute for IT Security Ruhr University Bochum Germany, 2007.

[31] Eisenbarth, T.; Kumar, S.; , "A Survey of Lightweight-Cryptography Implementations," Design & Test of Computers, IEEE , vol.24, no.6, pp.522-533, Nov.-Dec. 2007
[CrossRef] [Web of Science Times Cited 64] [SCOPUS Times Cited 118]


[32] Lu Jiqiang, "Related-key rectangle attack on 36 rounds of the XTEA block cipher", International Journal of Information Security, Vol: 8 (1): pp. 1-11, 2009
[CrossRef] [Web of Science Times Cited 10] [SCOPUS Times Cited 22]


[33] A. Bogdanov, D. Khovratovich, C. Rechberger, "Biclique Cryptanalysis of the Full AES". IACR Cryptology ePrint Archive 2011: 449 (2011)

[34] Jiqiang Lu, "Cryptanalysis of Block Ciphers"; Technical Report RHUL-MA-2008-19, Department of Mathematics Royal Holloway, University of London, 2008

[35] C. C. Lu; S. Y. Tseng;, "Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter," Application-Specific Systems, Architectures and Processors, 2002. Proceedings. The IEEE International Conference on, pp. 277- 285, 2002
[CrossRef] [Web of Science Times Cited 12] [SCOPUS Times Cited 55]


[36] Knezevic M., Rozic V., Verbauwhede I., "Design Methods for Embedded Security", TELFOR Journal, Vol.1, No. 2, 2009,

[37] Ambrose, J. A.; Ragel, R. G.; Parameswaran, S.; , "A smart random code injection to mask power analysis based side channel attacks" Proc. of International Conference on Hardware/Software Codesign and System Synthesis 2007 5th, pp.51-56
[CrossRef] [SCOPUS Times Cited 6]


[38] Atmel AVR XMEGA A Manual, [Online] Available: Temporary on-line reference link removed - see the PDF document

[39] El. Equipment Manufacturer: MikroElektronika, [Online] Available: Temporary on-line reference link removed - see the PDF document

[40] Schramm, K.; Paar, C.; , "IT security project: implementation of the Advanced Encryption Standard (AES) on a smart card," Proceedings International Conference on Information Technology: Coding and Computing, 2004., vol.1, pp. 176- 180 Vol.1, 5-7 April 2004
[CrossRef] [Web of Science Record]


[41] Narayan, S.; Kolahi, S.S.; Sunarto, Y.; Nguyen, D.D.T.; Mani, P.; , "The Influence of Wireless 802.11g LAN Encryption Methods on Throughput and Round Trip Time for Various Windows Operating Systems," Proc. of CNSR 2008. 6th Annual, pp.171-175, 5-8 May 2008

[42] A. Murabito, "A comparison of efficiency, throughput, and energy requirements of wireless access points", University of New Hampshire, InterOperability Laboratory, March 2009.

[43] WireShark - Network Protocol Analyzer: [Online] Available: Temporary on-line reference link removed - see the PDF document



References Weight

Web of Science® Citations for all references: 96 TCR
SCOPUS® Citations for all references: 224 TCR

Web of Science® Average Citations per reference: 2 ACR
SCOPUS® Average Citations per reference: 5 ACR

TCR = Total Citations for References / ACR = Average Citations per Reference

We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more

Citations for references updated on 2016-12-01 21:06 in 82 seconds.




Note1: Web of Science® is a registered trademark of Thomson Reuters.
Note2: SCOPUS® is a registered trademark of Elsevier B.V.
Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site.

Copyright ©2001-2016
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania


All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.

Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.

Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.




Website loading speed and performance optimization powered by: