Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
personal area networks
biblio
A Secure PMIPv6-Based Group Mobility Scheme for 6L0WPAN Networks
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
IP-based sensing devices
transport protocols
symmetric encryption method
Servers
secure PMIPv6-based group mobility scheme
Resiliency
resilience
pubcrawl
proxy mobile IPv6
Protocols
PMIPv6
personal area networks
mobility management (mobile radio)
low power wireless personal area networks
6L0WPAN
IoT
Internet Protocol version 6
Internet of Things
internet
Handover
Cyber Physical Systems Security
Cryptography
composability
authentication
6LoWPAN group handover scheme
6LoWPAN
6L0WPAN networks
biblio
Efficient Probing of Heterogeneous IoT Networks
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
intrusion protection system
software heterogeneity
Servers
security
Resiliency
resilience
pubcrawl
Protocols
Probes
personal area networks
network technology
network security
Network scans
network scan
IoT devices
IoT
6LoWPAN
Internet of Things
internet
interconnectivity
IEEE 802.15 Standard
IEEE 802.11 Standard
heterogeneous IoT networks
hardware heterogeneity
Fingerprinting
Cyber Physical Systems Security
computer network security
composability
complex security protocols
Bandwidth
active network measurements
biblio
Review on Mechanisms for Detecting Sinkhole Attacks on RPLs
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
RPL
Peer-to-peer computing
personal area networks
pubcrawl
resilience
Resiliency
Routing attack
Routing Protocol
Routing protocols
network topology
RPL components
security
Sinkhole attack
telecommunication security
Topology
wireless sensor networks
WSN
IP networks
composability
computer network security
Cyber Physical Systems Security
existing detection mechanisms
existing security challenges
internet
Internet of Things
Internet Protocol version 6
6LoWPAN
IPv6 packet
limited resources
lossy network
low power wireless personal area networks
maintenance engineering
network damage
network layer
biblio
Experimental Study of IP Spoofing Attack in 6LoWPAN Network
Submitted by grigby1 on Mon, 03/19/2018 - 12:45pm
IPv6 protocol
wrong IPv6-MAC binding
telecommunication power management
RPL
Routing protocols
Resiliency
resilience
Registers
pubcrawl
personal area networks
memory consumption
Media Access Protocol
low power personal area networks
lossy personal area networks
IPv6 Spoofing
6LoWPAN
IP spoofing attack
IP networks
Internet of Things
energy consumption
encryption
Cyber Physical Systems Security
Cooja Simulator
computer network security
composability
access protocols
6LoWPAN-ND
6LoWPAN network
6LoWPAN control messages
biblio
The Effect of Buffer Management Strategies on 6LoWPAN's Response to Buffer Reservation Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:45pm
resilience
Internet of Things
IoT security
packet drop rate
packets tags
PDR
personal area networks
Protocols
pubcrawl
fragmentation-based buffer reservation DoS attacks
Resiliency
Scoring Systems
slotted buffer
Split Buffer
split buffer mechanism
TCP-IP model
vehicular networking applications
composability
6L0WPAN adaptation layer
6LoWPAN
Adaptation models
buffer circuits
buffer cleanups
buffer management strategies
Buffer Reservation
Buffer storage
6L0WPAN
Computer crime
computer network security
Current measurement
Cyber Physical Systems Security
defence strategies
Fragmentation Attacks
fragmentation-based buffer reservation denial of service attacks
biblio
Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks
Submitted by grigby1 on Mon, 03/19/2018 - 12:45pm
sensor nodes
personal area networks
power consumption
Protocols
pubcrawl
remote server
resilience
Resiliency
resource-constrained sensors
S3K technique
Scyther security protocol verification tool
personal area network identification
sensors
Servers
session key distribution
symmetric key establishment method
telecommunication network routing
telecommunication power management
telecommunication security
trust anchor
wireless sensor networks
Cryptography
6LoWPAN wireless sensor networks
authentication
CBC mode
cipher block chaining
composability
Contiki
ContikiOS
Cooja Simulator
Cryptographic Protocols
6LoWPAN
Cyber Physical Systems Security
datagram transport layer security
DTLS
EAKES6Lo technique
Edge router
LAUP
lightweight authentication protocol
Lucky Thirteen attack
PAN ID
biblio
System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet
Submitted by K_Hooper on Wed, 02/28/2018 - 10:38am
obscuration technique
Logic gates
Metrics
moving target defense
moving target IPv6 defense
MT6D processor
network address
network infrastructure
network level
network packet processor
network processor
network time protocol listener
keyed access
operating system kernel
operating system kernels
personal area networks
Protocols
pubcrawl
Register Transfer Level network security processor implementation
Resiliency
Routing protocols
RTL development
system architectural design
system level functions
federal networks
application specific integrated circuits
ASIC
CISC architecture
Clocks
collaboration
complex instruction set computer architecture
composability
computer network security
cryptographic dynamic addressing
Encapsulation
Engines
application specific integrated circuit variant
FPGA
Hardware
hardware engine
HE-MT6D
Homeland Security Cyber Security Division
IEEE 802.3 Ethernet
Instruction sets
internet
IP networks
IPv6
ipv6 security
biblio
Towards an FPGA-based network layer filter for the Internet of Things edge devices
Submitted by grigby1 on Thu, 04/20/2017 - 11:40am
IPv6
system-on-chip implementation
system-on-chip
security
Scalability
Resiliency
pubcrawl
personal area networks
Packet Filter
network on chip security
network on chip
low-power resource constrained devices
IPv6 Link-local address calculator
6LoWPAN
Internet-of-Things (IoT)
Internet of Things edge devices
Internet of Things
IEEE 802.15.4 radio modules
FPGA-based network layer filter
FPGA
Filters
field programmable gate arrays
Contiki-OS
composability
6LoWPAN adaptation layer
biblio
A decentralized approach for security and privacy challenges in the Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 10:06am
Information Leakage
wireless technologies
user privacy
sensitive data management
security challenges
security
public key cryptography
privacy
personal area networks
lightweight token
IoT stakeholders
IoT deployment
Internet of Things
internet
6LoWPAN
elliptic curve digital signature algorithm
ECDSA
distributed capability-based access control mechanism
distributed access control
digital signatures
data privacy
Cryptography
cryptographic primitives
computer network security
CoAP resources
authorization
authorisation
authentication
biblio
Bluetooth technology: ApXLglevel end-to-end security
Submitted by BrandonB on Mon, 05/04/2015 - 12:22pm
NIST Guide
encryption
file transfer
framework compatibility
framework reliability
Indexes
Java
Java language
Mobile communication
mobile phone
MS-Windows 7 operating system
music streaming
embedded appliances
operating system
operating systems (computers)
PAN
personal area network
personal area networks
privacy concern
programming languages
Satellites
security concern
smart phones
strong mutual authentication
communication technologies
ANSI C language
application-layer framework
ApXLglevel end-to-end security
audio streaming
authentication
authorisation
Binary Payload
Bluetooth
Bluetooth security specification
Bluetooth technology
C language
Android operating system
computer network reliability
computer network security
computing technologies
confidentiality
configurable add-on devices
cryptographic service providers
Cryptography
customizable add-on devices
data confidentiality
data integrity
« first
‹ previous
1
2
3