[PDF][PDF] Internet of Things in power distribution networks–state of the art

A Janjić, L Velimirović, J Ranitović, Ž Džunić - no. September, 2017 - rcvt.tu-sofia.bg
This paper analyzes the most prominent smart grid functionsfrom the Internet of Things
implementation perspective. A Smart MV/LV substation is proposed as a solution that will …

Cross‐layer technique for boosting base‐station anonymity in wireless sensor networks

S Alsemairi, M Younis - International Journal of Communication …, 2017 - Wiley Online Library
A wireless sensor network (WSN) principally is composed of many sensor nodes and a
single in situ base station (BS), which are randomly distributed in a given area of interest …

Preservation of temporal privacy in body sensor networks

A Diyanat, A Khonsari, H Shafiei - Journal of Network and Computer …, 2017 - Elsevier
Wireless body sensor networks (WBSNs) are being widely adopted as building blocks for
today's medical monitoring systems. These affordable devices can effectively reduce the …

On the parameterized complexity of the edge monitoring problem

J Baste, F Beggas, H Kheddouci, I Sau - Information Processing Letters, 2017 - Elsevier
In a graph G=(V, E), a vertex v∈ V monitors an edge {u, u′}∈ E if {v, u}∈ E and {v, u′}∈
E. Given an n-vertex graph G=(V, E), in which each edge is contained in at least one …

Phantom walkabouts in wireless sensor networks

C Gu, M Bradbury, A Jhumka - … of the Symposium on Applied Computing, 2017 - dl.acm.org
As wireless sensor networks (WSNs) have been applied across a spectrum of application
domains, the problem of source location privacy (SLP) has emerged as a significant issue …

Decomposition and Domination of Some Graphs

F Beggas - 2017 - hal.science
Graph theory is considered as a field exploring a large variety of proof techniques in discrete
mathematics. Thus, the various problems treated in this theory have applications in a lot of …

Security and privacy in wireless networking and mobile crowd sensing

YK Jing - 2017 - search.proquest.com
This thesis study and address:(i) the location spoofing attack in time-of-arrival (TOA)-based
localization systems,(ii) the traffic analysis attack in wireless networks, and (iii) privacy …

[引用][C] SECURITY AND PRIVACY IN WIRELESS

JY KOH - 2017 - NATIONAL UNIVERSITY OF …