Security issues and quality of service in real time wireless PLC/SCADA process control systems
Abstract: A wireless PLC/SCADA network has been set up to investigate the reliability of wireless communication systems in a local area network. It has been shown that the integrity of data flow can be maintained within certain limits of the signal strength in a coverage area of an Access Point. The...
| Main Authors: | Eren, Halit, Hatipoglu, D. |
|---|---|
| Format: | Conference Paper |
| Published: |
Institute of Electrical and Electronics Engineers (IEEE), Piscataway, NJ, USA
2008
|
| Subjects: | |
| Online Access: | http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4472963&isnumber=4472923 http://hdl.handle.net/20.500.11937/6225 |
Similar Items
Performance analysis based on DDoS attack at MAC layer in WLAN / Zati Bayani Harun
by: Harun, Zati Bayani
Published: (2019)
by: Harun, Zati Bayani
Published: (2019)
Medical health knowledge management using wireless network: Moroccan hospitals case study
by: Jamaly, S., et al.
Published: (2009)
by: Jamaly, S., et al.
Published: (2009)
A study of campus wireless network technology acceptance among student in UiTM Terengganu, Dungun Campus / Aainaa Abdul Rahim, Nur Izyan Kamaru Zaman and Zaimatul Adawiah Zainuddin
by: Abdul Rahim, Aainaa, et al.
Published: (2012)
by: Abdul Rahim, Aainaa, et al.
Published: (2012)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014)
by: Shaukat, Haafizah Rameeza
Published: (2014)
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
by: Al-Alak, Saif M. Kh.
Published: (2014)
by: Al-Alak, Saif M. Kh.
Published: (2014)
Max access
Published: (2008)
Published: (2008)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Efficient back-off mechanism for multimedia support in IEEE 802.11E
by: Al-Nuaimi, Aws Ali Shakir
Published: (2012)
by: Al-Nuaimi, Aws Ali Shakir
Published: (2012)
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
by: Arezoumand, Reza
Published: (2015)
by: Arezoumand, Reza
Published: (2015)
Designing and Implementing a Wi-Fi Enabled Mobile Robot
by: Gopal, Lenin, et al.
Published: (2011)
by: Gopal, Lenin, et al.
Published: (2011)
A study of interference between bluetooth and 802.11b (WIFI) / Mazani Manaf, Md Jamil Abu Sari and Jamaludin Md Yusof
by: Manaf, Mazani, et al.
Published: (2005)
by: Manaf, Mazani, et al.
Published: (2005)
Resource allocation techniques for interference mitigation in macro and femtocell heterogeneous network-based LTE system
by: Al-omari, Motea Saleh Mohammed
Published: (2017)
by: Al-omari, Motea Saleh Mohammed
Published: (2017)
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
by: Qadawi, Zahraa D.A.
Published: (2013)
by: Qadawi, Zahraa D.A.
Published: (2013)
Search algorithms for path planning problems in harsh wireless sensor network environment
by: Hong, Siaw Swin
Published: (2017)
by: Hong, Siaw Swin
Published: (2017)
Multi-channel support for data-gathering trees in wireless sensor networks
by: Alfraihat, Wasan Ahmad Sulieman
Published: (2010)
by: Alfraihat, Wasan Ahmad Sulieman
Published: (2010)
Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks
by: Nordin, Noorsalwati
Published: (2007)
by: Nordin, Noorsalwati
Published: (2007)
An analysis of streaming performance in 3G mobile network / Samsiah Ahmad
by: Ahmad, Samsiah
Published: (2005)
by: Ahmad, Samsiah
Published: (2005)
A framework implementation for information accuracy in mobile commerce / Emafazzila Baharudin
by: Baharudin, Emafazzila
Published: (2007)
by: Baharudin, Emafazzila
Published: (2007)
Channel modeling based on 3-D wave scattering coherent DD EW-RLS and DD NLMS estimation of OFDM-MIMO in wireless communication / Suzi Seroja Sarnin
by: Sarnin, Suzi Seroja
Published: (2018)
by: Sarnin, Suzi Seroja
Published: (2018)
Performance evaluation of AODV, DSR and DYMO routing
protocol in MANET / Siti Rahayu Abdul Aziz ... [et al.]
by: Abdul Aziz, Siti Rahayu, et al.
Published: (2008)
by: Abdul Aziz, Siti Rahayu, et al.
