114 Hits in 4.4 sec

Research on Security Level Evaluation Method for Cascading Trips Based on WSN

Hui-Qiong Deng, Jie Luo, Kuo-Chi Chang, Qin-Bin Li, Rong-Jin Zheng, Pei-Qiang Li, Pei-Wei Tsai
2021 Wireless Communications and Mobile Computing  
In this paper, an algorithm based on the WSN collection of online data to calculate the corresponding security level of the system is proposed for the cascading trip phenomenon, to achieve the online evaluation  ...  Therefore, in today's era, from the perspective of cascading trips, how to effectively use WSN to analyze and evaluate the security level of the power grid is an important direction for future power development  ...  The mentioned method is security level prediction for cascading trips based on nodal injection power, which later in this paper will be called the SLP method.  ... 
doi:10.1155/2021/6649127 fatcat:lndmm3ekgveinbxj3i2vcwy27u

Research on a Power Grid Cascading Failure Prevention and Control Method considering WSN

Huiqiong Deng, Junyuan Wu, Jie Luo, Renwu Yan, Cheng Zhang, Peiqiang Li, Kuo-Chi Chang, Rongjin Zheng, Daniel G. Costa
2021 Wireless Communications and Mobile Computing  
It is found that compared with traditional monitoring methods, it has better adaptability to complex environments and low cost. It is suitable for monitoring power grid operation parameters.  ...  The practical application of wireless sensor networks (WSNs) in hot fields is summarized.  ...  Acknowledgments This research was financially supported by the Scientific Research Development Foundation of Fujian University of Technology under the grant GY-Z17149, Scientific and Technical Research  ... 
doi:10.1155/2021/9439977 fatcat:xxivmslaynfvfnahgyhwildb6a

Geographic Wormhole Detection in Wireless Sensor Networks

Mehdi Sookhak, Adnan Akhundzada, Alireza Sookhak, Mohammadreza Eslaminejad, Abdullah Gani, Muhammad Khurram Khan, Xiong Li, Xiaomin Wang, Cheng-Yi Xia
2015 PLoS ONE  
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks.  ...  The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet.  ...  [46] enhanced the security of dynamic source routing (DSR) protocol against wormhole attacks based on calculation of round trip time (RTT).  ... 
doi:10.1371/journal.pone.0115324 pmid:25602616 pmcid:PMC4300191 fatcat:y4a3u4ngubhyrawvbz3ldbw7ju

Estimators for Time Synchronization—Survey, Analysis, and Outlook

Henning Puttnies, Peter Danielis, Ali Rehan Sharif, Dirk Timmermann
2020 IoT  
Time (or clock) synchronization is a large and vital field of research, as synchronization is a precondition for many applications.  ...  First, this survey paper introduces the research area of time synchronization and emphasizes its relation to other research areas.  ...  However, the focus of the authors is on protocols and not on research approaches. There is also a special focus on security aspects.  ... 
doi:10.3390/iot1020023 fatcat:4zk4myewhzcy5lja532dptwswy

Adopting MQTT for a multi protocols IoMT system

Bilal Asaad Mubdir, Hassan Mohammed Ali Bayram
2022 International Journal of Power Electronics and Drive Systems (IJPEDS)  
Two different network protocols; a global system for mobile communication (GSM) and Wi-Fi were used to simulate the heath data transfer from the two different geographical locations, using Raspberry Pi  ...  A high percentage of success data packets transfer was recorded within the network framework as it reaches 99.89% with an average round trip time (RTT) of 7.5 milliseconds and a data transfer rate up to  ...  To make it easier for the doctor to follow up the patients' status, curves are generated from the received data stores in the database based on standard fetching methods and opensource libraries from  ... 
doi:10.11591/ijece.v12i1.pp834-844 fatcat:dpgpmccvgrcmrgz7zn4hcfronm

PACR: Position-Aware Protocol for Connectivity Restoration in Mobile Sensor Networks

Rab Nawaz Jadoon, Adnan Anwar Awan, Muhammad Amir Khan, WuYang Zhou, Aqdas Naveed Malik, Claudia Campolo
2020 Wireless Communications and Mobile Computing  
Researchers have developed a lot of algorithms that are capable enough for connectivity problems, but they do not emphasize the loss of coverage.  ...  The concept behind PACR is the same as a person who writes his will before death on a deathbed.  ...  WuYang Zhou because of his continuous encouragement and research guidance throughout this work as a Head (Research Lab).  ... 
doi:10.1155/2020/8859256 fatcat:jcv4jnjurzgh7fx24v2qt237ve

Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts [article]

Haftu Tasew Reda, Adnan Anwar, Abdun Mahmood
2021 arXiv   pre-print
Recently, false data injection (FDI) has become one of the most critical cyberattacks, and appears to be a focal point of interest for both research and industry.  ...  In conclusion, a range of technical limitations of existing false data attack research is identified, and a number of future research directions is recommended.  ...  Detailed comparisons have been highlighted in Table I 4) This paper analyses the various FDI-based adversarial modeling methods and provides statistical facts on the basis of the evaluation criteria  ... 
arXiv:2103.10594v1 fatcat:ovgq6m43nbd4nk32gwdtpuzjve

