Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wormhole attack
biblio
Intrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
Scalability
resilience
Resiliency
Routing
Routing protocols
RPL
RPL attack detection techniques
RPL based loT
RPL based routing attacks
rank attack
security
security of data
source routing protocol
Topology
version attack
Wormhole
wormhole attack
Intrusion Detection
Blackhole
Blackhole attack
computer network security
Conferences
countermeasures
IDS
IDS research contribution techniques
Internet of Things
attacks
intrusion detection system
IoT
knowledge driven approach
lightweight routing protocol stack
LLN
low power lossy networks
pubcrawl
biblio
Network Layers Threats its Countermeasures in WSNs
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
security countermeasures
WSN
wormhole attack
wireless sensor networks
telecommunication security
telecommunication network reliability
Sybil attack
Sinkhole attack
selective forwarding attack
security requirements
security hazards
Blackhole attack
Scalability
Resiliency
resilience
reliable file exchange
pubcrawl
network layer threats
network layer intrusions
hello flood attack
dimensionally diffused nodes
Blackhole Attack And Hello Flood Attac
biblio
Performance Analysis of AODV and DSR Routing Protocols of MANET under Wormhole Attack and a Suggested Trust Based Routing Algorithm for DSR
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
mobile ad hoc network
wormhole tunnels
wormhole attack
trust
Throughput
telecommunication security
suggested trust based routing algorithm
spoofing attack
self-assembly
Routing protocols
routing algorithm
Routing
Resiliency
pubcrawl
Performance analysis
mobile ad hoc networks
Attack vectors
Metrics
MANET security
MANET
Jitter
dynamic source routing
DSR routing protocols
Dsr
delays
Compositionality
common routing protocols
Black hole attack
AODV routing protocols
AODV
Ad-hoc On-demand Distance Vector
biblio
Mitigating wormhole attack in MANET using absolute deviation statistical approach
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
MANET Attack Mitigation
wormhole attack mitigation
wormhole attack
Throughput
telecommunication security
telecommunication network routing
Resiliency
pubcrawl
Peer-to-peer computing
mobile ad hoc networks
Metrics
MATLAB simulator
absolute deviation
MANET
fake tunnel
covariance
correlation methods
correlation coefficient
Correlation
composability
Color
AD correlation
absolute deviation statistical approach
absolute deviation correlation coefficient
biblio
A New Statistical Method for Wormhole Attack Detection in MANETs
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
number of new neighbors
wormhole attack detection
wormhole attack
wireless sensor networks
Training
telecommunication security
SWAN
statistical methods
security attacks
Routing protocols
Resiliency
pubcrawl
Ad hoc networks
number of neighbors
NS3 simulator
mobile wireless nodes
mobile computing
mobile ad hoc networks
microsoft windows
Metrics
MANET Attack Detection
MANET
delays
composability
biblio
Detection and Prevention of Black Hole Attacks in IOT Amp;Amp; WSN
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
smart toasters
refrigerators
resilience
Resiliency
security
selective forwarding attack
Sensor
sensors
Sinkhole attack
Smart Grid Sensors
smart grid stations
Smart Grids
pubcrawl
smartphone
Sybil attack
VANET
vulnerabilities
Wireless communication
Wireless Sensor Network
wireless sensor networks
wormhole attack
WSN
WSN network
Human behavior
autonomous cars
Base stations
black hole
Black hole attacks
body sensor networks
Compositionality
computer network security
gateway nodes
Generic Nodes
grey hole
hello flood attacks
attacks
Human Factors
internet
Internet of Everything
Internet of Things
internetworking
IoET
jamming-attack
Logic gates
network servers
PDA
biblio
Secure and attack aware routing in mobile ad hoc networks against wormhole and sinkhole attacks
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
Resiliency
wormhole attacks
wormhole attack
telecommunication security
sinkhole node
sinkhole attacks
Sinkhole attack
security attacks
security
secure attack aware routing
Routing protocols
Routing
AODV
resilience
pubcrawl
mobile nodes
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
Compositionality
attack prevention
Attack Aware Alert
biblio
New approach through detection and prevention of wormhole attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:38pm
mobile computing
wormhole attack
wireless mobile nodes
Victimization
unique wormhole detection and prevention algorithm
tunneling
temporary network topologies
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Aerospace electronics
Mobile communication
Mobile adhoc Network
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
malicious node
Local Area Network consists
full routing method.
electromagnetic radio waves
contagious nodes
Compositionality
attack prevention
arbitrary network topologies
biblio
A secure localization algorithm based on reputation against wormhole attack in UWSNS
Submitted by K_Hooper on Wed, 04/04/2018 - 9:51am
secure localization algorithm
wormhole attack
wireless sensor networks
UWSNs-RDV-HOP
UWSNs
Underwater Wireless Sensor Networks
Underwater Networks
telecommunication security
Signal processing algorithms
signal processing
security
secure scheme
Acoustics
Scalability
Resiliency
reputation values
pubcrawl
propagation distance
Metrics
Mathematical model
marine communication
inconsistent propagation delays
DV-hop
anchor nodes
biblio
A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention
Submitted by K_Hooper on Wed, 09/27/2017 - 1:21pm
Ad hoc networks
detection
Human behavior
mobile ad-hoc network
Multi-hope
Prevention
pubcrawl
Resiliency
scalabilty
security
tunneling
wormhole attack
« first
‹ previous
1
2
3
next ›
last »