Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wormhole attacks
biblio
Wormhole Attack Detection using Energy Model in MANETs
Submitted by grigby1 on Thu, 10/29/2020 - 11:22am
node energy
dynamic route discovery
dynamic route request
encrypted values
energy level
energy model
high power transmission
intruder nodes
network analysis
dynamic request
NS2 simulator
packet drop ratio
performance curves
static table driven technique
unsecure transmission
wormhole attack detection
MANET Attack Detection
wormhole attacks
pubcrawl
Metrics
resilience
Resiliency
telecommunication network routing
Compositionality
network communication
wormhole attack
Cryptography
AODV
end to end delay
MANETs
mobile ad hoc networks
AODV routing
Apptool
Apptool simulator
biblio
Routing Table Management using Dynamic Information with Routing Around Connectivity Holes (RACH) for IoT Networks
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
sparse architectures
radio networks
resilience
Resiliency
route poisoning
Routing
routing around connectivity holes
routing scheme
routing table management
Scalability
software malfunctioning
RACH
telecommunication network management
telecommunication network reliability
telecommunication network routing
telecommunication security
time series
time-series analytics
Wireless communication
wireless network
wireless nodes
wormhole attacks
failure analysis
Blackhole attack
blackhole attacks
Computational modeling
continuous analytical systems
data collection applications
Delay Optimization
delays
dense architectures
dense networks
dynamic information
back testing
historical systems
Internet of Things
IoT networks
IoT routing
Mathematical model
node failures
Path Recovery
Peer-to-peer computing
probability
pubcrawl
biblio
Trust based mechanism for Securing IoT Routing Protocol RPL against Wormhole amp;Grayhole Attacks
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
Grayhole
Trust Routing
wormhole attacks
Wormhole
RPL protocol
open standard routing protocol
network traffic
network topology
loT
light weight Trust based mechanism
IoT routing protocol RPL
Indirect Trust
Grayhole attacks
RPL
direct trust
telecommunication traffic
trust
Routing
Routing protocols
composability
pubcrawl
Resiliency
security
Internet of Things
Scalability
computer network security
biblio
Secure and attack aware routing in mobile ad hoc networks against wormhole and sinkhole attacks
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
Resiliency
wormhole attacks
wormhole attack
telecommunication security
sinkhole node
sinkhole attacks
Sinkhole attack
security attacks
security
secure attack aware routing
Routing protocols
Routing
AODV
resilience
pubcrawl
mobile nodes
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
Compositionality
attack prevention
Attack Aware Alert
biblio
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems
Submitted by BrandonB on Thu, 04/30/2015 - 12:06pm
passivity
wormhole attacks
wormhole attack
wireless networks
wireless network
wireless LAN
telecommunication traffic
Silicon
Routing
resource management
passivity framework
computer network security
packet delays
networked control systems
network traffic
network flows
delays
delay constraints
cyber-physical systems
Cryptography
cryptographic mechanisms
biblio
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems
Submitted by BrandonB on Thu, 04/30/2015 - 12:06pm
passivity
wormhole attacks
wormhole attack
wireless networks
wireless network
wireless LAN
telecommunication traffic
Silicon
Routing
resource management
passivity framework
computer network security
packet delays
networked control systems
network traffic
network flows
delays
delay constraints
cyber-physical systems
Cryptography
cryptographic mechanisms