Security Issues and Challenges in Wireless Sensor Networks: A Survey.

YA Bangash, YEA Al-Salhi - IAENG International Journal of …, 2017 - search.ebscohost.com
Abstract Wireless Sensor Networks (WSNs) have facilitated human life in different fields:
medical, engineering, agriculture, environment, traffic, and military. WSNs are extensively …

How to scale exponential backoff: Constant throughput, polylog access attempts, and robustness

MA Bender, JT Fineman, S Gilbert, M Young - Proceedings of the Twenty …, 2016 - SIAM
Randomized exponential backoff is a widely deployed technique for coordinating access to
a shared resource. A good backoff protocol should, arguably, satisfy three natural …

Scaling exponential backoff: constant throughput, polylogarithmic channel-access attempts, and robustness

MA Bender, JT Fineman, S Gilbert… - Journal of the ACM (JACM), 2018 - dl.acm.org
Randomized exponential backoff is a widely deployed technique for coordinating access to
a shared resource. A good backoff protocol should, arguably, satisfy three natural …

A smart micro-grid architecture for resource constrained environments

AVDM Kayem, C Meinel… - 2017 IEEE 31st …, 2017 - ieeexplore.ieee.org
Micro-grids offer a cost-effective approach to providing reliable power supply in isolated and
disadvantaged communities. These communities present a special case where access to …

Ordered and delayed adversaries and how to work against them on a shared channel

M Klonowski, DR Kowalski, J Mirek - Distributed Computing, 2019 - Springer
An execution of a distributed algorithm is often seen as a game between the algorithm and a
conceptual adversary causing specific distractions to the computation. In this work we define …

Security issues and challenges in RFID, wireless sensor network and optical communication networks and solutions

MN Zahid, J Jiang, H Lu, S Rizvi, D Eric… - 2020 IEEE 3rd …, 2020 - ieeexplore.ieee.org
Nowadays, Security is the biggest challenge in communication networks. Well defined
security protocols not only solve the privacy and security issues but also help to reduce the …

On the verification of livelock-freedom and self-stabilization on parameterized rings

A Klinkhamer, A Ebnenasir - ACM Transactions on Computational Logic …, 2019 - dl.acm.org
This article investigates the verification of livelock-freedom and self-stabilization on
parameterized rings consisting of symmetric, constant space, deterministic, and self …

Privacy risks in resource constrained smart micro-grids

PL Ambassa, AVDM Kayem… - 2018 32nd …, 2018 - ieeexplore.ieee.org
In rural/remote areas, resource constrained smart micro-grid (RCSMG) architectures can
offer a cost-effective power management and supply alternative to national power grid …

A Resilient Smart Micro-Grid Architecture for Resource Constrained Environments

AVDM Kayem, C Meinel, SD Wolthusen - Smart Micro-Grid Systems …, 2018 - Springer
Resource constrained smart micro-grid architectures describe a class of smart micro-grid
architectures that handle communications operations over a lossy network and depend on a …

[图书][B] Performing tasks and reaching agreement in distributed systems prone to adversarial crash-failures

J Mirek - 2019 - search.proquest.com
This dissertation tackles several questions in distributed computing and fault-tolerance. It
consists of four main, more or less independent, chapters that all fit into a certain bigger …