Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks
نویسندگان
چکیده
منابع مشابه
Wireless Security: Vulnerabilities and Countermeasures
The panel session will cover current issues and problems in wireless security and approaches to dealing with them.
متن کاملRFID Technology, Security Vulnerabilities, and Countermeasures
Radio frequency identification (RFID) is a means of automatic identification that uses radio waves to detect, track, identify, and thus manage a variety of objects. The purpose of an RFID system is transmitting data from a portable device, called a tag, to an RFID reader to execute a particular application based on the tag provided identification or location information (Graafstra, 2006; O' Bri...
متن کاملAdaptive synchronization in multi-hop TSCH networks
Time Slotted Channel Hopping (TSCH) enables highly reliable and ultra-low power wireless networking, and is at the heart of multiple industrial standards. It has become the de facto standard for industrial low-power wireless solutions, and a true enabler for the Industrial Internet of Things. In a TSCH network, all nodes remain tightly synchronized by periodically communicating with one another...
متن کاملSynchronization for Complex Dynamic Networks with State and Coupling Time-Delays
This paper is concerned with the problem of synchronization for complex dynamic networks with state and coupling time-delays. Therefore, larger class and more complicated complex dynamic networks can be considered for the synchronization problem. Based on the Lyapunov-Krasovskii functional, a delay-independent criterion is obtained and formulated in the form of linear matrix inequalities (LMIs)...
متن کاملSecurity Vulnerabilities in Ad Hoc Networks
Mobile ad hoc networks have inherently different properties than traditional wired networks. These new characteristics present different security vulnerabilities and this paper provides a detailed classification of these threats. Threats exist to a mobile ad hoc network both from external nodes unauthorised to participate in the mobile ad hoc networks, and from internal nodes, which have the au...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Communications and Mobile Computing
سال: 2018
ISSN: 1530-8669,1530-8677
DOI: 10.1155/2018/1954121