Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Secure Routing
biblio
Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
mobile ad hoc environment
telecommunication security
security methods
security
Secure Routing
Routing protocols
Resiliency
resilience
pubcrawl
outlier detection
network simulator tool
mobile ad hoc networks
ad hoc-on-demand distance vector reactive routing protocol
Metrics
MANET
efficient outlier detection scheme based security algorithm
Conferences
Compositionality
Black hole attack
Attack detection
AODV routing protocol
AODV
Anomaly Detection
Algorithm design and analysis
biblio
New Trust Metric for the RPL Routing Protocol
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
security
resilience
Resiliency
Routing
routing nodes
Routing protocols
RPL
RPL routing protocol
Scalability
Secure Routing
reliable routing processes
Selfish nodes
telecommunication network reliability
telecommunication security
trust inference problem
Trust management
trust metric
trust objective function
Trust Routing
vital security requirement
Linear programming
BR
collaboration
composability
distributed Bellman-Ford algorithm
DODAG information object message
ERNT
extended RPL node trustworthiness
Internet of Things
IoT security
border router
lossy networks
Low power
maintenance engineering
Measurement
metric based RPL trustworthiness scheme
MRTS
new Objective Function TOF
pubcrawl
biblio
Beta Reputation and Direct Trust Model for Secure Communication in Wireless Sensor Networks
Submitted by grigby1 on Fri, 08/18/2017 - 1:49pm
BRDT
composability
pubcrawl
Resiliency
Scalability
Secure Routing
Trust management
Trust Routing
WSN
biblio
Secure Routing with an Integrated Localized Key Management Protocol in MANETs
Submitted by BrandonB on Wed, 05/06/2015 - 1:33pm
mobile ad hoc network (MANET)
Secure Routing
routing security
Routing protocols
Routing Protocol
Routing
public key cryptography
Public key
neighbor based handshaking and least common multiple
mobile computing
mobile ad hoc networks
Ad hoc networks
mobile ad hoc network
MANET
key management protocol
key management
Intrusion Detection System (IDS)
intrusion detection system
integrated localized key management protocol
Cryptographic Protocols
broadcast key distribution mechanism
authentication
biblio
A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:58am
public key cryptography
wireless sensor networks
Wireless Sensor Network
statistical en-route filtering
Statistical En-Route
security
secure routing method
Secure Routing
Routing protocols
Routing
ad hoc on demand distance vector protocol
Protocols
individual sensor nodes
Gray hole attack
false report detection
Elliptic curve cryptography
ECC
Base stations
AODV protocol
AODV
« first
‹ previous
1
2