Wireless sensor network based smart grid communications: Cyber attacks, intrusion detection system and topology control

L Chhaya, P Sharma, G Bhagwatikar, A Kumar - Electronics, 2017 - mdpi.com
The existing power grid is going through a massive transformation. Smart grid technology is
a radical approach for improvisation in prevailing power grid. Integration of electrical and …

Connectivity of soft random geometric graphs

MD Penrose - 2016 - projecteuclid.org
Consider a graph on n uniform random points in the unit square, each pair being connected
by an edge with probability p if the inter-point distance is at most r. We show that as n→∞ …

A study of design requirements for mobile learning environments

D Parsons, H Ryu, M Cranshaw - Sixth IEEE International …, 2006 - ieeexplore.ieee.org
This paper proposes a conceptual framework for mobile learning applications that provides
systematic support for mobile learning experience design. It is based on a combination of a …

Cyber-physical power and energy systems with wireless sensor networks: A systematic review

TT Nguyen, F Mohammadi - Journal of Electrical Engineering & …, 2023 - Springer
Power grids are among the primary targets for exploitation by cyber-attacks. Modern power
and energy systems are controlled and monitored by a network of electrical and …

Online convex optimization over Erdos-Rényi random networks

J Lei, P Yi, Y Hong, J Chen… - Advances in neural …, 2020 - proceedings.neurips.cc
The work studies how node-to-node communications over an Erd\H {o} sR\'enyi random
network influence distributed online convex optimization, which is vital in solving large-scale …

On connectivity and robustness in random intersection graphs

J Zhao, O Yağan, V Gligor - IEEE Transactions on Automatic …, 2016 - ieeexplore.ieee.org
Random intersection graphs have received much attention recently and been used in a wide
range of applications ranging from key predistribution in wireless sensor networks to …

-Connectivity in Random Key Graphs With Unreliable Links

J Zhao, O Yağan, V Gligor - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Random key graphs form a class of random intersection graphs that are naturally induced by
the random key predistribution scheme of Eschenauer and Gligor for securing wireless …

Zero-one laws for connectivity in inhomogeneous random key graphs

O Yağan - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
We introduce a new random key predistribution scheme for securing heterogeneous
wireless sensor networks. Each of the n sensors in the network is classified into r classes …

Topological Properties of Secure Wireless Sensor Networks Under the -Composite Key Predistribution Scheme With Unreliable Links

J Zhao - IEEE/ACM Transactions on Networking, 2017 - ieeexplore.ieee.org
Security is an important issue in wireless sensor networks (WSNs), which are often deployed
in hostile environments. The q-composite key predistribution scheme has been recognized …

Connectivity in secure wireless sensor networks under transmission constraints

J Zhao, O Yağan, V Gligor - 2014 52nd Annual Allerton …, 2014 - ieeexplore.ieee.org
In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution
scheme is a widely recognized way to secure communications. Although connectivity …