Published: (2008)
Hierarchical QoS admission control mechanism for IEEE 802.16j mobile multihop relay WiMAX network / Rohaiza Yusoff
by: Yusoff, Rohaiza
Published: (2014)
by: Yusoff, Rohaiza
Published: (2014)
Time frequency analysis for wireless channel characterization / Zaiton Sharif
by: Sharif, Zaiton
Published: (2015)
by: Sharif, Zaiton
Published: (2015)
Mobile applications at the dentist / Teh Adilla Mustaza, Tong Wah Lim and Siti Mariam Ab. Ghani
by: Mustaza, Teh Adilla, et al.
Published: (2016)
by: Mustaza, Teh Adilla, et al.
Published: (2016)
Performance evaluation of identity-based encryption (IBE) remote attestation protocol in wireless sensor networks / Roszainiza Rosli
by: Rosli, Roszainiza
Published: (2014)
by: Rosli, Roszainiza
Published: (2014)
An enhanced A-MSDU frame aggretation scheme for 802.11n wireless networks
by: Saif, Anwar, et al.
Published: (2012)
by: Saif, Anwar, et al.
Published: (2012)
Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E
by: Oad, Aneel
Published: (2013)
by: Oad, Aneel
Published: (2013)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Environmental legislation awareness among construction contractors in Malaysia / Roseline Ikau and Corina Joseph
by: Ikau, Roseline, et al.
Published: (2017)
by: Ikau, Roseline, et al.
Published: (2017)
Enhancing quality of service in Multi-Radio Multi-Channel Wireless Mesh Networks
by: Raja Bongsu, Raja Hasyifah
Published: (2023)
by: Raja Bongsu, Raja Hasyifah
Published: (2023)
The Doctoral Research Abstracts : Mobility enhancement for VLC receiver using avalanche photodiode array / Mazlaini Yahya
by: Yahya, Mazlaini
Published: (2018)
by: Yahya, Mazlaini
Published: (2018)
Leucaena Leucocephala : A new green biocomposite substrates for wireless applications / Ahmad Azlan Ab Aziz
by: Ab Aziz, Ahmad Azlan
Published: (2018)
by: Ab Aziz, Ahmad Azlan
Published: (2018)
Mobile navigation system using GPS / Salmi Abd Wahab
by: Abd Wahab, Salmi
Published: (2006)
by: Abd Wahab, Salmi
Published: (2006)
Business Model Canvas : Ample Power Company / Noor Amira Zaharlim
by: Zaharlim, Noor Amira
Published: (2020)
by: Zaharlim, Noor Amira
Published: (2020)
Malay traditional musical instruments as smartphone application / Ahmad Faiz Fazli Rosli
by: Rosli, Ahmad Faiz Fazli
Published: (2014)
by: Rosli, Ahmad Faiz Fazli
Published: (2014)
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
by: Malekzadeh, Mina
Published: (2007)
by: Malekzadeh, Mina
Published: (2007)
Mobile agent-based data gathering approaches for static multiple mobile agent itinerary in wireless sensor networks
by: Qadori, Huthiafa Q
Published: (2018)
by: Qadori, Huthiafa Q
Published: (2018)
Implementation of e-rental housing via generic notification message through mobile phone / Suzana Ahmad, Norzehan Sakamat and Noorazida Mohd Idris
by: Ahmad, Suzana, et al.
Published: (2009)
by: Ahmad, Suzana, et al.
Published: (2009)
Development of web information system that communicates via SMS in FTMSK / Amer Rosyeid Abu Hassan
by: Abu Hassan, Amer Rosyeid
Published: (2007)
by: Abu Hassan, Amer Rosyeid
Published: (2007)
Alert notification via SMS / Zudiana Zainuddin
by: Zainuddin, Zudiana
Published: (2006)
by: Zainuddin, Zudiana
Published: (2006)
Depth frame loss concealment for wireless transmission utilising motion detection information
by: Ranjbari, Mohamadreza
Published: (2014)
by: Ranjbari, Mohamadreza
Published: (2014)
Similar Items
-
Performance analysis based on DDoS attack at MAC layer in WLAN / Zati Bayani Harun
by: Harun, Zati Bayani
Published: (2019) -
Medical health knowledge management using wireless network: Moroccan hospitals case study
by: Jamaly, S., et al.
Published: (2009) -
A study of campus wireless network technology acceptance among student in UiTM Terengganu, Dungun Campus / Aainaa Abdul Rahim, Nur Izyan Kamaru Zaman and Zaimatul Adawiah Zainuddin
by: Abdul Rahim, Aainaa, et al.
Published: (2012) -
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
by: Shaukat, Haafizah Rameeza
Published: (2014) -
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
by: Al-Alak, Saif M. Kh.
Published: (2014)