Learn More
—The Internet of Things (IoT) is the next wave of innovation that promises to improve and optimize our daily life based on intelligent sensors and smart objects working together. Through Internet Protocol (IP) connectivity, devices can now be connected to the Internet, thus allowing them to be read, controlled, and managed at any time and at any place.(More)
In the near future, the high volume of content together with new emerging and mission critical applications is expected to stress the Internet to such a degree that it will possibly not be able to respond adequately to its new role. This challenge has motivated many groups and research initiatives worldwide to search for structural modifications to the(More)
he Session Initiation Protocol (SIP) is an application-layer signaling protocol defined by the Internet Engineering Task Force (IETF). It is used in particular for setting up voice-over-IP (VoIP) calls, but it may also be applied to such uses as establishing instant messaging sessions. The protocol allows for locating of other SIP-aware entities, and(More)
The General Internet Signaling Transport (GIST) protocol is currently being developed as the base protocol compo-nent in the IETF Next Steps In Signaling (NSIS) protocol stack to support a variety of signaling applications. We present our study on the protocol overhead and performance aspects of GIST. We quantify network-layer protocol overhead and observe(More)
The Internet is facing ever-increasing complexity in the construction , configuration and management of heterogeneous networks. New communication paradigms are undermining its original design principles. The mobile Internet demands a level of optimum that is hard to achieve with a strictly-layered protocol stack. Questioning if layering is still an adequate(More)
— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing key management infrastructures. The benefit of pre-shared based mechanisms is the avoidance or reduction of the cryptographic operations used in public-key based mechanisms. However, so far(More)
This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Helsinki University of Technology's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for(More)
Mobile cloud computing is a new rapidly growing field. In addition to the conventional fashion that mobile clients access cloud services as in the well-known client/server model, existing work has proposed to explore cloud functionalities in another perspective — offloading part of the mobile codes to the cloud for remote execution in order to optimize the(More)