Results 1 -
4 of
4
Cyber security and privacy issues in smart grids
- COMMUNICATIONS SURVEYS & TUTORIALS
, 2012
"... Smart grid is a promising power delivery infrastructure integrated with communication and information tech-nologies. Its bi-directional communication and electricity flow enable both utilities and customers to monitor, predict, and manage energy usage. It also advances energy and environmental sust ..."
Abstract
-
Cited by 20 (3 self)
- Add to MetaCart
Smart grid is a promising power delivery infrastructure integrated with communication and information tech-nologies. Its bi-directional communication and electricity flow enable both utilities and customers to monitor, predict, and manage energy usage. It also advances energy and environmental sustainability through the integration of vast distributed energy resources. Deploying such a green electric system has enormous and far-reaching economic and social benefits. Nevertheless, increased interconnection and integration also introduce cyber-vulnerabilities into the grid. Failure to address these problems will hinder the modernization of the existing power system. In order to build a reliable smart grid, an overview of relevant cyber security and privacy issues is presented. Based on current literatures, several potential research fields are discussed at the end of this paper.
Relay-selection improves the security-reliability trade-off in cognitive radio systems
- IEEE Trans. Commun
, 2015
"... ar ..."
Impact of Various VoIP and Video Traffics to Performance of Aggregation with Fragment Retransmission (AFR) in WLAN
"... Summary Agregation With Fragment Retransmision (AFR) is a frame transmission scheme that can improve the efficiency and the throughput of MAC layer in WLAN 802.11n. In this paper, we studied the performance of AFR scheme when various VoIP and video traffics transmitted over WLAN. The purpose of thi ..."
Abstract
- Add to MetaCart
(Show Context)
Summary Agregation With Fragment Retransmision (AFR) is a frame transmission scheme that can improve the efficiency and the throughput of MAC layer in WLAN 802.11n. In this paper, we studied the performance of AFR scheme when various VoIP and video traffics transmitted over WLAN. The purpose of this work is to know how the number of connections, packet size and fragment size of VoIP and video traffics influence the throughput and the delay performance of frame transmission. We used G.711, G.723a and G.729 format as VoIP traffics and H.264/MPEG-4 AVC format as video traffics which used 768 Kbps, 2 Mbps, 4 Mbps, 10 Mbps and 20 Mbps video bit rate. We used network simulator 2 (NS-2) with AFR module to simulate VoIP and video trafics over WLAN and measured each traffic performance. Simulation results show that throughput of MAC layer with AFR scheme will saturate when 70 connections of G.711 were transmitted. The transmission delay of G.723a and G.729 will be optimum when each traffic aggregated in 512 bytes of frame size. Simulation results also show that the throughput of AFR scheme is 70 Mbps and the delay is 0.025 ms when 30 H.264 video connections with 2 Mbps bit rate were transmiited. We have found the fragment and frame sizes that will give optimum throughput and the delay performance in AFR MAC scheme.
BY
"... Hybrid Networks employing wireless communication technologies have nowadays brought closer the vision of communication “anywhere, any time with anyone”. Such communication technologies consist of various standards, protocols, architectures, characteristics, models, devices, modulation and coding tec ..."
Abstract
- Add to MetaCart
(Show Context)
Hybrid Networks employing wireless communication technologies have nowadays brought closer the vision of communication “anywhere, any time with anyone”. Such communication technologies consist of various standards, protocols, architectures, characteristics, models, devices, modulation and coding techniques. All these different technologies naturally may share some common characteristics, but there are also many important differences. New advances in these technologies are emerging very rapidly, with the advent of new models, characteristics, protocols and architectures. This rapid evolution imposes many challenges and issues to be addressed, and of particular importance are the interoperability issues of the