Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
AODV
biblio
Performance Analysis of AODV and DSR Routing Protocols of MANET under Wormhole Attack and a Suggested Trust Based Routing Algorithm for DSR
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
mobile ad hoc network
wormhole tunnels
wormhole attack
trust
Throughput
telecommunication security
suggested trust based routing algorithm
spoofing attack
self-assembly
Routing protocols
routing algorithm
Routing
Resiliency
pubcrawl
Performance analysis
mobile ad hoc networks
Attack vectors
Metrics
MANET security
MANET
Jitter
dynamic source routing
DSR routing protocols
Dsr
delays
Compositionality
common routing protocols
Black hole attack
AODV routing protocols
AODV
Ad-hoc On-demand Distance Vector
biblio
Analysis of Malicious Behavior of Blackhole and Rushing Attack in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
NS-2
wireless links
telecommunication security
telecommunication network routing
security attacks
security
rushing attack
Rushing
Resiliency
quality of service
QoS metrics
pubcrawl
AODV
network nodes
Mobile adhoc Network
mobile ad hoc networks
Metrics
MANET security
MANET
malicious behavior
Compositionality
Blackhole attack
Blackhole
biblio
Behaviour Analysis and Detection of Blackhole Attacker Node under Reactive Routing Protocol in MANETs
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
Scalability
Resiliency
pubcrawl
Routing
Routing protocols
collaboration
Throughput
MANETs
Ad hoc networks
mobile computing
AODV
Blackhole attack
Blackhole
Energy
PDR
Routing Protocol
biblio
Simulation Based Study of Blackhole Attack Under AODV Protocol
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
Ad hoc networks
unauthorized node
target node
open access
Mobile adhoc Network
MANET nodes
Blackhole
AODV
AODV protocol
Blackhole attack
NS-2
mobile computing
Scalability
Throughput
mobile ad hoc networks
MANET
delays
Handheld computers
Routing
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network
Submitted by aekwall on Tue, 05/26/2020 - 9:57am
Loss measurement
Packet loss rate
ns-3 network simulator
network performance parameters
mobile nodes
mobile multihop network
MANET security measurement
internal attacks
intermediate nodes
end-to-end delay
blackhole nodes
blackhole attack feature extraction
Blackhole attack
AODV
AODV protocol
external attacks
IoT
mobile ad hoc network
Throughput
mobile ad hoc networks
MANET
network security
ns-3
Routing
Routing protocols
pubcrawl
Resiliency
feature extraction
security
telecommunication security
Internet-of-Things
Scalability
biblio
Gray Hole Attack Analysis in AODV Based Mobile Adhoc Network with Reliability Metric
Submitted by grigby1 on Mon, 03/09/2020 - 1:39pm
mobile ad hoc network
telecommunication security
telecommunication network reliability
Security Metrics
security
Routing protocols
Routing
Resiliency
reliability metric
Reliability engineering
ns-2.35 simulation software
network reliability
network nodes
mobile ad-hoc network
mobile ad hoc networks
pubcrawl
Metrics
Measurement
MANET
gray hole node
gray hole attack analysis
Gray hole attack
Compositionality
common security attacks
AODV routing protocol
AODV
ad hoc on demand distance vector routing protocol
Ad Hoc Network Security
active research work
biblio
Detection of malicious node in mobile ad-hoc network
Submitted by grigby1 on Mon, 01/21/2019 - 11:32am
mobile ad hoc networks
wireless links
Wireless communication
telecommunication network routing
selective acknowledgment
security
Routing protocols
routing overhead
Routing
Resiliency
pubcrawl
NS2 simulation
network security
network packet delivery ratio
mobile nodes
Ad Hoc Network Security
mobile ad hoc network
Metrics
MANET
malicious node detection
malicious node
intrusion detection mechanisms
firewalls software
firewalls
encryption software
Cryptography
Compositionality
Communication system security
AODV
adaptive acknowledgment
biblio
Analysis of the effect of malicious packet drop attack on packet transmission in wireless mesh networks
Submitted by aekwall on Wed, 01/16/2019 - 1:06pm
school campus networks
packet transmission
participating nodes
Peer-to-peer computing
pubcrawl
resilience
Routing
routing nodes
Routing Protocol
Routing protocols
packet delivery ratio
service coverage
telecommunication security
transmitted data packets
ubiquitous wireless networks
wireless mesh network
wireless mesh networks
wireless sensor networks
WMNs
influential factors
AODV
black hole
Black hole attack
community networking
composability
emergency rescue operations
home automation
IEEE 802.11 Standard
Ad hoc networks
Malicious Packet Drop
malicious packet drop attack
Metrics
multihop destination
network maintenance
network performance reliability
NS-3 simulator
office automation
biblio
A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network
Submitted by grigby1 on Wed, 06/20/2018 - 11:42am
Resiliency
mobile ad-hoc network
movables nodes
multihop communication
overhearing
Peer-to-peer computing
protocol
pubcrawl
resilience
mobile ad hoc networks
Routing
Routing protocols
sequence number
source nodes
telecommunication security
telecommunication traffic
wireless networking field
AODV
Metrics
MANET
IDS
high destination sequence number
destination nodes
delays
data packets
cross checking
Conferences
Compositionality
clustering
byzantine attacks
Blackhole
black-hole attack mitigation techniques
attack mitigation
biblio
STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET
Submitted by grigby1 on Wed, 06/20/2018 - 11:42am
Metrics
trust level
telecommunication security
STAODV
service attack
security
secure trust based approach
Routing protocols
Routing
Resiliency
resilience
pubcrawl
participating node
network layer
network architecture
mobile ad hoc networks
adjacent nodes
MANET security
MANET force
MANET
malicious node
Conferences
Computational modeling
Compositionality
blackhole attack mitigation
Blackhole attack
Base stations
autonomous nodes
attack mitigation
AODV routing protocol
AODV based MANET
AODV
« first
‹ previous
1
2
3
4
5
next ›
last »