Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Sybil attack detection
biblio
FedMix: A Sybil Attack Detection System Considering Cross-layer Information Fusion and Privacy Protection
Submitted by aekwall on Thu, 01/05/2023 - 5:10pm
vehicular ad hoc networks
Sybil attack detection
privacy protection
sybil attacks
information fusion
Cross layer design
ANN
federated learning
data integrity
privacy
composability
Resiliency
Metrics
pubcrawl
Analytical models
data privacy
Training
biblio
Lightweight Sybil-Resilient Multi-Robot Networks by Multipath Manipulation
Submitted by aekwall on Mon, 12/14/2020 - 12:43pm
Sybil attack detection
radio links
radiofrequency identification
Resiliency
rich multipath features
Robot kinematics
Robot sensing systems
robotic collaboration
ScatterID actively manipulates multipath propagation
single-antenna robot
pubcrawl
Sybil attackers
sybil attacks
telecommunication security
Trajectory
Wireless communication
wireless LAN
wireless medium
wireless networking
wireless sensor networks
fine-grained physical layer signatures
backscatter
batteryless backscatter tags
bulky multiantenna systems
collaboration
collaborative tasks
composability
computer network security
featherlight backscatter tags
fictitious robots
Robot Trust
fundamental trust assumption
lightweight Sybil-resilient multirobot networks
lightweight system
Metrics
miniaturized robots
mobile robots
Multi-robot network
multi-robot systems
multipath manipulation
biblio
An Intelligent Mechanism for Sybil Attacks Detection in VANETs
Submitted by aekwall on Mon, 12/14/2020 - 12:42pm
telecommunication computing
user privacy information
SyDVELM mechanism
Sybil Attacks.
fixed road-side components
Extreme Machine Learning
extreme learning machine
Acceleration
Scalability
distributed network
telecommunication network topology
Complexity theory
feedforward neural nets
VANET
data privacy
machine learning
sybil attacks
Metrics
vehicular ad hoc networks
VANETs
Sybil attack detection
privacy
composability
pubcrawl
Resiliency
security
data integrity
telecommunication security
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:41pm
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
biblio
On Detection of Sybil Attack in Large-Scale VANETs Using Spider-Monkey Technique
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
Sybil security threat
packet delivery time synchronization
probability of detection
pseudocode algorithm
roadside unit
Routing
Spider monkey time synchronization (SMTS)
spider-monkey time synchronization technique
Sybil attack detection
Sybil attacking strategies
natural spider-monkey behavior
synchronisation
Synchronization
telecommunication power management
time division multiple access
unintended vehicles
VANETs
vehicular ad hoc networks
vehicular collisions
Metrics
destination vehicles
telecommunication security
security
Protocols
pubcrawl
composability
sybil attacks
artificial spider-monkey technique
biology
densely deployed challenge zone
security of data
dynamic VANET system
energy conservation
energy-efficient time synchronization
erroneous messages
legitimate vehicles
malicious nodes
metaheuristic stimulated framework approach
minimized energy consumption
multiple identities
biblio
k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:42am
Symmetric matrices
pubcrawl
Resiliency
road vehicles
runtime complexity optimization
Sybil attack
Sybil attack detection
Sybil attack vulnerability
sybil attacks
pseudonymous based privacy protection mechanism
traffic engineering computing
Transmitters
vehicle classification
Vehicle Driving Pattern
vehicle location privacy
vehicular network
vehicular networking
wireless sensor networks
Intrusion Detection
composability
computational complexity
data privacy
driving pattern similarity
Eigenvalues and eigenfunctions
ETSI
IEEE
Intelligent Transportation Systems
Ad hoc networks
k-nearest neighbours classification
kNN classification algorithm
machine learning
Metrics
pattern classification
Peer-to-peer computing
privacy
biblio
INTERLOC: An interference-aware RSSI-based localization and sybil attack detection mechanism for vehicular ad hoc networks
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
Observers
vehicular ad hoc networks
VANET traffic safety
VANET Security
telecommunication security
sybil attacks
sybil attack detection mechanism
Sybil attack detection
Safety
RSSI-based localization technique
RSSI
road traffic
Resiliency
Radio propagation
pubcrawl
automobiles
Metrics
Location Accuracy
localization techniques
localization
INTERLOC
interference-aware RSSI-based localization
interference (signal)
Interference
inter-vehicular communications
heterogeneous interference
GPS
Global Positioning System
composability
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators
biblio
Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 12:03pm
network theory (graphs)
wireless sensor networks
telecommunication security
Sybil attack detection
Sybil attack
statistical testing
sequential hypothesis testing
Routing protocols
Robustness
optimization
network traffic
Acoustics
malicious node
location information
IEEE 802.11 Standards
greedy perimeter stateless routing
GPSR protocol
geographic routing
encryption methods
Bandwidth
actuators