Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
source node
biblio
An Efficient Routing Protocol for Secured Communication in Cognitive Radio Sensor Networks
Submitted by aekwall on Mon, 03/15/2021 - 11:04am
secured communication
Cognitive Radio Security
weighted graph problem
V2V communications
stable transmission path
stable paths
spectrum awareness
shared common channels
secured paths
mobility pattern
efficient routing performance
efficient reactive routing protocol
dynamic behavior
cognitive radio sensor networks
channel availability
Ad hoc networks
telecommunication security
cognitive radio
source node
Routing Protocol
spectrum availability
WSN
Switches
delays
Reliability
Routing
graph theory
wireless sensor networks
Routing protocols
pubcrawl
Resiliency
biblio
Multi-branch Source Location Privacy Protection Scheme Based on Random Walk in WSNs
Submitted by aekwall on Mon, 10/26/2020 - 11:04am
multibranch source location privacy protection method
radiofrequency interference
WSN
source node
location privacy preservation
communication overhead
Position measurement
location security
branch interference area
location-related data
Base stations
multibranch source location privacy protection scheme
multiple branch
multiple proxy sources
proxy source
random walk
sensing information
sink location privacy
Location Privacy in Wireless Networks
privacy
data privacy
telecommunication security
security
Resiliency
Human behavior
pubcrawl
wireless sensor networks
location privacy
Monitoring
Routing
sensor nodes
Metrics
random processes
network lifetime
base station
Compositionality
privacy protection
biblio
Realizing Source Location Privacy in Wireless Sensor Networks Through Agent Node Routing
Submitted by aekwall on Mon, 10/26/2020 - 10:54am
telecommunication network routing
Location Privacy in Wireless Networks
tactically positioned agent nodes
source location privacy
random routing techniques
random routing
Phantoms
agent node routing
agent node
adversary
Position measurement
source node
WSN
Compositionality
Safety
Metrics
sensor placement
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
telecommunication security
Monitoring
biblio
Game-Based Attack Defense Model to Provide Security for Relay Selection in 5G Mobile Networks
Submitted by aekwall on Mon, 06/08/2020 - 10:24am
scalable connectivity
networking capabilities
noncooperative game
Predictive Metrics
protected relay
protection level
pubcrawl
relay networks (telecommunication)
relay nodes
relay selection
Scalability
Nash equilibrium convergence analysis
security
source device
source node
spectral efficiency
system capacity
telecommunication security
telecommunication traffic
ubiquitous connectivity
universal communication environment
utility function
equilibrium state
composability
Resiliency
5G mobile communication
5G mobile networks
5G networks
attack-defense
cooperative D-to-D communication
data packet transmission
Device-to-device communication
dynamic game theoretic based approach
Dynamic Networks and Security
extensive signal coverage
game theoretic security
game theory
game-based attack defense model
heterogeneous devices
heuristic algorithm
Human Factors
large-scale mobile networks
link reliability
multiple communication technologies
biblio
Research on Physical Layer Security of Cooperative Networks Based on Swipt
Submitted by grigby1 on Fri, 04/10/2020 - 11:20am
energy harvesting
time allocation parameter
system security outage probability
SWIPT
source node
simultaneous wireless information and power transfer
relay nodes
relay networks (telecommunication)
radiofrequency power transmission
radio signals
radio receivers
radio networks
physical layer security performance
information long-distance transmission
energy-constrained nodes service life
computer network security
eavesdropping users
destination nodes
cooperative networks
Cooperative Network
cooperative communication
physical layer security
resilience
Resiliency
Metrics
composability
pubcrawl
probability
power engineering computing
computer network reliability
biblio
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
routing discovery phase
Peer-to-peer computing
privacy
privacy-preserving verification
pubcrawl
PVad
resilience
Resiliency
Routing
passive attacks
routing path
routing security
security
security of data
source node
telecommunication network routing
telecommunication security
verification
expected log data
Ad hoc networks
cognition
Compositionality
data privacy
Data Transmission
Diagnostics
distributed cooperation
dynamic topology
active attacks
expected routing paths
MANET
MANETs
Metrics
mobile ad hoc networks
mobile computing
multiple malicious nodes
biblio
History Trust Routing Algorithm to Improve Efficiency and Security in Wireless Sensor Network
Submitted by grigby1 on Wed, 04/11/2018 - 2:02pm
security
wireless sensor networks
Wireless Sensor Network
Wireless communication
Trusted Computing
Trust Routing
trust path routing algorithm
telecommunication security
telecommunication network routing
technological limit
Stability analysis
source node
sink node
composability
secure route
Scalability
routing trust history table
routing path
Routing
Resiliency
resilience
pubcrawl
Peer-to-peer computing
history trust routing algorithm
History
biblio
AHP, fuzzy sets and TOPSIS based reliable route selection for MANET
Submitted by BrandonB on Wed, 05/06/2015 - 8:03am
mobile ad-hoc network
triangular fuzzy numbers
TOPSIS based reliable route selection
TOPSIS
telecommunication security
telecommunication network routing
technique-for-order performance-by-similarity-to-ideal solution
source node
Routing protocols
Routing
Pragmatics
number theory
multiple route ranking
AHP
mobile ad hoc networks
MCDM
MANET
linguistic values
Fuzzy sets
fuzzy set theory
Fuzzy logic
destination node
criteria weights
analytical hierarchy process
analytic hierarchy process
AHP based reliable route selection
biblio
Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:14pm
network throughput
wireless communication media
telecommunication security
spectrum sensing
spectrum resource scarcity
spectrum allocation
source node
security aspect
secure communication
secure anonymous routing
Routing protocols
Routing
Protocols
privacy
pairing-based cryptography
operational aspect
Ad hoc networks
location anonymity
Energy Efficiency
end-to-end delay
disaster recovery communication network
destination node
Cryptography
Cryptographic Protocols
CRAN
CR media
CR ad hoc networks
cognitive radio ad hoc networks
cognitive radio (CR) networks
cognitive radio
anonymous-secure communication protocol
anonymous routing
biblio
Redundancy management in heterogeneous wireless sensor networks
Submitted by BrandonB on Thu, 04/30/2015 - 1:58pm
query success probability
wireless sensor networks
Wireless Sensor Network
unreliable nodes detection
Tin
telecommunication network reliability
source node
signal processing
signal dissemination
Reliability
redundancy management algorithm
Redundancy
queueing theory
ad hoc network
query reliability
quality of service
probability
network efficiency
multipath routing
intrusion tolerance
Indexes
heterogeneous wireless sensor networks
geographical area
destination node
Ad hoc networks