Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Research on Transmission Line Tower Tilting and Foundation State Monitoring Technology Based on Multi-Sensor Cooperative Detection and Correction

    Guangxin Zhang1, Minghui Liu2, Shichao Cheng3, Minzhen Wang1,*, Changshun Zhao4, Hongdan Zhao5, Gaiming Zhong1

    Energy Engineering, Vol.121, No.1, pp. 169-185, 2024, DOI:10.32604/ee.2023.027907 - 27 December 2023

    Abstract The transmission line tower will be affected by bad weather and artificial subsidence caused by the foundation and other factors in the power transmission. The tower’s tilt and severe deformation will cause the building to collapse. Many small changes caused the tower’s collapse, but the early staff often could not intuitively notice the changes in the tower’s state. In the current tower online monitoring system, terminal equipment often needs to replace batteries frequently due to premature exhaustion of power. According to the need for real-time measurement of power line tower, this research designed a real-time… More >

  • Open Access

    ARTICLE

    Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things

    Muhammad Ali Khan1, Rao Naveed Bin Rais2,*, Osman Khalid1

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 827-843, 2023, DOI:10.32604/cmc.2023.040756 - 31 October 2023

    Abstract The Internet of Things (IoT) comprises numerous resource-constrained devices that generate large volumes of data. The inherent vulnerabilities in IoT infrastructure, such as easily spoofed IP and MAC addresses, pose significant security challenges. Traditional routing protocols designed for wired or wireless networks may not be suitable for IoT networks due to their limitations. Therefore, the Routing Protocol for Low-Power and Lossy Networks (RPL) is widely used in IoT systems. However, the built-in security mechanism of RPL is inadequate in defending against sophisticated routing attacks, including Sybil attacks. To address these issues, this paper proposes a… More >

Displaying 1-10 on page 1 of 2. Per Page