Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing attack
biblio
Analysis of Different Black Hole Attack Detection Mechanisms for AODV Routing Protocol in Robotics Mobile AdHoc Networks
Submitted by aekwall on Tue, 03/09/2021 - 11:38am
Resiliency
telecommunication security
security attacks
Scalability
Routing protocols
Routing attack
router
route disclosure procedure
robotics mobile ad-hoc networks
Robotics MANETs
robotics MANET environment
MANET Attack Detection
removal mechanisms
pubcrawl
mobile ad hoc networks
malicious station attack
Black hole attacks
black hole attack detection mechanisms
BH finding
BH attack
AODV routing protocol
Ad-hoc On-demand Distance Vector
biblio
Detection and Prevention of Routing Attacks in Internet of Things
Submitted by grigby1 on Wed, 01/16/2019 - 1:25pm
MatLab simulation
Trusted Computing
smart objects
smart network
Sinkhole
Selective Forwarding
security
RPL
routing attack prevention
routing attack detection
Routing attack
Routing
Resiliency
pubcrawl
Protocols
message authentication
6LoWPAN
Key Match Algorithm
IoT based network
Intrusion Detection System (IDS)
intrusion detection system
Intrusion Detection
Internet of Things
internet
encryption techniques
Cryptography
composability
Clustering algorithms
Cluster-Based Algorithm
CBA algorithm
authentication techniques
biblio
Review on Mechanisms for Detecting Sinkhole Attacks on RPLs
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
RPL
Peer-to-peer computing
personal area networks
pubcrawl
resilience
Resiliency
Routing attack
Routing Protocol
Routing protocols
network topology
RPL components
security
Sinkhole attack
telecommunication security
Topology
wireless sensor networks
WSN
IP networks
composability
computer network security
Cyber Physical Systems Security
existing detection mechanisms
existing security challenges
internet
Internet of Things
Internet Protocol version 6
6LoWPAN
IPv6 packet
limited resources
lossy network
low power wireless personal area networks
maintenance engineering
network damage
network layer
biblio
A Security Routing Protocol for Internet of Things Based on RPL
Submitted by K_Hooper on Wed, 02/28/2018 - 10:38am
RPL network security
Resiliency
route discovery phase
Routing
Routing attack
routing attacks
Routing protocols
routing recurity
RPL based security routing protocol
pubcrawl
security
security problems
security routing protocol
telecommunication network topology
telecommunication security
test network
test prototype network
Topology
IP networks
collaboration
composability
data routing
flexible topological structure
hierarchical clustering network topology
intelligent device
Internet of Things
IoT
backup path
ipv6 security
lightweight IPv6 network routing protocol
Logic gates
M-RPL network
Metrics
multipath routing
network topology
biblio
Impact of security enhancement over Autonomous Mobile Mesh Network (AMMNET)
Submitted by grigby1 on Mon, 03/13/2017 - 11:23am
mobile ad-hoc network
wumpus world concept
wireless mesh networks
telecommunication security
telecommunication network topology
telecommunication network routing
telecommunication network reliability
security enhancement
security
Routing attack
Routing
network topology
network survivability
network partitioning
mobile computing
Mobile communication
AMMNET
mobile ad hoc networks
Mesh networks
MANET
intragroup bridge router
intergroup bridge router
denial of service (dos)
computer architecture
communication reliability
Blackhole attack
Blackhole
bait detection scheme
Bait approach
Autonomous Mobile Mesh Network (AMMNET)
autonomous mobile mesh network
Artificial Intelligence
biblio
A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system
Submitted by BrandonB on Wed, 05/06/2015 - 8:01am
security of data
network traffic
NicheMGA algorithm
normal feature vector extraction
NS2 simulator
Routing attack
routing attack simulation
Routing protocols
rushing simulator
security
network topology
spherical detector
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
Vectors
wireless mobile node
wormhole simulator
flooding simulator
AIS
AODV-based MANET
artificial immune system
artificial immune systems
Biological cells
blackhole simulator
Detectors
dynamic intrusion detection technique
feature extraction
ad hoc network
GA
genetic algorithm
genetic algorithms
Heuristic algorithms
Intrusion Detection
mobile ad hoc network
mobile ad hoc networks
neighbor simulator