2017
DOI: 10.1007/s12652-017-0546-9
|View full text |Cite
|
Sign up to set email alerts
|

Multi-channel transmission method for improving TCP reliability and transmission efficiency in UNIWAY

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…However, the technology since deployment has been challenged with cybersecurity issues, which have received critical attention from researchers for solution. The cyber problems have been identified as potential attacks, threats and vulnerabilities, thwarting the power provider's efforts to secure power delivery efficiency and reliability of performance [21, 34, 35]. The cause has been to avoid information alteration or destruction, thus to ensure information transmitted remains indisputable and authentic.…”
Section: Wsn and Iots Topology Characteristicsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the technology since deployment has been challenged with cybersecurity issues, which have received critical attention from researchers for solution. The cyber problems have been identified as potential attacks, threats and vulnerabilities, thwarting the power provider's efforts to secure power delivery efficiency and reliability of performance [21, 34, 35]. The cause has been to avoid information alteration or destruction, thus to ensure information transmitted remains indisputable and authentic.…”
Section: Wsn and Iots Topology Characteristicsmentioning
confidence: 99%
“…CPSs primarily consist of three types of components; communication and computing, control and monitoring, equipment and operation. Communication can be wireless or wired, and it can connect CPS to parent systems, such as control centres, or to subordinate components in the physical world [31, 35, 36]. The computation and control configuration are embedded in the intelligence regulation, for sending control commands and receiving the tracking operations.…”
Section: Technical Risk Synthesismentioning
confidence: 99%