Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IEEE 802.11s
biblio
Extending the FLExible Network Tester (Flent) for IEEE 802.11s WLAN Mesh Networks
Submitted by grigby1 on Fri, 12/02/2022 - 11:16am
Linux
network performance
Measurement Tools
IEEE 802.11s
Flent
Mesh networks
wireless mesh networks
WLAN
wireless LAN
Software measurement
pubcrawl
Routing
composability
performance evaluation
Throughput
Software
Resiliency
resilience
Metrics
biblio
UFAP: Ultra-fast handoff authentication protocol for wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 2:06pm
mobile radio
wireless mesh networks
Wireless communication
Ultra-fast handoff authentication protocol
UFAP
trust-based
token-based authentication protocol
token-based
ticket-based
telecommunication security
Servers
resilience
pubcrawl
Protocols
mobility management (mobile radio)
authentication
mobile devices
Metrics
IEEE 802.11s
id-based
handoff authentication protocol
Handoff
extensible authentication protocol
EAP-TLS
EAP-PEAP
delays
Cryptography
Cryptographic Protocols
composability
Communication system security
biblio
Cryptographic key management methods for mission-critical wireless networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
IEEE 802.11s
data communication security
DH-HEMTs
disasters
DoS attack problem
EHPFS
emergency related information
emergency response communications
emergency services
enhanced 4-way handshake with PFS support
fast pairwise key generation
IEEE 802.11 Standard
cryptographic keys
landline phone
mesh router
neighboring mesh routers
perfect forward secrecy (PFS)
primary master key
rekeying protocols
secure communication system
session key generation
session key PTK
wireless LAN
wireless mesh networks
computer network security
resilience
pubcrawl
Resiliency
Human behavior
Protocols
Scalability
authentication
Cryptographic Protocols
key management
message authentication
authorisation
Access Control
data integrity
telecommunication traffic
Metrics
security requirements
adequate communication services
authentication protocol
Cellular networks
communication infrastructures
community resources
critical-mission wireless mesh networks
cryptographic key management methods
biblio
Neighborhood area network security in smart grid using security enhanced key updating
Submitted by grigby1 on Tue, 03/07/2017 - 1:33pm
simple one-way hash function based scheme
PCL
power system security
process analysis toolkit
protocol composition logic
Protocols
pubcrawl170109
SAE protocols
security attacks
security enhanced key updating
PAT
simultaneous authentication of equals protocols
Smart Grid
smart grid infrastructure
Smart Grids
smart power grids
telecommunication security
wireless mesh networks
WMNs
EMSA protocol
Communication networks
Computer crime
Cryptographic Protocols
cyber-attacks
denial of service attack
DoS attack
efficient mesh security association protocols
EMSA
authentication
EMSA protocols
IEEE 802.11s
key refreshment strategy
Logic gates
mesh key holder security handshake
MKHSH
NAN
neighborhood area network security
biblio
Making active-probing-based network intrusion detection in Wireless Multihop Networks practical: A Bayesian inference approach to probe selection
Submitted by BrandonB on Fri, 05/01/2015 - 9:48am
probe selection algorithm
WMN
wireless multihop networks
wireless mesh networks
Wireless communication
testing
testbed experimentation
Telecommunication standards
spread spectrum communication
security of data
security
Probes
active-probing-based network intrusion detection system
Intrusion Detection
indoor wireless mesh testbed
indoor communication
IEEE 802.11s
Equations
Bayesian model
Bayesian inference
Bayes methods
Bayes inference
AP-NIDS DogoIDS
biblio
Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking
Submitted by BrandonB on Fri, 05/01/2015 - 9:47am
Smart Grids
network performance
network resiliency improvement
plant-generation local area networks
Protocols
SAE
security attacks
security protocols
simultaneous authentication-of-equals
Smart Grid
smart grid mesh network security enhancement
neighborhood area networks
smart power grids
substation local area networks
Substations
trees (mathematics)
wireless LAN
wireless local area networks
wireless mesh networks
wireless sensor networks
WLAN
efficient mesh security association
Computer crime
computer network performance evaluation
computer network security
cost-ef- fective communications
Cryptographic Protocols
cyber attack
denial-of-service attack model
distributed mesh sensor networks
dynamic key distribution strategy updating
authentication
EMSA
HAN
home area networks
home networks
IEEE 802.11s
Logic gates
Merkle tree 4-way handshaking scheme
Mesh networks
NAN