Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Zigbee
biblio
IPv6-Based Smart Grid Communication over 6LoWPAN
Submitted by aekwall on Mon, 01/13/2020 - 11:05am
local electric transformer
CAS
customer agents
Electric Grid
electric utilities
energy data
energy usage
future demand growth
IEEE 2030.5
IEEE 802.15 Standard
IPv6-based smart grid communication system
Carleton University
Low-Power and Lossy Networks
MESH network
OpenLab IEEE 802.15.4 chips
Routing Protocol
self-healing mesh network
Smart City concept
transformer agent
Two-Way Communication
two-way communication system
utility
6LoWPAN
IoT
RPL
IP networks
Resiliency
pubcrawl
composability
Routing protocols
Routing
Reliability
smart power grids
security
Smart Grids
Smart Grid
Mesh networks
wireless LAN
Zigbee
communication technologies
Communication Network
personal area networks
IPv6
biblio
Implementation of a C-UNB Module for NS-3 and Validation for DLMS-COSEM Application Layer Protocol
Submitted by grigby1 on Thu, 12/05/2019 - 9:52am
random access
Metrics
network simulation module
ns-3
Physical layer
Policy
Policy Based Governance
policy governance
power meters
probability of successful transmission
Protocols
pubcrawl
medium access control layer
remote site
resilience
Resiliency
Servers
smart meters
smart power grids
ultra narrow band
urban area
wide area networks
Zigbee
Device Language Message Specification-Companion Specification
Adaptation models
advanced metering infrastructure
asynchronous bandwidth devices
bandwidth channels
Base stations
C-UNB wireless networks
cellular radio
clean slate
clean-slate cellular network technology
collaboration
access protocols
DLMS-COSEM application layer protocol
embedded devices
Human behavior
Human Factors
Internet of Things (IoT)
lightweight random access protocol
low-bandwidth devices
low-power wide area wireless network technologies
machine-to-machine (M2M)
Mathematical model
biblio
Spoofing Attack Detection Using Physical Layer Information in Cross-Technology Communication
Submitted by grigby1 on Mon, 08/26/2019 - 10:10am
pubcrawl
ZigBee packets
Zigbee
wireless sensor networks
wireless networks
wireless LAN
Wireless fidelity
Wi-Fi devices
telecommunication security
spoofing attack detection
RSSI
RSS
Resiliency
resilience
received signal strength
authentication mechanism
physical layer information
Physical layer
packet radio networks
ISM band
heterogeneous wireless networks
heterogeneous wireless devices
frequency 2.4 GHz
CTC schemes
cross-technology communication
Cross Layer Security
composability
Communication system security
collaborative mechanism
biblio
Automatic stabilization of Zigbee network
Submitted by aekwall on Mon, 08/05/2019 - 9:37am
Resiliency
ZigBee sub-device
ZigBee signal strength
ZigBee relay
Zigbee network
ZigBee gateway
ZigBee coordinator
Zigbee
Wireless fidelity
Wireless communication
stable ZigBee transmission
Smart homes
Smart Home
automatic stabilization
pubcrawl
power consumption
original ZigBee node
low power consumption
Logic gates
IoT
internetworking
intelligent system
information technology
expandability
computer science
composability
biblio
Lightweight Mutual Authentication and Key Agreement in IoT Networks and Wireless Sensor Networks Proposal of Authentication and Key Agreement in IoT Network and Sensor Network Using Poor Wireless Communication of Less Than 1 Kbps
Submitted by aekwall on Mon, 03/25/2019 - 8:57am
Metrics
Zigbee
WSN security
wireless sensor networks
wireless security
wireless communication devices
Wireless communication
telecommunication security
sensor security
Resiliency
pubcrawl
poor wireless communication
performance evaluation
mutual authentication
authentication
low-performance sensors
low performance communication ability
lightweight mutual authentication
key agreement
IoT security
IoT network
Internet of Things
Human behavior
high-quality communication
Cryptographic Protocols
composability
communication functions
biblio
Resolving Threats in IoT: ID Spoofing to DDoS
Submitted by grigby1 on Wed, 01/16/2019 - 1:25pm
IP networks
Zigbee
unique identity
security of data
resource-constrained network
Resiliency
pubcrawl
PseudoRandom Identity Generator
Protocols
PRIG-adapted 6LoWPAN
personal area networks
personal area network model
Peer-to-peer computing
malware
malicious machines spoof ID
IP-enabled devices
6LoWPAN
IoT
invasive software
Internet-of-Things
Internet of Things
ID validation time
ID spoofing vulnerabilities
ID Spoofing
DDoS stress
DDoS
computer network security
Computer crime
composability
botnet
administrative machines
biblio
Security Modeling and Analysis of Cross-Protocol IoT Devices
Submitted by grigby1 on Mon, 04/02/2018 - 11:52am
Protocols
Zigbee
Wireless fidelity
TV
Smart homes
Smart Home
smart devices
Security modeling
Security analysis
security
Resiliency
resilience
pubcrawl
attack graphs
Metrics
IoT network
Internet of Things
Graphical security modeling
graphical security model
cross-protocol IoT devices
Cross-protocol devices
computer network security
composability
communication protocols
communication modules
Bridges
biblio
Cross-Layer Dynamic Admission Control for Cloud-Based Multimedia Sensor Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:26am
IEEE standards
Zigbee
wireless sensor networks
telecommunication congestion control
standard IEEE 802.15.4 technology
standard IEEE 802.15.3 technology
sensor networks
optimal node arrival rates
network resources
network access technology
multimedia delivery
multimedia communications
Multimedia communication
Admission control
extensive simulation study
dynamic cloud-based multimedia sensor networks
cross-layer dynamic admission control
cross-layer design
cross-layer admission control
control engineering computing
cloud-based sensor networks
cloud-based communications system
Cloud Computing
channel effects
channel characterization scheme
Channel allocation
biblio
Extending Extensible Authentication Protocol over IEEE 802.15.4 Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:55pm
IEEE 802.15.4 networks
Zigbee
wireless LAN
Servers
security
Protocols
Payloads
Local area networks
IoT networks
Internet of Things
internet
802.1X
IEEE 802.15.4
IEEE 802.15 Standards
extensible authentication protocol
EAP
Cryptographic Protocols
computer network security
authorization
authorisation
authentication
access control functionality
biblio
Defining the framework for wireless-AMI security in smart grid
Submitted by BrandonB on Fri, 05/01/2015 - 8:50am
public key cryptography
Zigbee
WMN(Wireless Mesh Network)
wireless mesh Zigbee network topology
wireless mesh networks
Wireless communication
wireless AMI security
smart power grids
smart meters
Smart Grids
smart grid advanced metering infrastructure
security
public key infrastructure
AMI (Advanced Metering Infrastructure)
Power system protection
power engineering computing
PKI based digital certificate authentication
PKI
metering
intrusion detection system
Intrusion Detection
internal security attack
external security attack
computer network security
authentication
« first
‹ previous
1
2
3
next ›
last »