Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
WSN
biblio
Identifying Rank Attacks and Alert Application in WSN
Submitted by aekwall on Mon, 11/29/2021 - 1:54pm
Routing protocols
SCF
rank attack
PDR
LLN
Dijkstra's algorithm
RPL
WSN
6LoWPAN
wireless sensor networks
Throughput
composability
Resiliency
pubcrawl
Wireless communication
performance evaluation
quality of service
Routing
biblio
Security Issues and Challenges in RFID, Wireless Sensor Network and Optical Communication Networks and Solutions
Submitted by grigby1 on Mon, 11/08/2021 - 1:32pm
radiofrequency identification
attacks
Communication networks
composability
Human behavior
Metrics
network security
optical network
Production
Protocols
pubcrawl
WSN
Reliability
resilience
Resiliency
RFID security
security
security and privacy
security goals
sensor networks
sensor security
wireless sensor networks
biblio
Optimisation of Lightweight Klein Encryption Algorithm With 3 S-box
Submitted by aekwall on Mon, 10/04/2021 - 2:06pm
Resiliency
Pervasive Computing Security
S-box
Random access memory
Klein encryption
cryptanalysis
WSN
Ciphers
Software algorithms
Human Factors
Metrics
Scalability
pubcrawl
encryption
performance evaluation
wireless sensor networks
IoT
biblio
A Decentralized Hierarchical Key Management Scheme for Grid-Organized Wireless Sensor Networks (DHKM)
Submitted by aekwall on Tue, 08/17/2021 - 4:16pm
Metrics
WSN
wireless sensor networks
Topology
Scalability
Routing
Resiliency
pubcrawl
Protocols
Base stations
key management
Intra Communication
Inter communication
Human behavior
group key
grid
Cryptography
biblio
Improved MODLEACH with Effective Energy Utilization Technique for WSN
Submitted by grigby1 on Tue, 06/01/2021 - 2:51pm
privacy
WSN
wireless sensor networks
Throughput
security
Resiliency
resilience
Residual energ
remote sensing
pubcrawl
Base stations
MODLEACH
LZW Compression
LEACH
Force
confinement
composability
clustering
batteries
biblio
A L-IDS against Dropping Attack to Secure and Improve RPL Performance in WSN Aided IoT
Submitted by grigby1 on Fri, 04/09/2021 - 11:36am
RPL Routing
Peer-to-peer computing
pubcrawl
resilience
Resiliency
Routing
routing loops
Routing Protocol
Routing protocols
RPL performance
network reliability
RPL routing security scheme
security
sensor devices
sensor nodes
telecommunication network topology
wireless link
wireless sensor networks
WSN
IDS
Blackhole attack
composability
computer network security
count data
data packets
destination data delivery
exchange data routing
expected IDS
Black hole attackers
Internet of Things
IoT
IP networks
L-IDs
L-IDS procedure
LHV value
Link Hop Value-based Intrusion Detection System
network performance
biblio
An Efficient Routing Protocol for Secured Communication in Cognitive Radio Sensor Networks
Submitted by aekwall on Mon, 03/15/2021 - 12:04pm
secured communication
Cognitive Radio Security
weighted graph problem
V2V communications
stable transmission path
stable paths
spectrum awareness
shared common channels
secured paths
mobility pattern
efficient routing performance
efficient reactive routing protocol
dynamic behavior
cognitive radio sensor networks
channel availability
Ad hoc networks
telecommunication security
cognitive radio
source node
Routing Protocol
spectrum availability
WSN
Switches
delays
Reliability
Routing
graph theory
wireless sensor networks
Routing protocols
pubcrawl
Resiliency
biblio
Sagacious Intrusion Detection Strategy in Sensor Network
Submitted by grigby1 on Tue, 02/23/2021 - 2:47pm
smart appliances
Prediction algorithms
logistic regression
regression analysis
network intrusion detection
KNN
WSN
malicious attackers
support vector machine
neural nets
ANN
data corpus
external attacks
IDS methodology
Naive Bayes
sagacious intrusion detection strategy
time division multiple access
Support vector machines
Classification algorithms
service attacks
Floods
Denial of Service attacks
sensors
telecommunication computing
composability
wireless sensor networks
telecommunication security
computer network security
Resiliency
resilience
Metrics
pubcrawl
Intrusion Detection
biblio
Simulating RPL Attacks in 6lowpan for Detection Purposes
Submitted by aekwall on Mon, 12/21/2020 - 1:26pm
electronic devices
RPL protocol functioning
RPL attacks
routing protocol for low-power and lossy networks
IPv6 over low-power wireless personal area networks
Cooja Simulator
contiki operating system
attack condition
6LoWPAN networks
Resiliency
Packet loss
WSN
network components
personal area networks
LLN
telecommunication network topology
routing attacks
6LoWPAN
Cybersecurity
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
IoT devices
Internet of Things
IP networks
computer network security
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 12:41pm
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »