Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
AODV protocol
biblio
Detecting Sybil Attack, Black Hole Attack and DoS Attack in VANET Using RSA Algorithm
Submitted by grigby1 on Wed, 03/23/2022 - 11:34am
Metrics
wireless sensor networks (WSN)
Sybil attack
sybil attacks
Black hole attack
AODV protocol
DoS attack
Routing protocols
vehicular ad hoc networks
tools
composability
wireless sensor networks
Throughput
Heuristic algorithms
Resiliency
resilience
pubcrawl
security
biblio
To Detect and Prevent Black Hole Attack in Mobile Ad Hoc Network
Submitted by aekwall on Mon, 02/07/2022 - 5:09pm
Compositionality
mobile computing
Monitoring
pubcrawl
Routing
Routing protocols
manet attack prevention
Resiliency
Metrics
mobile ad hoc networks
AODV
AODV protocol
Black hole attack
data transfer
Detection and Prevention.
MANET
MANET Attack Detection
biblio
An Efficient and Reliable Routing Protocol Using Bio-Inspired Techniques for Congestion Control in WSN
Submitted by grigby1 on Wed, 12/02/2020 - 1:51pm
network performance
wireless sensor networks
Wireless Sensor Network
telecommunication congestion control
Scalability
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
Packet loss
AODV protocol
network delay
delays
cuckoo search algorithm
coupled congestion control
congestion recognition
congestion problem
congestion free path
Congestion Control
congested resources
bioinspired techniques
artificial bee colony algorithm.
biblio
DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
log entries
anomalies detection
anomalous nodes
black-hole attack
collaborative malicious nodes
DAPV
diagnosing anomalies
direct attacks
distributed verification
expected log information
indirect attacks
abnormal nodes
malicious intermediated routers
MANET routing mechanism
Merkle hash tree
paralyzed nodes
privacy-preserving verification
provenance tracking
routing phase
university campus networks
Wireless Network Security
manet privacy
mobile radio
data privacy
telecommunication security
security
Resiliency
pubcrawl
Routing protocols
privacy
Routing
Peer-to-peer computing
Metrics
security of data
mobile ad hoc networks
Ad hoc networks
mobile computing
single nodes
central control program
cognition
routing phases
routing security
Compositionality
AODV protocol
biblio
Detecting Black hole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET
Submitted by grigby1 on Thu, 10/29/2020 - 11:23am
Hybrid Security Method
AODV protocol
AOMDV
AOMDV protocol
AOMDV routing protocol
appropriate routes
Diffie-Hellman algorithm
Diffie-Hellman key exchange algorithm
Distance vector routing protocols
ad hoc network
Normalized Routing Load
on-demand routing protocols
SHA-3 algorithm
single route discovery
useful internet protocol
wireless ad hoc networks
MANET Attack Detection
message passing
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
Routing
computer science
Routing protocols
security
Compositionality
AODV
Black hole attack
MANET
mobile ad hoc networks
detection
mobile ad hoc network
biblio
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks
Submitted by aekwall on Tue, 05/26/2020 - 11:03am
Metrics
unmanned aerial unit
uav
telecommunication security
security vulnerabilities
security
Routing protocols
Routing Protocol
Routing
Resiliency
pubcrawl
NS3 simulator
network security
mobile adhoc networks
mobile ad hoc networks
ad hoc on-demand distance vector routing
MANET security
MANET routing protocol
MANET AODV protocol
MANET
Loss measurement
IoT
Internet of Things
disaster recovery
delays
Compositionality
automata
AODV protocol
AODV based adhoc networks
biblio
Simulation Based Study of Blackhole Attack Under AODV Protocol
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
Ad hoc networks
unauthorized node
target node
open access
Mobile adhoc Network
MANET nodes
Blackhole
AODV
AODV protocol
Blackhole attack
NS-2
mobile computing
Scalability
Throughput
mobile ad hoc networks
MANET
delays
Handheld computers
Routing
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network
Submitted by aekwall on Tue, 05/26/2020 - 10:57am
Loss measurement
Packet loss rate
ns-3 network simulator
network performance parameters
mobile nodes
mobile multihop network
MANET security measurement
internal attacks
intermediate nodes
end-to-end delay
blackhole nodes
blackhole attack feature extraction
Blackhole attack
AODV
AODV protocol
external attacks
IoT
mobile ad hoc network
Throughput
mobile ad hoc networks
MANET
network security
ns-3
Routing
Routing protocols
pubcrawl
Resiliency
feature extraction
security
telecommunication security
Internet-of-Things
Scalability
biblio
Simulation of MANET's Single and Multiple Blackhole Attack with NS-3
Submitted by aekwall on Tue, 05/26/2020 - 10:57am
Mobile ad hoc networks (MANETs)
ad hoc nature
AODV protocol
battery power
central authority
dynamic topologies
IEEE 802.11ac protocol
industrial fields
memory space
Blackhole attack
mobile ad-hoc networks
mobility model
multiple Blackhole attack
NS-3 simulator
NS-3.27 simulator
OLSRprotocol
physical protection
single Blackhole attack
network nodes
telecommunication security
network security
Resiliency
pubcrawl
Routing protocols
Routing
mobile radio
delays
Scalability
Relays
wireless LAN
MANET
mobile ad hoc networks
telecommunication network topology
Ad hoc networks
mobile computing
fixed infrastructure
biblio
Mitigating techniques of black hole attack in MANET: A review
Submitted by grigby1 on Wed, 06/20/2018 - 12:41pm
Metrics
wireless connections
Wireless communication
telecommunication security
telecommunication network topology
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
mobile ad-hoc network
mobile ad hoc networks
Ad-hoc On-demand Distance Vector
Market research
MANET
infrastructure-less network
dynamic topology
detection and prevention
Compositionality
black hole node
Black hole attack
attack mitigation
AODV routing protocol
AODV protocol
1
2
next ›
last »