Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile nodes
biblio
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network
Submitted by aekwall on Tue, 05/26/2020 - 9:57am
Loss measurement
Packet loss rate
ns-3 network simulator
network performance parameters
mobile nodes
mobile multihop network
MANET security measurement
internal attacks
intermediate nodes
end-to-end delay
blackhole nodes
blackhole attack feature extraction
Blackhole attack
AODV
AODV protocol
external attacks
IoT
mobile ad hoc network
Throughput
mobile ad hoc networks
MANET
network security
ns-3
Routing
Routing protocols
pubcrawl
Resiliency
feature extraction
security
telecommunication security
Internet-of-Things
Scalability
biblio
A Security Mechanism in DSR Routing for MANET
Submitted by grigby1 on Mon, 09/09/2019 - 9:56am
Resiliency
mobile ad hoc networks
mobile ad-hoc network
mobile nodes
prevention mechanism
Proposals
pubcrawl
radio range
reactive routing protocols
resilience
Metrics
route diversion
Routing Protocol
Routing protocols
RREP
security mechanism
security threads
source address
telecommunication security
wrong destination address
GDH
bandwidth constraint multihop wireless network
Compositionality
Conferences
Cryptographic Protocols
data communication
Destination address
Dsr
DSR Routing
dynamic source routing
autonomous collection
group Diffie-Hellman key management
Hash Function
intended required destination
intermediate node
intermediate trusted node start
malicious node
MANET
MANET routing
MANET security
biblio
Security Challenges and Attacks in Dynamic Mobile Ad Hoc Networks MANETs
Submitted by grigby1 on Mon, 09/09/2019 - 9:56am
mobile computing
wireless technology
telecommunication security
telecommunication network topology
security challenges
security
Routing protocols
Routing
router
Resiliency
resilience
pubcrawl
mobile nodes
Ad hoc networks
mobile ad hoc networks
mobile ad hoc network
Metrics
MANETs Security
MANETs Attacks
MANET topology
MANET security
MANET protocol stack
Compositionality
blackhole attacks
base station
biblio
Game Theoretical Approach with Audit Based Misbehavior Detection System
Submitted by grigby1 on Thu, 02/14/2019 - 10:12am
mobile ad-hoc networks
dynamically shifting nodes
end-to-end encrypted traffic
GAMD
game theoretical approach
incentive based reputation scheme
incentive schemes
MANET environment
misbehaving nodes
misbehavior nodes
continuous packet droppers
multichannel networks
multihop ad hoc networks
node behavior
per-packet basis
selective dropping attacks
selective packet droppers
Selfish node
supervisory game
theoretical cryptography
Routing protocols
Monitoring
pubcrawl
composability
Conferences
game theory
Ad hoc networks
telecommunication security
Peer-to-peer computing
Routing
Games
Cryptography
Compositionality
MANET
mobile ad hoc networks
mobile nodes
AMD
Audit based Misbehavior Detection system
Audit-based Misbehavior Detection
biblio
Detection of malicious node in mobile ad-hoc network
Submitted by grigby1 on Mon, 01/21/2019 - 11:32am
mobile ad hoc networks
wireless links
Wireless communication
telecommunication network routing
selective acknowledgment
security
Routing protocols
routing overhead
Routing
Resiliency
pubcrawl
NS2 simulation
network security
network packet delivery ratio
mobile nodes
Ad Hoc Network Security
mobile ad hoc network
Metrics
MANET
malicious node detection
malicious node
intrusion detection mechanisms
firewalls software
firewalls
encryption software
Cryptography
Compositionality
Communication system security
AODV
adaptive acknowledgment
biblio
Securing data forwarding against blackhole attacks in mobile ad hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 11:31am
Metrics
telecommunication security
secure message transmission
Scalability
Routing protocols
Resiliency
Receivers
pubcrawl
packet delivery ratio
network throughput
multi-path routing
mobile nodes
mobile ad hoc networks
mobile ad hoc network security
mobile ad hoc network
Ad Hoc Network Security
MANET
homomorphic encryption scheme
encryption
data transmission security
data forwarding security
data communication
Cryptographic Protocols
Compositionality
blackhole nodes
blackhole attacks
Blackhole attack
AOMDV protocol
ad hoc on-demand multipath distance vector protocol
biblio
Location Privacy in Virtual Cell-Equipped Ultra-Dense Networks
Submitted by grigby1 on Mon, 12/03/2018 - 2:02pm
Metrics
wireless networks densification
virtualization privacy
virtualisation
virtual entities
virtual cells
virtual cell-equipped ultra-dense networks
ultra-dense network
tracked mobile nodes
Resiliency
resilience
pubcrawl
privacy
next generation 5G cellular networks
mobile nodes
mobile node densification
Location Privacy in Wireless Networks
location privacy threats
location privacy
location based services
Human behavior
Handover
data privacy
composability
cellular radio
cell virtualization
authentication
access node densification
5G networks
5G mobile communication
Compositionality
biblio
Secure and attack aware routing in mobile ad hoc networks against wormhole and sinkhole attacks
Submitted by grigby1 on Wed, 06/20/2018 - 11:39am
Resiliency
wormhole attacks
wormhole attack
telecommunication security
sinkhole node
sinkhole attacks
Sinkhole attack
security attacks
security
secure attack aware routing
Routing protocols
Routing
AODV
resilience
pubcrawl
mobile nodes
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
Compositionality
attack prevention
Attack Aware Alert
biblio
Search for secure data transmission in MANET: A review
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
Peer-to-peer computing
versatile node
transmission range
security mechanisms
secure data transmission
Routing protocols
routimg protocols
Resiliency
resilience
pubcrawl
Protocols
privacy
portable nodes
Compositionality
multihop network
mobile nodes
mobile ad-hoc network
mobile ad hoc networks
Metrics
MANET
intermediate node
independent ambulant nodes
highly dynamic network
Cryptography
cryptographic techniques
cryptographic technique
biblio
Visiting Mobile Node Authentication Protocol for Proxy MIPv6-Based NEtwork MObility
Submitted by grigby1 on Wed, 05/09/2018 - 2:01pm
PMIPv6
VMN
Visiting Mobile Nodes
telecommunication network routing
Servers
security
Router Systems Security
Router Systems
Resiliency
resilience
pubcrawl
Proxy MIPv6-Based NEtwork MObility
Protocols
authentication
NEMO-BSP
NEMO-Basic Support Protocol
NEMO
mobility management (mobile radio)
mobile router
mobile radio
mobile nodes
mobile node authentication protocol
Metrics
Handover
Cryptographic Protocols
AVISPA
« first
‹ previous
1
2
3
4
next ›
last »