Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
AODV
biblio
A Hybrid Approach for Dynamic Intrusion Detection, Enhancement of Performance and Security in MANET
Submitted by grigby1 on Wed, 08/02/2017 - 12:41pm
AODV
Black hole attacks
DDoS attack Flooding attack
detection
malicious nodes
MANET
manet attack prevention
pubcrawl
biblio
Implementation and Analysis of Blackhole Attack in AODV Routing Protocol
Submitted by grigby1 on Wed, 08/02/2017 - 12:41pm
AODV
Blackhole
detection
MANET
manet attack prevention
Packet
pubcrawl
RREP
RREQ
biblio
An Efficient Approach for Wormhole Detection in MANET
Submitted by grigby1 on Wed, 08/02/2017 - 12:40pm
AODV
detection
MANET
manet attack prevention
pubcrawl
security
wormhole attack
biblio
Flooding attacks detection in MANETs
Submitted by grigby1 on Tue, 03/07/2017 - 12:43pm
MANET
traffic generation
telecommunication traffic
statistical analysis
security threats
RREQ flooding attacks
Routing protocols
Routing
route discovery
pubcrawl170109
mobile ad hoc networks
Ad hoc networks
IP networks
flooding attack detection
DoS
denial of service
computer networks
computer network security
Computer crime
AODV
ah hoc on-demand distance vector
biblio
Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:02am
NS-2 simulation
wireless ad hoc networks
Wireless ad hoc network
Vectors
trust value
Trust management
telecommunication traffic
security threats
security
Routing protocols
Routing
reactive routing protocol
partial received packets
packet dropping attacks
Packet dropping
Ad hoc networks
network traffic
mobile ad hoc networks
malicious packet dropping
malicious node
low false positive probability
dynamic trust model
DoS attack
denial of service attack
Conferences
Computers
computer network security
Black hole attack
AODV
biblio
A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:58am
public key cryptography
wireless sensor networks
Wireless Sensor Network
statistical en-route filtering
Statistical En-Route
security
secure routing method
Secure Routing
Routing protocols
Routing
ad hoc on demand distance vector protocol
Protocols
individual sensor nodes
Gray hole attack
false report detection
Elliptic curve cryptography
ECC
Base stations
AODV protocol
AODV
biblio
C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:54am
modified credit strategy
tokens renewal
Token
telecommunication security
security
Routing protocols
Routing
Q-factor
Protocols
network layer security protocol
network layer attacks
Ad hoc networks
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
Energy Efficiency
E2-SCAN protocol
CSCAN
credit-based strategy
conditional SCAN
AODV
biblio
Anonymity, unlinkability and unobservability in mobile ad hoc networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:13pm
telecommunication network topology
public-private key pairs
route discovery process
Routing
Routing protocols
routing schemes
secure communications
security
security attacks
public key cryptography
telecommunication security
unlinkability
unobservability
user privacy
USOR
wired networks
Wireless communication
Ad hoc networks
private key cryptography
ns2
mobile ad hoc networks
ID based encryption scheme
group signature scheme
dynamic topology
cryptosystems
Cryptography
cooperative communication
cooperative algorithms
Communication system security
centralized monitoring
AODV
anonymous routing
anonymity
« first
‹ previous
1
2
3
4
5