Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile ad hoc networks
biblio
AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments
Submitted by Anonymous on Mon, 12/07/2015 - 4:40pm
mobile ad hoc networks
telecommunication traffic
telecommunication security
secret verification message routing
Routing protocols
Routing
Public key
onion routing
mobile nodes
mobile computing
Mobile ad hoc networks (MANETs)
AASR protocol
MANET
key-encrypted onion routing
fake routing packets
denial-of-service broadcasting
Cryptographic Protocols
authenticated routing
authenticated anonymous secure routing protocols
anonymous routing
adversarial environments
Ad hoc networks
biblio
A temporal packet marking detection scheme against MIRA attack in MANET
Submitted by BrandonB on Wed, 05/06/2015 - 2:07pm
packet marking
Topology
time behavior
Throughput
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing
resource constraint
physical security
packet transmission
packet radio networks
packet marking detection scheme
clustering
mobile ad-hoc network
mobile ad hoc networks
Misleading routing attack (MIRA)
misleading routing attack
MIRA attack
MANET
malicious nodes detection
IP networks
energy constraint operations
dynamic topology
delays
delay packet
biblio
Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining
Submitted by BrandonB on Wed, 05/06/2015 - 2:01pm
route discovery mechanism
mobile computing
packet flow
Peer-to-peer computing
peer-to-peer infrastructure
proactive protocols
Protocols
random topology
reactive protocols
mobile ad-hoc networks
route discovery procedure
Routing
routing data
Routing protocols
telecommunication security
zone routing protocol
ZRP
ZRP based MANET
intrusive behavior
clustering technique
Data mining
Data Transmission
Flowcharts
IARP
IDS effective k-means clustering
IERP
intrusion detection system
Ad-Hoc Network
k-means
K-means clustering method
local routing information
malicious activity
malicious nodes
MANET
MANET security
mobile ad hoc networks
biblio
A self-organized key management scheme for ad hoc networks based on identity-based cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 1:47pm
Ad hoc networks
authentication
Cryptography
identity based cryptography
informal analysis
key management
mobile ad hoc networks
Proposals
Public key
security
self-organization
self-organized key management
biblio
Secure Routing with an Integrated Localized Key Management Protocol in MANETs
Submitted by BrandonB on Wed, 05/06/2015 - 1:33pm
mobile ad hoc network (MANET)
Secure Routing
routing security
Routing protocols
Routing Protocol
Routing
public key cryptography
Public key
neighbor based handshaking and least common multiple
mobile computing
mobile ad hoc networks
Ad hoc networks
mobile ad hoc network
MANET
key management protocol
key management
Intrusion Detection System (IDS)
intrusion detection system
integrated localized key management protocol
Cryptographic Protocols
broadcast key distribution mechanism
authentication
biblio
A self-organized key management scheme for ad hoc networks based on identity-based cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 1:21pm
Ad hoc networks
authentication
Cryptography
identity based cryptography
informal analysis
key management
mobile ad hoc networks
Proposals
Public key
security
self-organization
self-organized key management
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:20pm
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
Proposed Intrusion Detection on ZRP based MANET by effective k-means clustering method of data mining
Submitted by BrandonB on Wed, 05/06/2015 - 9:05am
route discovery mechanism
mobile computing
packet flow
Peer-to-peer computing
peer-to-peer infrastructure
proactive protocols
Protocols
random topology
reactive protocols
mobile ad-hoc networks
route discovery procedure
Routing
routing data
Routing protocols
telecommunication security
zone routing protocol
ZRP
ZRP based MANET
intrusive behavior
clustering technique
Data mining
Data Transmission
Flowcharts
IARP
IDS effective k-means clustering
IERP
intrusion detection system
Ad-Hoc Network
k-means
K-means clustering method
local routing information
malicious activity
malicious nodes
MANET
MANET security
mobile ad hoc networks
biblio
AHP, fuzzy sets and TOPSIS based reliable route selection for MANET
Submitted by BrandonB on Wed, 05/06/2015 - 9:03am
mobile ad-hoc network
triangular fuzzy numbers
TOPSIS based reliable route selection
TOPSIS
telecommunication security
telecommunication network routing
technique-for-order performance-by-similarity-to-ideal solution
source node
Routing protocols
Routing
Pragmatics
number theory
multiple route ranking
AHP
mobile ad hoc networks
MCDM
MANET
linguistic values
Fuzzy sets
fuzzy set theory
Fuzzy logic
destination node
criteria weights
analytical hierarchy process
analytic hierarchy process
AHP based reliable route selection
biblio
Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 9:02am
NS-2 simulation
wireless ad hoc networks
Wireless ad hoc network
Vectors
trust value
Trust management
telecommunication traffic
security threats
security
Routing protocols
Routing
reactive routing protocol
partial received packets
packet dropping attacks
Packet dropping
Ad hoc networks
network traffic
mobile ad hoc networks
malicious packet dropping
malicious node
low false positive probability
dynamic trust model
DoS attack
denial of service attack
Conferences
Computers
computer network security
Black hole attack
AODV
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »