2020
DOI: 10.1016/j.future.2017.10.024
|View full text |Cite
|
Sign up to set email alerts
|

Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
30
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(30 citation statements)
references
References 29 publications
0
30
0
Order By: Relevance
“…Therefore, some novel methods are proposed to solve the emerging problems in CPSS. For example, a moving centroid based routing protocol is presented to deal with the incompletely predictable cyber devices in cyber-physical-social distributed systems [6]. In [7], the authors studied a fusion scheme of cellular network and wireless sensor for CPSS.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, some novel methods are proposed to solve the emerging problems in CPSS. For example, a moving centroid based routing protocol is presented to deal with the incompletely predictable cyber devices in cyber-physical-social distributed systems [6]. In [7], the authors studied a fusion scheme of cellular network and wireless sensor for CPSS.…”
Section: Related Workmentioning
confidence: 99%
“…The CPSS as a novel paradigm enables the deep interaction of social space and CPS or Internet of Things (IoT), which brings significant changes for improving the service and management of complex physical systems. Architectures, methods and schemes of CPSS for different application areas have been proposed [1,2,3,4,5,6,7,8,9]. The wireless sensor network (WSN) as the sensing network is one of the most important parts.…”
Section: Introductionmentioning
confidence: 99%
“…Some interfaces are available to optimize these systems for human use. The most popular real world examples of CPSs are smartphones [13]. Smartphones connect the real world to the virtual via sensors such as the geolocation sensors, Internet, telephone, and wireless interfaces.…”
Section: Introductionmentioning
confidence: 99%
“…Many research studies have explored the security problems in smart systems, such as access control, key agreement and data upload smart systems contain many network technology problems to be solved [8][9][10][32][33][34][35]. The technical requirements of a smart system involve many aspects, especially proposing novel network security schemes [11][12][13][14][15]. RFID tag consist special cipher code, ciphers are very popular due to more significant features such as high speed, can be implemented easily in hardware, have limited propagation errors and are particularly suitable for all environments where alphabet symbols are processed on RFID tag [16,[18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%