A Vasudeva, M Sood - Journal of Network and Computer Applications, 2018 - Elsevier
Wireless ad hoc networks are vulnerable to Sybil attacks due to the broadcast nature of the wireless medium and an absence of central authority. In a Sybil attack, an adversary …
T Li, H Wang, D He, J Yu - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
In the digital twin environment, the fusion data onto physical entities in the physical space are mapped to multiple virtual spaces for digital modeling and intelligent simulation in …
Internet of Things (IoT) has been developed rapidly to make our life easier. In many IoT applications (eg, smart homes, healthcare, etc.), all the IoT devices should be synchronized …
Internet of Things (IoT) is expected to change the everyday life of its users by enabling data exchanges among pervasive things through the Internet. Such a broad aim, however, puts …
J Wang, D Fang, Z Yang, H Jiang… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Device-free localization (DFL), which does not require any devices to be attached to target (s), has become an appealing technology for many applications, such as intrusion detection …
K Fan, S Sun, Z Yan, Q Pan, H Li, Y Yang - Future Generation Computer …, 2019 - Elsevier
As an important part of new generation of information technology, Internet of Things (IoT), which is developing rapidly, requires high time accuracy. However, malicious nodes located …
F Shi, X Tuo, SX Yang, J Lu, H Li - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Accurate and fast-convergent time synchronization is very important for wireless sensor networks. The flooding time synchronization converges fast, but its transmission delay and …
Wireless sensor networks (WSNs) are effective tools in many smart grid applications such as remote monitoring, equipment fault diagnostic, wireless advanced metering infrastructure …
W Dong, X Liu - IEEE Transactions on Industrial Informatics, 2015 - ieeexplore.ieee.org
Time synchronization is crucial for cyber-physical systems (CPSs), eg, wireless sensor and actuator networks. Cyber physical security is an important yet challenging problem. In …