A proportional integral estimator-based clock synchronization protocol for wireless sensor networks

W Yang, M Fu - ISA transactions, 2017 - Elsevier
Clock synchronization is an issue of vital importance in applications of WSNs. This paper
proposes a proportional integral estimator-based protocol (EBP) to achieve clock …

Security vulnerabilities and countermeasures for time synchronization in ieee802. 15.4 e networks

W Yang, Q Wang, Y Wan, J He - 2016 IEEE 3rd International …, 2016 - ieeexplore.ieee.org
Time synchronization is very important in the IEEE802. 15.4 e network which aim to
industrial automation applications. It enabled high end-to-end reliability and low power …

Differentially private maximum consensus

X Wang, J He, P Cheng, J Chen - IFAC-PapersOnLine, 2017 - Elsevier
Maximum consensus refers to all nodes in the network reach to the maximum value of the
initial states through local communication. It has been applied in many domains, such as …

[HTML][HTML] A survey on security and privacy in emerging sensor networks: From viewpoint of close-loop

L Zhang, H Zhang - Sensors, 2016 - mdpi.com
Nowadays, as the next generation sensor networks, Cyber-Physical Systems (CPSs) refer to
the complex networked systems that have both physical subsystems and cyber components …

[HTML][HTML] Reference Broadcast-Based Secure Time Synchronization for Industrial Wireless Sensor Networks

Z Wang, D Sun, C Yu - Applied Sciences, 2023 - mdpi.com
Security is an important factor that cannot be neglected in the design of time synchronization
algorithms since industrial wireless sensor networks are prone to attacks against physical …

Dual time synchronisation method for wireless sensor networks

F Wang, C Yu, X Wu, Y Hu - Electronics Letters, 2015 - Wiley Online Library
Time synchronisation plays an important role in time division multiple access (TDMA)
wireless sensor networks (WSNs). Existing time synchronisation methods suffer from …

Secure consensus against message manipulation attacks in synchronous networks

C Zhao, J He, P Cheng, J Chen - IFAC Proceedings Volumes, 2014 - Elsevier
The security problem of consensus has been attracting increasing research attention for a
large number of application scenarios. Many existing solutions in this aspect rely on the …

Distributed data clustering using mobile agents and EM algorithm

B Safarinejadian, K Hasanpour - IEEE Systems Journal, 2014 - ieeexplore.ieee.org
In this paper, mobile agents are used for density estimation and data clustering in sensor
networks. It has been assumed that sensor measurements can be statistically modeled by a …

Security threats for time synchronization protocols in the internet of things

SK Jha, N Panigrahi, A Gupta - Principles of Internet of Things (IoT) …, 2020 - Springer
Abstract The Internet of Things (IoT) is an emerging field of application includes several
technologies such as the Internet, Wireless Sensor Networks (WSN), Radio Frequency …

Maximum-based consensus and its resiliency

M Nakamura, H Ishii, SM Dibaji - IFAC-PapersOnLine, 2018 - Elsevier
In this paper, we consider the maximum-value based approach towards the resilient
consensus problem. The network consists of agents with unknown identities having faults or …