A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Research on Security Level Evaluation Method for Cascading Trips Based on WSN
2021
Wireless Communications and Mobile Computing
In this paper, an algorithm based on the WSN collection of online data to calculate the corresponding security level of the system is proposed for the cascading trip phenomenon, to achieve the online evaluation ...
Therefore, in today's era, from the perspective of cascading trips, how to effectively use WSN to analyze and evaluate the security level of the power grid is an important direction for future power development ...
The mentioned method is security level prediction for cascading trips based on nodal injection power, which later in this paper will be called the SLP method. ...
doi:10.1155/2021/6649127
fatcat:lndmm3ekgveinbxj3i2vcwy27u
Research on a Power Grid Cascading Failure Prevention and Control Method considering WSN
2021
Wireless Communications and Mobile Computing
It is found that compared with traditional monitoring methods, it has better adaptability to complex environments and low cost. It is suitable for monitoring power grid operation parameters. ...
The practical application of wireless sensor networks (WSNs) in hot fields is summarized. ...
Acknowledgments This research was financially supported by the Scientific Research Development Foundation of Fujian University of Technology under the grant GY-Z17149, Scientific and Technical Research ...
doi:10.1155/2021/9439977
fatcat:xxivmslaynfvfnahgyhwildb6a
Geographic Wormhole Detection in Wireless Sensor Networks
2015
PLoS ONE
Wireless sensor networks (WSNs) are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. ...
The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet. ...
[46] enhanced the security of dynamic source routing (DSR) protocol against wormhole attacks based on calculation of round trip time (RTT). ...
doi:10.1371/journal.pone.0115324
pmid:25602616
pmcid:PMC4300191
fatcat:y4a3u4ngubhyrawvbz3ldbw7ju
Estimators for Time Synchronization—Survey, Analysis, and Outlook
2020
IoT
Time (or clock) synchronization is a large and vital field of research, as synchronization is a precondition for many applications. ...
First, this survey paper introduces the research area of time synchronization and emphasizes its relation to other research areas. ...
However, the focus of the authors is on protocols and not on research approaches. There is also a special focus on security aspects. ...
doi:10.3390/iot1020023
fatcat:4zk4myewhzcy5lja532dptwswy
Adopting MQTT for a multi protocols IoMT system
2022
International Journal of Power Electronics and Drive Systems (IJPEDS)
Two different network protocols; a global system for mobile communication (GSM) and Wi-Fi were used to simulate the heath data transfer from the two different geographical locations, using Raspberry Pi ...
A high percentage of success data packets transfer was recorded within the network framework as it reaches 99.89% with an average round trip time (RTT) of 7.5 milliseconds and a data transfer rate up to ...
To make it easier for the doctor to follow up the patients' status, curves are generated from the received data stores in the database based on standard fetching methods and opensource libraries from ...
doi:10.11591/ijece.v12i1.pp834-844
fatcat:dpgpmccvgrcmrgz7zn4hcfronm
PACR: Position-Aware Protocol for Connectivity Restoration in Mobile Sensor Networks
2020
Wireless Communications and Mobile Computing
Researchers have developed a lot of algorithms that are capable enough for connectivity problems, but they do not emphasize the loss of coverage. ...
The concept behind PACR is the same as a person who writes his will before death on a deathbed. ...
WuYang Zhou because of his continuous encouragement and research guidance throughout this work as a Head (Research Lab). ...
doi:10.1155/2020/8859256
fatcat:jcv4jnjurzgh7fx24v2qt237ve
Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts
[article]
2021
arXiv
pre-print
Recently, false data injection (FDI) has become one of the most critical cyberattacks, and appears to be a focal point of interest for both research and industry. ...
In conclusion, a range of technical limitations of existing false data attack research is identified, and a number of future research directions is recommended. ...
Detailed comparisons have been highlighted in Table I 4) This paper analyses the various FDI-based adversarial modeling methods and provides statistical facts on the basis of the evaluation criteria ...
arXiv:2103.10594v1
fatcat:ovgq6m43nbd4nk32gwdtpuzjve
A Review on Smart Meter System
2015
IJIREEICE
This paper presents a brief literature review of the work carried out by the various researchers in this field by using AMI techniques. ...
One of the prime reasons is the tradition billing system which is incorrect. Many times slow, costly and lack in flexibility as well as reliability. ...
