2018
DOI: 10.1109/twc.2018.2808520
|View full text |Cite
|
Sign up to set email alerts
|

Access Control for IoT Nodes With Energy and Fidelity Constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 36 publications
0
12
0
Order By: Relevance
“…A proposal for energy constrained devices called Time Division Multiple Access is described in [44]. The schema is well suited for sensors with known communication patterns, such as a repeating communication schedule in which sensors periodically report data.…”
Section: Authorizationmentioning
confidence: 99%
See 2 more Smart Citations
“…A proposal for energy constrained devices called Time Division Multiple Access is described in [44]. The schema is well suited for sensors with known communication patterns, such as a repeating communication schedule in which sensors periodically report data.…”
Section: Authorizationmentioning
confidence: 99%
“…Centralized solutions can be often decentralized by multiplying central elements [14-16, 21, 25, 28, 36, 42, 43], and decentralized proposals can be centralized by limiting the number of security control elements to single node [17,38,45,46,50]. Similarly, some of the research we reviewed [26,30,31,34,36,44,49,52,54,56] cannot be categorized in either category. They work equally well for either architecture without modification and can be seen as complementary extensions for complex security solutions, helping with particular issues (e.g., authentication, auditing, context-awareness).…”
Section: Distribution Versus Centralizationmentioning
confidence: 99%
See 1 more Smart Citation
“…The classic problem of designing efficient lossy compression schemes for sources is gaining increasing interest, supported by the tremendous increase of data generated by the Internet of Things (IoT) [1], [2]. The data size can be significantly decreased by exploiting some of their structures.…”
Section: Introductionmentioning
confidence: 99%
“…Most of the signals of interest such as image, audio, video, and IoT data are compressible [3]- [6]. The key objectives regarding the compression of sparse sources in IoT scenarios are the design of energy-efficient source encoders with low computational complexity, and their performance analysis in terms of operational distortion-rate (ODR) and operational distortion-energy (ODE) in the presence of noise [2], [5]- [8].…”
Section: Introductionmentioning
confidence: 99%