A Review on Smart Meter System

Patel Umang M, Modi Mitul M
This paper presents a brief literature review of the work carried out by the various researchers in this field by using AMI techniques.  ...  One of the prime reasons is the tradition billing system which is incorrect. Many times slow, costly and lack in flexibility as well as reliability.  ...  As for the energy efficiency issues of smart metering devices, since most smart metering devices adopted wireless communications such as Zig-Bee and Wireless Sensor Network (WSN) based on IEEE802.15.4  ... 
doi:10.17148/ijireeice.2015.31215 fatcat:7ogjq4wplzf57ftl25wklh4p2u

Common Metrics for Analyzing, Developing and Managing Telecommunication Networks [article]

Salman M. Al-Shehri, Pavel Loskot, Tolga Numanoglu, Mehmet Mert
2017 arXiv   pre-print
The most commonly used metrics for telecommunication systems are categorized and presented as energy and power metrics, quality-of-service metrics, quality-of-experience metrics, security metrics, and  ...  Finally, the research directions and recommendations how the metrics can evolve, and be defined and used more effectively are outlined.  ...  The NIST assumes the security metrics for five levels of security.  ... 
arXiv:1707.03290v1 fatcat:il7c4343wvcyphxuqaxrmcmaiu

Physical characteristics of wireless communication channels for secret key establishment: A survey of the research

Mirko Bottarelli, Gregory Epiphaniou, Dhouha Kbaier Ben Ismail, Petros Karadimas, Haider Al-Khateeb
2018 Computers & security  
Reference [12] identifies two families of protocols, specifically based on the received signal strength (RSS) and on the channel impulse response (CIR).  ...  approaches based on nodes' harvesting abilities and the corresponding quantisation characteristics.  ...  For an overview of such methods, readers can refer to [14, Section V]. 85 90 Keyless security is based on the knowledge of the eavesdropper's channel state information which hardly holds in real-world  ... 
doi:10.1016/j.cose.2018.08.001 fatcat:o3omsqut6rhyjhgkofbl2oiyee

Intelligent Transportation and Control Systems Using Data Mining and Machine Learning Techniques: A Comprehensive Study

Nawaf Alsrehin, Ahmad F. Klaib, Aws Magableh
2019 IEEE Access  
It has a direct impact on drawing a clear path for new traffic management propositions.  ...  This study aims to explore and review the data mining and machine learning technologies adopted in research and industry to attempt to overcome the direct and indirect traffic issues on humanity and societies  ...  traffic lights, changes related driving policies and drivers' behavior, and applies essential security controls based on the announced emergency level.  ... 
doi:10.1109/access.2019.2909114 fatcat:k3kbfxezdvhihgg2g76vv5xxqq

Sensors and Actuators in Smart Cities

Mohammad Hammoudeh, Mounir Arioua
2018 Journal of Sensor and Actuator Networks  
Author Contributions: Alex Adim Obinikpo and Burak Kantarci conceived and pursued the literature survey on deep learning techniques on big sensed data for smart health applications, reviewed the state  ...  The authors are grateful to the Middle East University, Amman, Jordan for the financial support granted to cover the publication fee of this research article. Author Contributions: Abdelhamied A.  ...  Based on the 3GPP release 13, the LTE system achieves round trip latency of 16 ms for the 100 Mbps bit rate and 8 ms for 1 Gbps based on release 15 [52, 53] .  ... 
doi:10.3390/jsan7010008 fatcat:pt7nkf4oaraijkmsndohahqtnq

A Survey of Clock Synchronization Over Packet-Switched Networks

Martin Levesque, David Tipper
2016 IEEE Communications Surveys and Tutorials  
Further, security is of significant importance for systems where timing is critical. The security threats and solutions to protect exchanged synchronization messages are also discussed.  ...  This paper surveys the standardized protocols and technologies for providing synchronization of devices connected by packet-switched networks.  ...  Delay Asymmetry The approximated delayd between the master and slave nodes is usually calculated based on the round-trip time (RTT) as follows for a given slave clock k: d = RTT 2 = D m→k + D k→m 2 , (  ... 
doi:10.1109/comst.2016.2590438 fatcat:l3k7qeasrngvxhyk7ws6vqarua

IoT-enabled Smart Energy Grid: Applications and Challenges

S. M. Abu Adnan Abir, Adnan Anwar, Jinho Choi, A. S. M. Kayes
2021 IEEE Access  
Execution of these system control parameters generally depends on the system administrators as the threat level are based on the specification of the system settings.  ...  Researchers proposed a prototype that considers distributed energy resources and ML-based systems as an integrated part of the smart grid system that helps in the complex decision making based on measurement  ... 
doi:10.1109/access.2021.3067331 fatcat:kfwpgepvqfd2xgat5r3rrp75yy

Time synchronization in vehicular ad-hoc networks: A survey on theory and practice

Khondokar Fida Hasan, Charles Wang, Yanming Feng, Yu-Chu Tian
2018 Vehicular Communications  
time synchronization techniques in VANET applications.This paper provides a survey on theory and practice of time synchronization in VANETs.  ...  In vehicular ad-hoc networks (VANETs) for connected andautomated vehicles, network nodes must be synchronized to exchange time-critical vehicle locationsand warning messages for various road safety applications  ...  Acknowledgement This work is supported in part by the Australian Research Council (ARC) under the Discovery Projects Scheme (grant Nos. DP160102571 and DP170103305) to Author Y.-C. Tian.  ... 
doi:10.1016/j.vehcom.2018.09.001 fatcat:dw3lpprwbjabxokvjk2ifnns34
« Previous Showing results 1 — 15 out of 114 results