Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

reactive routing protocol

biblio

Visible to the public Enhancing Sink Node Anonymity in Tactical Sensor Networks Using a Reactive Routing Protocol

Submitted by grigby1 on Mon, 03/19/2018 - 1:45pm
  • resilience
  • WSN communication protocols
  • wireless sensor networks
  • telecommunication security
  • tactical WSN
  • tactical wireless sensor networks
  • tactical sensor networks
  • specific routing protocol
  • sink-node vulnerability
  • sensor nodes
  • sensor networks
  • security
  • Routing protocols
  • Routing
  • Resiliency
  • 6LoWPAN
  • remote sensing
  • reactive routing protocol
  • pubcrawl
  • privacy
  • modified LOADng protocol
  • military communication
  • Lightweight Ad hoc On-Demand Next Generation reactive-routing protocol
  • k-anonymity
  • IEEE 802.15.4
  • IEEE 802.15 Standard
  • enhancing sink node anonymity
  • Cyber Physical Systems Security
  • composability
  • Ad hoc networks
biblio

Visible to the public Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks

Submitted by BrandonB on Wed, 05/06/2015 - 9:02am
  • NS-2 simulation
  • wireless ad hoc networks
  • Wireless ad hoc network
  • Vectors
  • trust value
  • Trust management
  • telecommunication traffic
  • security threats
  • security
  • Routing protocols
  • Routing
  • reactive routing protocol
  • partial received packets
  • packet dropping attacks
  • Packet dropping
  • Ad hoc networks
  • network traffic
  • mobile ad hoc networks
  • malicious packet dropping
  • malicious node
  • low false positive probability
  • dynamic trust model
  • DoS attack
  • denial of service attack
  • Conferences
  • Computers
  • computer network security
  • Black hole attack
  • AODV

Terms of Use  |  ©2023. CPS-VO