2020 IEEE International Conference on Human-Machine Systems (ICHMS) 2020
DOI: 10.1109/ichms49158.2020.9209541
|View full text |Cite
|
Sign up to set email alerts
|

Invulnerability Analysis of Wireless Sensor Networks based on Cellular Automata

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…In order to better understand the research progress of distributed filtering in the field of LSR, Table 1 compares the existing methods according to six aspects. [27][28][29] As shown in Table 1, the existing methods focus on estimation consensus. However, the optimal (estimation accuracy) is ignored.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to better understand the research progress of distributed filtering in the field of LSR, Table 1 compares the existing methods according to six aspects. [27][28][29] As shown in Table 1, the existing methods focus on estimation consensus. However, the optimal (estimation accuracy) is ignored.…”
Section: Related Workmentioning
confidence: 99%
“…In order to better understand the research progress of distributed filtering in the field of LSR, Table 1 compares the existing methods according to six aspects. 2729…”
Section: Introductionmentioning
confidence: 99%
“…For the reasons listed above, it is considered that emulation workbenches are a good compromise between simulation and testbed, since they reproduce some characteristics intrinsic to hardware problems but guarantee greater repeatability for the production of statistical data. Note that a wireless network workbench may be a suitable option to obtain probabilistic data for NCS design, since the employment of closed mathematical models [ 3 , 4 ] or those based on algorithms [ 2 , 5 ] requires more theoretical knowledge. On the other hand, open simulators such as ns-3 [ 33 ] or proprietary simulators such as Scalable-Networks accessed on 11 September 2021 (specialized solutions) also require prior knowledge.…”
Section: Related Workmentioning
confidence: 99%
“…The most recent research in the WSN literature is concerned with improving the robustness of the network by using, for instance, topology optimization models to help WSN resist cascading failures [ 2 , 3 ], information fusion processes to lower the negative impact of the environment on message routing [ 4 ], and more realistic failure models to analyse the network invulnerability [ 5 ]; etc. However, if the network is used as a communication channel for NCS projects, there are some alternative techniques that guarantee the robustness of the closed-loop system even under, for instance, denial of service in cyber-physical attacks [ 6 , 7 ], network-induced delays [ 8 ], and packet loss, among several other issues [ 9 , 10 , 11 ].…”
Section: Introductionmentioning
confidence: 99%
“…For example, in wireless sensor networks, the limited energy of sensor nodes is an important problem that puzzles its practical application. The energy consumption of sensor networks is mainly concentrated in the mutual communication between nodes, and its communication energy consumption is 2-4 times of the calculated energy consumption [3]. If each node can process the collected information and then spread it, the whole sensor network will have a longer network lifetime.…”
Section: Introductionmentioning
confidence: 99%