Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
received signal strength
biblio
Spoofing Attack Detection Using Physical Layer Information in Cross-Technology Communication
Submitted by grigby1 on Mon, 08/26/2019 - 11:10am
pubcrawl
ZigBee packets
Zigbee
wireless sensor networks
wireless networks
wireless LAN
Wireless fidelity
Wi-Fi devices
telecommunication security
spoofing attack detection
RSSI
RSS
Resiliency
resilience
received signal strength
authentication mechanism
physical layer information
Physical layer
packet radio networks
ISM band
heterogeneous wireless networks
heterogeneous wireless devices
frequency 2.4 GHz
CTC schemes
cross-technology communication
Cross Layer Security
composability
Communication system security
collaborative mechanism
biblio
Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
lightweight sybilfree-APIT algorithm
Metrics
wireless localization schemes
wireless devices
Wireless communication
SF-APIT scheme
SF-APIT
sensor placement
sensor nodes
secure APIT localization scheme
RSSI
received signal strength
range-free method
location-aware applications
localization
telecommunication security
hostile WSN
distributed WSNs
distributed WSN
distributed wireless sensor networks
detection rate
Cryptography
Communication system security
antennas
Peer-to-peer computing
sybil attacks
Global Positioning System
wireless sensor networks
composability
pubcrawl
biblio
Prevention of multiple spoofing attacks with dynamic MAC address allocation for wireless networks
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
MAC Spoofing attacks
wireless networks
Wireless Network Security
Wireless communication
telecommunication security
spoofing attack detection
received signal strength
radio networks
Monitoring
MD5 hashing
Accuracy
Hardware
EPAM clustering
enhanced partitioning around medoid
Electronic mail
dynamic MAC address allocation
Cryptography
Broadcasting
Attacks Detection and Prevention