Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless links
biblio
Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks
Submitted by grigby1 on Mon, 12/28/2020 - 12:03pm
Resiliency
Metrics
mobile ad hoc networks
moving capability
networking domain
participating nodes
pubcrawl
radio range nodes
resilience
MANET
rigid infrastructure
security
telecommunication network topology
telecommunication security
wired line networks
wireless links
wireless medium
wireless technology
finite state machines
active centralized system
ad hoc network
arbitrary basis
attacks
Compositionality
computation termination
execution purpose
finite state machine
MANET Attack Detection
FSM
Handheld computers
high growth rate
highly dynamic topology
hostile free environment
malicious node
malicious node detection
biblio
Key distribution protocol for Identity Hiding in MANETs
Submitted by aekwall on Mon, 11/02/2020 - 1:40pm
identity
authentication scheme
mobile nodes
central administration
mobile ad-hoc networks
anonymous
centralization problem
centralized counterpart
clustered ad-hoc networks
high dense networks
wireless links
identity disclosure
identity hiding
identity spoofing
key distribution protocol
key distribution scheme
networks scales
periodically updated security keys
manet privacy
authentication
Receivers
telecommunication security
Cryptographic Protocols
Resiliency
pubcrawl
malicious nodes
Cryptography
Metrics
data privacy
Routing protocols
MANET
mobile ad hoc networks
MANETs
Ad hoc networks
mobile computing
Compositionality
cluster head
biblio
Analysis of Malicious Behavior of Blackhole and Rushing Attack in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
NS-2
wireless links
telecommunication security
telecommunication network routing
security attacks
security
rushing attack
Rushing
Resiliency
quality of service
QoS metrics
pubcrawl
AODV
network nodes
Mobile adhoc Network
mobile ad hoc networks
Metrics
MANET security
MANET
malicious behavior
Compositionality
Blackhole attack
Blackhole
biblio
New Approach to Secure Cluster Heads in Wireless Sensor Networks
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
inter-cluster communication
cluster head
resource constraints
Aggregation
Cluster.
cryptographic algorithm
genetic algorithm based search
Head
hierarchical architecture security
malicious attacks
intra-cluster communication
multihop approach
node failure probability
overhead communication
overhead computation
secured WSN deployment
wireless links
Wireless Sensor Network
Metrics
telecommunication security
security
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
sensor nodes
Monitoring
Clustering algorithms
probability
genetic algorithms
security threats
sensor security
Topology
data aggregation
biblio
Detection of malicious node in mobile ad-hoc network
Submitted by grigby1 on Mon, 01/21/2019 - 11:32am
mobile ad hoc networks
wireless links
Wireless communication
telecommunication network routing
selective acknowledgment
security
Routing protocols
routing overhead
Routing
Resiliency
pubcrawl
NS2 simulation
network security
network packet delivery ratio
mobile nodes
Ad Hoc Network Security
mobile ad hoc network
Metrics
MANET
malicious node detection
malicious node
intrusion detection mechanisms
firewalls software
firewalls
encryption software
Cryptography
Compositionality
Communication system security
AODV
adaptive acknowledgment
biblio
SAODV: Black hole and gray hole attack detection protocol in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 11:30am
secure AODV protocol
open nature
Peer-to-peer computing
Protocols
pubcrawl
radio links
resilience
Resiliency
SAODV
mobile nature
security attacks
security problem
standards
telecommunication security
Throughput
wireless links
wireless mobile nodes
Ad hoc networks
mobile computing
mobile ad hoc networks
Metrics
MANET
malicious node
gray hole attacks
gray hole attack detection protocol
Gray hole attack
forwarding packets
delays
Cryptographic Protocols
Compositionality
Black hole attack
Attack detection
AODV
biblio
How can botnets cause storms? Understanding the evolution and impact of mobile botnets
Submitted by BrandonB on Wed, 05/06/2015 - 9:10am
malware
wireless links
service requests
quadratic growth
Peer-to-peer computing
node mobility
network bandwidth
mobility range
mobile services
mobile nodes
mobile networks
mobile malware
mobile computing
mobile botnets
botnet propagation storms
last chipper time
invasive software
Internet botnets
internet
exponential growth
epidemic modeling
distributed mechanism
denial-of-service impact
data forwarding
coordinated attacks
computer network security
compromised nodes
biblio
A reliable solution against Packet dropping attack due to malicious nodes using fuzzy Logic in MANETs
Submitted by BrandonB on Wed, 05/06/2015 - 7:57am
MANETs Security Issues
wireless links
security of data
Routing
Reliability engineering
Qualnet simulator 6.1
packet dropping attack
mobile nodes
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
mobile ad hoc network
Ad hoc networks
MANET
Mamdani fuzzy inference system
malicious nodes
Intrusion Detection System (IDS)
intrusion detection system
inference mechanisms
Fuzzy sets
Fuzzy logic
data packets
Artificial Intelligence
biblio
Overview on vehicular ad hoc network and its security issues
Submitted by BrandonB on Wed, 05/06/2015 - 7:52am
telecommunication switching
safekeeping
Safety
security
security issues
self-configurable network connectivity
signal-weakening barrier
telecommunication network routing
telecommunication security
Roads
travel comfort
unauthorized message injection
VANET
vehicles
vehicular ad hoc networks
Vehicular ad-hoc networks (VANET)
vehicular communications
wireless links
eavesdropping
attacks
authentication
Availability
Computer crime
confidentiality
Cryptography
data privacy
data trust
active safety enhancement
information exchange
information transmission
message alteration
message routing
non-repudiation
Position based routing
preventive safety enhancement
privacy
biblio
Probabilistic Breadth-First Search - A Method for Evaluation of Network-Wide Broadcast Protocols
Submitted by BrandonB on Fri, 05/01/2015 - 8:49am
optimization
WMN
wireless mesh networks
wireless links
Wireless communication
simple graph models
search problems
Routing protocols
Protocols
Probabilistic logic
probabilistic edge weights
probabilistic breadth-first search
path lengths
Approximation methods
NWB protocols
NWB optimizations
NWB dissemination
network-wide broadcasts
network-wide broadcast protocols
Monte Carlo methods
Monte Carlo method
Mathematical model
link qualities
graph theory
Complexity theory
complex propagation characteristics