Challenges, threats, security issues and new trends of underwater wireless sensor networks

G Yang, L Dai, Z Wei - Sensors, 2018 - mdpi.com
With the advances in technology, there has been an increasing interest from researchers
and industrial institutions in the use of underwater wireless sensor networks (UWSNs) …

Survey on sybil attack defense mechanisms in wireless ad hoc networks

A Vasudeva, M Sood - Journal of Network and Computer Applications, 2018 - Elsevier
Wireless ad hoc networks are vulnerable to Sybil attacks due to the broadcast nature of the
wireless medium and an absence of central authority. In a Sybil attack, an adversary …

Synchronized provable data possession based on blockchain for digital twin

T Li, H Wang, D He, J Yu - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
In the digital twin environment, the fusion data onto physical entities in the physical space
are mapped to multiple virtual spaces for digital modeling and intelligent simulation in …

Blockchain-based secure time protection scheme in IoT

K Fan, S Wang, Y Ren, K Yang, Z Yan… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) has been developed rapidly to make our life easier. In many IoT
applications (eg, smart homes, healthcare, etc.), all the IoT devices should be synchronized …

Overview of time synchronization for IoT deployments: Clock discipline algorithms and protocols

H Yiğitler, B Badihi, R Jäntti - Sensors, 2020 - mdpi.com
Internet of Things (IoT) is expected to change the everyday life of its users by enabling data
exchanges among pervasive things through the Internet. Such a broad aim, however, puts …

E-HIPA: An energy-efficient framework for high-precision multi-target-adaptive device-free localization

J Wang, D Fang, Z Yang, H Jiang… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Device-free localization (DFL), which does not require any devices to be attached to target
(s), has become an appealing technology for many applications, such as intrusion detection …

A blockchain-based clock synchronization scheme in IoT

K Fan, S Sun, Z Yan, Q Pan, H Li, Y Yang - Future Generation Computer …, 2019 - Elsevier
As an important part of new generation of information technology, Internet of Things (IoT),
which is developing rapidly, requires high time accuracy. However, malicious nodes located …

Rapid-flooding time synchronization for large-scale wireless sensor networks

F Shi, X Tuo, SX Yang, J Lu, H Li - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Accurate and fast-convergent time synchronization is very important for wireless sensor
networks. The flooding time synchronization converges fast, but its transmission delay and …

A low power WSNs attack detection and isolation mechanism for critical smart grid applications

GS Dhunna, I Al-Anbagi - IEEE Sensors Journal, 2019 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are effective tools in many smart grid applications such as
remote monitoring, equipment fault diagnostic, wireless advanced metering infrastructure …

Robust and secure time-synchronization against sybil attacks for sensor networks

W Dong, X Liu - IEEE Transactions on Industrial Informatics, 2015 - ieeexplore.ieee.org
Time synchronization is crucial for cyber-physical systems (CPSs), eg, wireless sensor and
actuator networks. Cyber physical security is an important yet challenging problem. In …