Wireless sensor network based smart grid communications: Cyber attacks, intrusion detection system and topology control

L Chhaya, P Sharma, G Bhagwatikar, A Kumar - Electronics, 2017 - mdpi.com
The existing power grid is going through a massive transformation. Smart grid technology is
a radical approach for improvisation in prevailing power grid. Integration of electrical and …

Connectivity of soft random geometric graphs

MD Penrose - 2016 - projecteuclid.org
Consider a graph on n uniform random points in the unit square, each pair being connected
by an edge with probability p if the inter-point distance is at most r. We show that as n→∞ …

A study of design requirements for mobile learning environments

D Parsons, H Ryu, M Cranshaw - Sixth IEEE International …, 2006 - ieeexplore.ieee.org
This paper proposes a conceptual framework for mobile learning applications that provides
systematic support for mobile learning experience design. It is based on a combination of a …

Cyber-physical power and energy systems with wireless sensor networks: A systematic review

TT Nguyen, F Mohammadi - Journal of Electrical Engineering & …, 2023 - Springer
Power grids are among the primary targets for exploitation by cyber-attacks. Modern power
and energy systems are controlled and monitored by a network of electrical and …

On resilience and connectivity of secure wireless sensor networks under node capture attacks

J Zhao - IEEE Transactions on Information Forensics and …, 2016 - ieeexplore.ieee.org
Despite much research on probabilistic key predistribution schemes for wireless sensor
networks over the past decade, few formal analyses exist that define schemes' resilience to …

-Connectivity in Random Key Graphs With Unreliable Links

J Zhao, O Yağan, V Gligor - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Random key graphs form a class of random intersection graphs that are naturally induced by
the random key predistribution scheme of Eschenauer and Gligor for securing wireless …

Zero-one laws for connectivity in inhomogeneous random key graphs

O Yağan - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
We introduce a new random key predistribution scheme for securing heterogeneous
wireless sensor networks. Each of the n sensors in the network is classified into r classes …

Topological Properties of Secure Wireless Sensor Networks Under the -Composite Key Predistribution Scheme With Unreliable Links

J Zhao - IEEE/ACM Transactions on Networking, 2017 - ieeexplore.ieee.org
Security is an important issue in wireless sensor networks (WSNs), which are often deployed
in hostile environments. The q-composite key predistribution scheme has been recognized …

Connectivity in secure wireless sensor networks under transmission constraints

J Zhao, O Yağan, V Gligor - 2014 52nd Annual Allerton …, 2014 - ieeexplore.ieee.org
In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution
scheme is a widely recognized way to secure communications. Although connectivity …

Toward -Connectivity of the Random Graph Induced by a Pairwise Key Predistribution Scheme With Unreliable Links

F Yavuz, J Zhao, O Yağan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
We study the secure and reliable connectivity of wireless sensor networks. Security is
assumed to be ensured by the random pairwise key predistribution scheme of Chan, Perrig …