Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 24
Page No. 7453 - 7457

Encryption Algorithm Selection to Protect IoT Devices from Local Network Attacking using Analytic Network Process and BCR Model

Authors : Thien Nguyen Phu and Young-Chan Lee

References

Alkady, Y., M.I. Habib and R.Y. Rizk, 2013. A new security protocol using hybrid cryptography algorithms. Proceedings of the 2013 9th International Conference on Computer Engineering Conference, December 28-29, 2013, IEEE, Giza, Egypt, ISBN:978-1-4799-3370-9, pp: 109-115.

Azis, I.J., 2003. Analytic network process with feedback influence: A new approach to impact study. University of Illinois at Urbana-Champaign, Champaign County, Illinois.

Chandra, S., B. Mandal, S.S. Alam and S. Bhattacharyya, 2015. Content based double encryption algorithm using symmetric key cryptography. Procedia Comput. Sci., 57: 1228-1234.
Direct Link  |  

Chandra, S., S. Paira, S.S. Alam and G. Sanyal, 2014. A comparative survey of symmetric and asymmetric key cryptography. Proceedings 2014 International Conference on Electronics, Communication and Computational Engineering, November 17-18, 2014, IEEE, Hosur, India, ISBN:978-1-4799-5748-4, pp: 83-93.

Godse, M., R. Sonar and S. Mulik, 2008. Web service selection based on analytical network process approach. Proceedings of the 2008 IEEE Conference on Asia-Pacific Services Computing, December 9-12, 2008, IEEE, Yilan, Taiwan , ISBN: 978-0-7695-3473-2, pp: 1103-1108.

HPEDLP., 2015. Internet of things research study. Hewlett Packard Enterprise Development LP, Palo Alto, California.

Millet, I. and W.C. Wedley, 2002. Modelling risk and uncertainty with the analytic hierarchy process. J. Multi Criteria Decis. Anal., 11: 97-107.
CrossRef  |  Direct Link  |  

Qing, H.H., L. Lan, W. Jian, K.L. Yong and Z. Lei, 2012. Using analytic network process to analyze influencing factors of project complexity. Proceedings of the 2012 International Conference on Management Science and Engineering, September 20-22, 2012, IEEE, Dallas, Texas, ISBN:978-1-4673-3015-2, pp: 1781-1786.

Rizk, R. and Y. Alkady, 2015. Two-phase hybrid cryptography algorithm for wireless sensor networks. J. Electr. Syst. Inf. Technol., 2: 296-313.
Direct Link  |  

Saaty, T., 1996. Decision Making with Dependence and Feedback: The Analytic Network Process: the Organization and Prioritization of Complexity. 2nd Edn., RWS Publications, Pittsburgh, ISBN: 13-9780962031793, Pages: 370.

Saaty, T.L., 1980. The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation. McGraw-Hill, New York, USA., ISBN-13: 9780070543713, Pages: 287.

Wijnmalen, D.J., 2007. Analysis of benefits, opportunities, costs and risks (BOCR) with the AHP-ANP: A critical validation. Math. Comput. Modell., 46: 892-905.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved