IX Latin American Robotics Symposium and IEEE Colombian Conference on Automatic Control, 2011 IEEE 2011
DOI: 10.1109/larc.2011.6086837
|View full text |Cite
|
Sign up to set email alerts
|

A Wireless Networked Control Systems review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
6
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 17 publications
0
6
0
1
Order By: Relevance
“…Embora o protocolo IEEE 802.11, não tenha sido concebido para aplicações em WNCS, a sua implementação pode ser útil no controle de rede quando define o DCF (Distributed Control Function). Neste protocolo, a decisão da estação que pode transmitir é feita entre os nós da WLAN [11].…”
Section: Introductionunclassified
“…Embora o protocolo IEEE 802.11, não tenha sido concebido para aplicações em WNCS, a sua implementação pode ser útil no controle de rede quando define o DCF (Distributed Control Function). Neste protocolo, a decisão da estação que pode transmitir é feita entre os nós da WLAN [11].…”
Section: Introductionunclassified
“…Wireless Networks Control Systems (WNCSs) use the wireless communication network to realize information exchange between the geographically distributed and portable field sensor, the controller and the actuator, in order to get real-time feedback from the controlled system [1,2,3]. As a closed loop control system instead of the traditional point-to-point connections, it breaks the traditional limitation in the physical space and expands the control activities.…”
Section: Introductionmentioning
confidence: 99%
“…unmanned aerial vehicles (UAV). Networking parameters are an important aspect of WNCS as control applications are sensitive to time delays and interferences [1], that affect the reliability and availability of the control systems. The broadcast nature of wireless communications poses security vulnerabilities that could be exploited through passive and active attacks.…”
Section: Introductionmentioning
confidence: 99%