As for the energy efficiency issues of smart metering devices, since most smart metering devices adopted wireless communications such as Zig-Bee and Wireless Sensor Network (WSN) based on IEEE802.15.4 ...
doi:10.17148/ijireeice.2015.31215
fatcat:7ogjq4wplzf57ftl25wklh4p2u
Common Metrics for Analyzing, Developing and Managing Telecommunication Networks
[article]
2017
arXiv
pre-print
The most commonly used metrics for telecommunication systems are categorized and presented as energy and power metrics, quality-of-service metrics, quality-of-experience metrics, security metrics, and ...
Finally, the research directions and recommendations how the metrics can evolve, and be defined and used more effectively are outlined. ...
The NIST assumes the security metrics for five levels of security. ...
arXiv:1707.03290v1
fatcat:il7c4343wvcyphxuqaxrmcmaiu
Physical characteristics of wireless communication channels for secret key establishment: A survey of the research
2018
Computers & security
Reference [12] identifies two families of protocols, specifically based on the received signal strength (RSS) and on the channel impulse response (CIR). ...
approaches based on nodes' harvesting abilities and the corresponding quantisation characteristics. ...
For an overview of such methods, readers can refer to [14, Section V]. 85
90
Keyless security is based on the knowledge of the eavesdropper's channel state information
which hardly holds in real-world ...
doi:10.1016/j.cose.2018.08.001
fatcat:o3omsqut6rhyjhgkofbl2oiyee
Intelligent Transportation and Control Systems Using Data Mining and Machine Learning Techniques: A Comprehensive Study
2019
IEEE Access
It has a direct impact on drawing a clear path for new traffic management propositions. ...
This study aims to explore and review the data mining and machine learning technologies adopted in research and industry to attempt to overcome the direct and indirect traffic issues on humanity and societies ...
traffic lights, changes related driving policies and drivers' behavior, and applies essential security controls based on the announced emergency level. ...
doi:10.1109/access.2019.2909114
fatcat:k3kbfxezdvhihgg2g76vv5xxqq
Sensors and Actuators in Smart Cities
2018
Journal of Sensor and Actuator Networks
Author Contributions: Alex Adim Obinikpo and Burak Kantarci conceived and pursued the literature survey on deep learning techniques on big sensed data for smart health applications, reviewed the state ...
The authors are grateful to the Middle East University, Amman, Jordan for the financial support granted to cover the publication fee of this research article. Author Contributions: Abdelhamied A. ...
Based on the 3GPP release 13, the LTE system achieves round trip latency of 16 ms for the 100 Mbps bit rate and 8 ms for 1 Gbps based on release 15 [52, 53] . ...
doi:10.3390/jsan7010008
fatcat:pt7nkf4oaraijkmsndohahqtnq
A Survey of Clock Synchronization Over Packet-Switched Networks
2016
IEEE Communications Surveys and Tutorials
Further, security is of significant importance for systems where timing is critical. The security threats and solutions to protect exchanged synchronization messages are also discussed. ...
This paper surveys the standardized protocols and technologies for providing synchronization of devices connected by packet-switched networks. ...
Delay Asymmetry The approximated delayd between the master and slave nodes is usually calculated based on the round-trip time (RTT) as follows for a given slave clock k: d = RTT 2 = D m→k + D k→m 2 , ( ...
doi:10.1109/comst.2016.2590438
fatcat:l3k7qeasrngvxhyk7ws6vqarua
IoT-enabled Smart Energy Grid: Applications and Challenges
2021
IEEE Access
Execution of these system control parameters generally depends on the system administrators as the threat level are based on the specification of the system settings. ...
Researchers proposed a prototype that considers distributed energy resources and ML-based systems as an integrated part of the smart grid system that helps in the complex decision making based on measurement ...
doi:10.1109/access.2021.3067331
fatcat:kfwpgepvqfd2xgat5r3rrp75yy
Time synchronization in vehicular ad-hoc networks: A survey on theory and practice
2018
Vehicular Communications
time synchronization techniques in VANET applications.This paper provides a survey on theory and practice of time synchronization in VANETs. ...
In vehicular ad-hoc networks (VANETs) for connected andautomated vehicles, network nodes must be synchronized to exchange time-critical vehicle locationsand warning messages for various road safety applications ...
Acknowledgement This work is supported in part by the Australian Research Council (ARC) under the Discovery Projects Scheme (grant Nos. DP160102571 and DP170103305) to Author Y.-C. Tian. ...
doi:10.1016/j.vehcom.2018.09.001
fatcat:dw3lpprwbjabxokvjk2ifnns34
« Previous
Showing results 1 — 15 out of 114 results