Survey on sybil attack defense mechanisms in wireless ad hoc networks

A Vasudeva, M Sood - Journal of Network and Computer Applications, 2018 - Elsevier
Wireless ad hoc networks are vulnerable to Sybil attacks due to the broadcast nature of the
wireless medium and an absence of central authority. In a Sybil attack, an adversary …

[HTML][HTML] Overview of time synchronization for IoT deployments: Clock discipline algorithms and protocols

H Yiğitler, B Badihi, R Jäntti - Sensors, 2020 - mdpi.com
Internet of Things (IoT) is expected to change the everyday life of its users by enabling data
exchanges among pervasive things through the Internet. Such a broad aim, however, puts …

Fog computing job scheduling optimization based on bees swarm

S Bitam, S Zeadally, A Mellouk - Enterprise Information Systems, 2018 - Taylor & Francis
Fog computing is a new computing architecture, composed of a set of near-user edge
devices called fog nodes, which collaborate together in order to perform computational …

Quasi-synchronization of heterogeneous dynamic networks via distributed impulsive control: Error estimation, optimization and design

W He, F Qian, J Lam, G Chen, QL Han, J Kurths - Automatica, 2015 - Elsevier
This paper studies leader–follower synchronization in heterogeneous dynamic networks via
distributed impulsive control. The goal is to drive the followers to approximately synchronize …

Consensus-based energy management in smart grid with transmission losses and directed communication

C Zhao, J He, P Cheng, J Chen - IEEE Transactions on smart …, 2016 - ieeexplore.ieee.org
This paper investigates the problem of distributed energy management for both generation
and demand side in smart grid. Different from existing works, we formulate a social welfare …

Leader-following consensus of nonlinear multiagent systems with stochastic sampling

W He, B Zhang, QL Han, F Qian… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
This paper is concerned with sampled-data leader-following consensus of a group of agents
with nonlinear characteristic. A distributed consensus protocol with probabilistic sampling in …

Distributed secure state estimation for cyber–physical systems under sensor attacks

L An, GH Yang - Automatica, 2019 - Elsevier
Cyber–physical systems (CPSs) usually employ distributed sensor networks to gather,
process and exchange information as a team. In contrast to the previous centralized secure …

SnapLoc: An ultra-fast UWB-based indoor localization system for an unlimited number of tags

B Großwindhager, M Stocker, M Rath… - proceedings of the 18th …, 2019 - dl.acm.org
A large body of work has shown that ultra-wideband (UWB) technology enables accurate
indoor localization and tracking thanks to its high time-domain resolution. Existing systems …

Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing

R Deng, R Lu, C Lai, TH Luan - 2015 IEEE international …, 2015 - ieeexplore.ieee.org
Fog computing, characterized by extending cloud computing to the edge of the network, has
recently received considerable attention. The fog is not a substitute but a powerful …