A review of industrial wireless networks in the context of Industry 4.0

X Li, D Li, J Wan, AV Vasilakos, CF Lai, S Wang - Wireless networks, 2017 - Springer
There have been many recent advances in wireless communication technologies,
particularly in the area of wireless sensor networks, which have undergone rapid …

Recent progress in routing protocols of mobile opportunistic networks: A clear taxonomy, analysis and evaluation

P Yuan, L Fan, P Liu, S Tang - Journal of network and computer …, 2016 - Elsevier
Mobile opportunistic networks provide an efficient solution to implement the intensive
perception and ubiquitous interconnection in Internet of Things. Routing selection is one of …

Improved model for the stability analysis of wireless sensor network against malware attacks

RP Ojha, PK Srivastava, G Sanyal, N Gupta - Wireless Personal …, 2021 - Springer
Ensuring security in a communication network is one of the underlying challenges of
wireless sensor network due to critical operational constraints. Wireless sensor network …

ProRec: a unified content caching and replacement framework for mobile edge computing

P Yuan, Y Cai, Y Liu, J Zhang, Y Wang, X Zhao - Wireless Networks, 2020 - Springer
In this paper, we investigate the content deployment problem from precaching and device-to-
device communication perspectives. In the precaching stage, contents are prefetched and …

Pre-vaccination and quarantine approach for defense against worms propagation of malicious objects in wireless sensor networks

RP Ojha, PK Srivastava, G Sanyal - Sensor Technology: Concepts …, 2020 - igi-global.com
Network security poses a challenge to wireless sensor networks (WSNs) achieving its true
potential. It is hard to tackle due to operational constraints of networks. Worms have become …

Environmental sensing: a review of approaches using GPS/GNSS

A Faka, K Tserpes, C Chalkias - GPS and GNSS Technology in …, 2021 - Elsevier
The condition of the environment is a critical factor for the quality of life and the well-being of
humans. Environmental assessment ensures foreseeing and address of potential …

OPPO: An optimal copy allocation scheme in mobile opportunistic networks

P Yuan, C Wang - Peer-to-Peer Networking and Applications, 2018 - Springer
Abstract Mobile Opportunistic Networks (MONs) use the store-carry-and-forward scheme to
transmit packets, so as to deal with the intermittently connected links. This new …

RIM: Relative-importance based data forwarding in people-centric networks

P Yuan, P Liu, S Tang - Journal of Network and Computer Applications, 2016 - Elsevier
The fast penetration of mobile phones has arisen the requirement to share content (eg,
news, photo, music, video clips, etc.) among devices. To improve the efficiency of content …

[HTML][HTML] Epidemiological model for stability analysis of wireless sensor network under malware attack

C Verma, CP Gupta - Journal of Information Technology Management, 2022 - jitm.ut.ac.ir
Malware attack is growing day by day in cyberspace. And Wireless Sensor Network (WSN)
is also facing a hazardous type of situation due to attack of malware (malicious code, virus …

Semi-Markov model for delivery delay prediction in multi-copy opportunistic networks with heterogeneous pairwise encounter rates

GM de Souza Dias, JF de Rezende, RM Salles - Ad Hoc Networks, 2021 - Elsevier
This work proposes an analytical model based on absorbing semi-Markov process for
predicting the expected pairwise delivery delay for single and multi-copy opportunistic …