Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Wireless ad hoc network

biblio

Visible to the public A secure reputation based architecture for MANET routing

Submitted by grigby1 on Wed, 06/20/2018 - 12:42pm
  • Routing
  • Node identity
  • Prime Product Number
  • pubcrawl
  • Reliability
  • reputation level table
  • Reputation Value
  • resilience
  • Resiliency
  • Monitoring
  • Routing misbehavior
  • Routing protocols
  • secure reputation based architecture
  • secure routing protocol
  • specific prime number
  • telecommunication security
  • Wireless ad hoc network
  • Worm hole attacks
  • legitimacy value table
  • backbone network
  • civilian domains
  • Compositionality
  • Cryptography
  • denial of service
  • Denial of Service attacks
  • DoS attacks
  • grid structure
  • attack mitigation
  • malicious node effect mitigation
  • MANET
  • MANET routing
  • Metrics
  • military domains
  • mobile ad hoc network
  • mobile ad hoc networks
biblio

Visible to the public Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks

Submitted by BrandonB on Wed, 05/06/2015 - 9:02am
  • NS-2 simulation
  • wireless ad hoc networks
  • Wireless ad hoc network
  • Vectors
  • trust value
  • Trust management
  • telecommunication traffic
  • security threats
  • security
  • Routing protocols
  • Routing
  • reactive routing protocol
  • partial received packets
  • packet dropping attacks
  • Packet dropping
  • Ad hoc networks
  • network traffic
  • mobile ad hoc networks
  • malicious packet dropping
  • malicious node
  • low false positive probability
  • dynamic trust model
  • DoS attack
  • denial of service attack
  • Conferences
  • Computers
  • computer network security
  • Black hole attack
  • AODV

Terms of Use  |  ©2023. CPS-VO