Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
personal area networks
biblio
Even Black Cats Cannot Stay Hidden in the Dark: Full-band De-anonymization of Bluetooth Classic Devices
Submitted by grigby1 on Mon, 12/28/2020 - 12:28pm
resilience
Human behavior
identified privacy attack
laptops
Lower Address Part
master device
personal area networks
piconet master
privacy
privacy attacks
privacy guarantees
pubcrawl
high data rates
Resiliency
software radio
Software-defined Radio based sniffer
Synchronization
telecommunication traffic
tethering
tracking attacks
Upper Address Part
Wireless communication
wireless headsets
wireless sensor networks
BT spectrum analysis
apparently benign information
audio streaming
audio streaming voice calling
automobiles
black cats
BLE
Bluetooth
Bluetooth Classic devices
bluetooth low energy
bluetooth security
BT addresses
address randomization
car stereo systems
Clocks
composability
computer network security
data privacy
de-anonymization technique
facto connectivity technology
frame encoding
frequency 79.0 MHz
Full-band De-anonymization
biblio
A Proof of Concept Denial of Service Attack Against Bluetooth IoT Devices
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
wireless LAN
bluetooth security
study Bluetooth security
study Bluetooth device security
proof-of-concept DoS attack
operation necessitates special hardware
frequency-hoping spread spectrum technique
forming ad hoc networks
device-to-device communications
concept denial
Bluetooth technologies
Bluetooth IoT devices
Bluetooth devices security
denial of service
wireless networks
human computer interaction
tools
Ad hoc networks
composability
standards
personal area networks
Protocols
telecommunication security
Software
computer network security
Resiliency
resilience
Human behavior
pubcrawl
Bluetooth
security
Internet of Things
biblio
Design Considerations for Low Power Internet Protocols
Submitted by aekwall on Mon, 12/21/2020 - 1:29pm
interoperability
small maximum transfer unit
low-power wireless networks
low power Internet protocols
IPv6 connectivity
design considerations
code size
Resiliency
telecommunication network planning
IEEE 802.15 Standard
personal area networks
telecommunication network reliability
IoT
Bluetooth
embedded systems
Energy Efficiency
6LoWPAN
internet
energy conservation
composability
pubcrawl
power aware computing
Protocols
IP networks
biblio
Gambling on fairness: a fair scheduler for IIoT communications based on the shell game
Submitted by aekwall on Mon, 12/21/2020 - 1:28pm
IoT-IIoT networks
Job shop scheduling
Resiliency
advanced network protocol stack
coordinator node
fair scheduling strategy
IEEE 802.15.4 low-bitrate
IIoT communication paradigm
industrial Internet of Things paradigm
industrial machine sensors
iiot
low-energy MAC protocol
low-power wireless personal area networks
LoWPAN
Media Access Protocol
shell game
time-slot allocation
time-slotted channel hopping networks
TSCH
TSCH networks
sensors
IP networks
Internet of Things
pubcrawl
composability
resource management
6LoWPAN
Energy Efficiency
industrial automation
Games
IoT
wireless channels
scheduling
personal area networks
IPv6
IEEE 802.15 Standard
IEEE 802.15.4
access protocols
telecommunication scheduling
fairness
biblio
Performance Evaluation of RPL protocol in a 6LoWPAN based Smart Home Environment
Submitted by aekwall on Mon, 12/21/2020 - 1:28pm
IoT enabled smart home environment
Telecommunication standards
Wireshark
PDR
Device-to-device communication
Home appliances
Resiliency
Cooja Simulator
Contiki OS
Routing Protocol
IPv6 network protocol
IPv6-enabled 6LoWPAN
low range wireless applications
low-range communication protocol
network analyzer tool
short-range IoT applications
smart home architecture
mobile radio
IP networks
Internet of Things
pubcrawl
composability
Routing protocols
telecommunication power management
RPL protocol
6LoWPAN
RPL
telecommunication computing
Throughput
home computing
Smart Home
smart home environment
smart cities
personal area networks
biblio
Computational Analysis of Security Algorithm on 6LowPSec
Submitted by aekwall on Mon, 12/21/2020 - 1:26pm
radio links
IPv6 communication process
light weight IPSec
light weight variant
lightweight-based security need
message authentication
Peer-to-peer computing
personal area networks
pubcrawl
IP networks
Routing
Routing protocols
security
security Algorithm
security approach
security solutions
telecommunication security
word length 128.0 bit
AES
Resiliency
composability
Metrics
policy-based governance
6LoWPAN
6LoWPAN IoT environment
6LoWPAN radio link
6LowPSec protocol
ipv6 security
Ciphers
computer network security
Cryptographic Protocols
existing security protocol IPSec solutions
internet
Internet of Things
IoT
biblio
Simulating RPL Attacks in 6lowpan for Detection Purposes
Submitted by aekwall on Mon, 12/21/2020 - 1:26pm
electronic devices
RPL protocol functioning
RPL attacks
routing protocol for low-power and lossy networks
IPv6 over low-power wireless personal area networks
Cooja Simulator
contiki operating system
attack condition
6LoWPAN networks
Resiliency
Packet loss
WSN
network components
personal area networks
LLN
telecommunication network topology
routing attacks
6LoWPAN
Cybersecurity
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
IoT devices
Internet of Things
IP networks
computer network security
biblio
Security and privacy in a middleware for large scale mobile and pervasive augmented reality
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
pervasive augmented reality
virtual elements
ubiquitous computing
testing
security of data
security architecture
Scalability
resilience
pubcrawl
privacy architecture
privacy
pervasive large scale augmented reality games
pervasive computing
Application software
personal area networks
mobile computing
mobile augmented reality games
middleware architecture
middleware
Large-scale systems
information security
Human behavior
data privacy
computer games
computer architecture
augmented reality
biblio
Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
network devices
Watchdog based approaches
Strainer based intrusion detection of blackhole in 6LoWPAN for the Internet of Things
SIEWE
Scalability
RPL
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
promiscuous mode
personal area networks
packet delivery ratio
network lifetime
6LoWPAN based Internet of Things
Measurement
malicious blackhole nodes
Linear programming
Intrusion detection mechanism
Intrusion Detection
Internet of Things
DoS attacks
computer network security
computer network reliability
Blackhole formation
Blackhole detection
Blackhole attack
Blackhole
anomaly based approach
biblio
Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
IoT environment
topological isolation
smoothing methods
low power and lossy network
IPv6 routing protocol over LLN
IPv6 over low power personal area network
Internet of things environment
high performance computing environment
forecasting
exponential window function
exponential smoothing time series data
exponential smoothing
blackhole attack detection approach
Blackhole attack
personal area networks
time series
IoT
blackhole attacks
telecommunication network topology
sensors
RFID
sink node
6LoWPAN
internet
Routing
Routing protocols
pubcrawl
Resiliency
Internet of Things
Scalability
IP networks
RPL
1
2
3
next ›
last »