Wireless sensor network based smart grid communications: Cyber attacks, intrusion detection system and topology control
L Chhaya, P Sharma, G Bhagwatikar, A Kumar - Electronics, 2017 - mdpi.com
The existing power grid is going through a massive transformation. Smart grid technology is
a radical approach for improvisation in prevailing power grid. Integration of electrical and …
a radical approach for improvisation in prevailing power grid. Integration of electrical and …
Connectivity of soft random geometric graphs
MD Penrose - 2016 - projecteuclid.org
Consider a graph on n uniform random points in the unit square, each pair being connected
by an edge with probability p if the inter-point distance is at most r. We show that as n→∞ …
by an edge with probability p if the inter-point distance is at most r. We show that as n→∞ …
A study of design requirements for mobile learning environments
This paper proposes a conceptual framework for mobile learning applications that provides
systematic support for mobile learning experience design. It is based on a combination of a …
systematic support for mobile learning experience design. It is based on a combination of a …
Cyber-physical power and energy systems with wireless sensor networks: A systematic review
TT Nguyen, F Mohammadi - Journal of Electrical Engineering & …, 2023 - Springer
Power grids are among the primary targets for exploitation by cyber-attacks. Modern power
and energy systems are controlled and monitored by a network of electrical and …
and energy systems are controlled and monitored by a network of electrical and …
On resilience and connectivity of secure wireless sensor networks under node capture attacks
J Zhao - IEEE Transactions on Information Forensics and …, 2016 - ieeexplore.ieee.org
Despite much research on probabilistic key predistribution schemes for wireless sensor
networks over the past decade, few formal analyses exist that define schemes' resilience to …
networks over the past decade, few formal analyses exist that define schemes' resilience to …
-Connectivity in Random Key Graphs With Unreliable Links
Random key graphs form a class of random intersection graphs that are naturally induced by
the random key predistribution scheme of Eschenauer and Gligor for securing wireless …
the random key predistribution scheme of Eschenauer and Gligor for securing wireless …
Zero-one laws for connectivity in inhomogeneous random key graphs
O Yağan - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
We introduce a new random key predistribution scheme for securing heterogeneous
wireless sensor networks. Each of the n sensors in the network is classified into r classes …
wireless sensor networks. Each of the n sensors in the network is classified into r classes …
Topological Properties of Secure Wireless Sensor Networks Under the -Composite Key Predistribution Scheme With Unreliable Links
J Zhao - IEEE/ACM Transactions on Networking, 2017 - ieeexplore.ieee.org
Security is an important issue in wireless sensor networks (WSNs), which are often deployed
in hostile environments. The q-composite key predistribution scheme has been recognized …
in hostile environments. The q-composite key predistribution scheme has been recognized …
Connectivity in secure wireless sensor networks under transmission constraints
In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution
scheme is a widely recognized way to secure communications. Although connectivity …
scheme is a widely recognized way to secure communications. Although connectivity …
Toward -Connectivity of the Random Graph Induced by a Pairwise Key Predistribution Scheme With Unreliable Links
We study the secure and reliable connectivity of wireless sensor networks. Security is
assumed to be ensured by the random pairwise key predistribution scheme of Chan, Perrig …
assumed to be ensured by the random pairwise key predistribution scheme of Chan, Perrig …