Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless medium
biblio
Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 1:03pm
Resiliency
Metrics
mobile ad hoc networks
moving capability
networking domain
participating nodes
pubcrawl
radio range nodes
resilience
MANET
rigid infrastructure
security
telecommunication network topology
telecommunication security
wired line networks
wireless links
wireless medium
wireless technology
finite state machines
active centralized system
ad hoc network
arbitrary basis
attacks
Compositionality
computation termination
execution purpose
finite state machine
MANET Attack Detection
FSM
Handheld computers
high growth rate
highly dynamic topology
hostile free environment
malicious node
malicious node detection
biblio
Lightweight Sybil-Resilient Multi-Robot Networks by Multipath Manipulation
Submitted by aekwall on Mon, 12/14/2020 - 12:43pm
Sybil attack detection
radio links
radiofrequency identification
Resiliency
rich multipath features
Robot kinematics
Robot sensing systems
robotic collaboration
ScatterID actively manipulates multipath propagation
single-antenna robot
pubcrawl
Sybil attackers
sybil attacks
telecommunication security
Trajectory
Wireless communication
wireless LAN
wireless medium
wireless networking
wireless sensor networks
fine-grained physical layer signatures
backscatter
batteryless backscatter tags
bulky multiantenna systems
collaboration
collaborative tasks
composability
computer network security
featherlight backscatter tags
fictitious robots
Robot Trust
fundamental trust assumption
lightweight Sybil-resilient multirobot networks
lightweight system
Metrics
miniaturized robots
mobile robots
Multi-robot network
multi-robot systems
multipath manipulation
biblio
Preserve Location Privacy for Cyber-Physical Systems with Addresses Hashing at Data Link Layer
Submitted by aekwall on Mon, 10/26/2020 - 11:55am
Wireless communication
Location Privacy in Wireless Networks
stronger privacy protection
power efficiency
media access control
data link layer frame
cyber-physical system
Compositionality
Payloads
wireless medium
sensors
Metrics
Cryptography
Routing
privacy
location privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
cyber-physical systems
telecommunication security
Receivers
biblio
Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
mobile computing
Wormhole tunnel
wormhole attack detection
wireless medium
Wireless communication
telecommunication security
telecommunication network routing
Routing
Resiliency
pubcrawl
network level
Communication system security
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
malicious nodes
graph theory
Extremities
end-nodes
composability
biblio
Asymptotic Analysis of a New Low Complexity Encryption Approach for the Internet of Things, Smart Cities and Smart Grid
Submitted by grigby1 on Mon, 11/19/2018 - 12:31pm
sensors
party fusion center perspectives
probability
pubcrawl
quantisation (signal)
quantizer
resilience
Resiliency
scalar parameters
secure estimation
sensor networks
sensor outputs
parameter estimation
smart cities
Smart Grid
Smart Grid Sensors
stochastic encryption
telecommunication security
TPFC estimation
vector parameter estimation
wireless medium
wireless sensor networks
WSN
Internet of Things
binary stochastic encryption approach
Compositionality
Cryptography
encrypted nonbinary quantized data
encryption
encryption approaches
fixed threshold binary quantization limits parameter estimation
Human behavior
Human Factors
information security
asymptotic analysis
legitimate fusion center
LFC estimation
low complexity encryption
low complexity encryption approach
maximum likelihood estimation
maximum-likelihood estimation
mean square error methods
nonbinary generalized case
nonbinary quantized observations
optimal estimators
biblio
Physical layer authentication based on channel response tracking using Gaussian processes
Submitted by BrandonB on Mon, 05/04/2015 - 12:04pm
physical layer authentication
wireless test bed
wireless medium
Wireless communications
Wireless communication
wireless channels
trusted user channel response
Trajectory
time-frequency fingerprint
Time-frequency Analysis
telecommunication security
target tracking
security of data
programmable radio
physical-layer authentication
authentication
numerical simulation
multitarget tracking technique
multi-target tracking
intruder
higher level authentication procedure
higher level authentication overhead
Gaussian processes
Gaussian process
fingerprint identification
Communication system security
channel response tracking
Channel estimation
automatic learning
biblio
Physical layer authentication based on channel response tracking using Gaussian processes
Submitted by BrandonB on Fri, 05/01/2015 - 8:39am
physical layer authentication
wireless test bed
wireless medium
Wireless communications
Wireless communication
wireless channels
trusted user channel response
Trajectory
time-frequency fingerprint
Time-frequency Analysis
telecommunication security
target tracking
security of data
programmable radio
physical-layer authentication
authentication
numerical simulation
multitarget tracking technique
multi-target tracking
intruder
higher level authentication procedure
higher level authentication overhead
Gaussian processes
Gaussian process
fingerprint identification
Communication system security
channel response tracking
Channel estimation
automatic learning