相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Analysis of Energy-Efficient Connected Target Coverage Algorithms for Industrial Wireless Sensor Networks
Guangjie Han et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)
Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of Things
Wei Yang et al.
IET INFORMATION SECURITY (2017)
Robust and Secure Time-Synchronization Against Sybil Attacks for Sensor Networks
Wei Dong et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2015)
Recent Advances in Industrial Wireless Sensor Networks Toward Efficient Management in IoT
Zhengguo Sheng et al.
IEEE ACCESS (2015)
6TISCH: DETERMINISTIC IP-ENABLED INDUSTRIAL INTERNET (OF THINGS)
Diego Dujovne et al.
IEEE COMMUNICATIONS MAGAZINE (2014)
A Realistic Energy Consumption Model for TSCH Networks
Xavier Vilajosana et al.
IEEE SENSORS JOURNAL (2014)
A Reconfigurable Smart Sensor Interface for Industrial WSN in IoT Environment
Qingping Chi et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)
Secure Time Synchronization in Wireless Sensor Networks: A Maximum Consensus-Based Approach
Jianping He et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
εIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks
Kyung-Ah Shim et al.
AD HOC NETWORKS (2013)
SATS: Secure Average-Consensus-Based Time Synchronization in Wireless Sensor Networks
Jianping He et al.
IEEE TRANSACTIONS ON SIGNAL PROCESSING (2013)
Secured flooding time synchronization protocol with moderator
Ding-Jie Huang et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2013)
Time Synchronization Attack in Smart Grid: Impact and Analysis
Zhenghao Zhang et al.
IEEE TRANSACTIONS ON SMART GRID (2013)
OpenWSN: a standards-based low-power wireless development environment
Thomas Watteyne et al.
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2012)
Multi-User Broadcast Authentication in Wireless Sensor Networks
Kui Ren et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2009)
Secure time synchronization in sensor networks
Saurabh Ganeriwal et al.
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2008)