Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
6LoWPAN
biblio
A Trust-Based Intrusion Detection System for Mobile RPL Based Networks
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
resilience
wireless sensor networks
Trusted Platform Module co-processor
Trust Routing
telecommunication security
T-IDS
Sybil-Mobile attack
Sybil attack
security attacks
RPL security
routing security
Routing protocols
Routing Protocol
Routing
Resiliency
6LoWPAN
pubcrawl
Peer-to-peer computing
off-load security related computation
Monitoring
mobility support
mobile RPL based networks
mobile radio
Mobile communication
IoT
Intrusion Detection System scheme
intrusion detection system
Intrusion Detection
Cyber Physical Systems Security
composability
biblio
Efficient Probing of Heterogeneous IoT Networks
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
intrusion protection system
software heterogeneity
Servers
security
Resiliency
resilience
pubcrawl
Protocols
Probes
personal area networks
network technology
network security
Network scans
network scan
IoT devices
IoT
6LoWPAN
Internet of Things
internet
interconnectivity
IEEE 802.15 Standard
IEEE 802.11 Standard
heterogeneous IoT networks
hardware heterogeneity
Fingerprinting
Cyber Physical Systems Security
computer network security
composability
complex security protocols
Bandwidth
active network measurements
biblio
Review on Mechanisms for Detecting Sinkhole Attacks on RPLs
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
RPL
Peer-to-peer computing
personal area networks
pubcrawl
resilience
Resiliency
Routing attack
Routing Protocol
Routing protocols
network topology
RPL components
security
Sinkhole attack
telecommunication security
Topology
wireless sensor networks
WSN
IP networks
composability
computer network security
Cyber Physical Systems Security
existing detection mechanisms
existing security challenges
internet
Internet of Things
Internet Protocol version 6
6LoWPAN
IPv6 packet
limited resources
lossy network
low power wireless personal area networks
maintenance engineering
network damage
network layer
biblio
Internet of Things: Raging Devices and Standardization in Low-Powered Protocols
Submitted by grigby1 on Mon, 03/19/2018 - 12:46pm
low-powered protocols
Thread
The Thing
standardization
standard communication protocols
sensors
security
Resiliency
resilience
raging devices
pubcrawl
Protocols
OSI model
OSI
open systems
6LoWPAN
IP networks
IoT system architecture
IoT devices
IoT
Internet of Things
internet
IEEE 802.15.4
IEEE 802.15 Standard
data centers
Cyber Physical Systems Security
computer centres
composability
CoAP
Capacity planning
biblio
Enhancing Sink Node Anonymity in Tactical Sensor Networks Using a Reactive Routing Protocol
Submitted by grigby1 on Mon, 03/19/2018 - 12:45pm
resilience
WSN communication protocols
wireless sensor networks
telecommunication security
tactical WSN
tactical wireless sensor networks
tactical sensor networks
specific routing protocol
sink-node vulnerability
sensor nodes
sensor networks
security
Routing protocols
Routing
Resiliency
6LoWPAN
remote sensing
reactive routing protocol
pubcrawl
privacy
modified LOADng protocol
military communication
Lightweight Ad hoc On-Demand Next Generation reactive-routing protocol
k-anonymity
IEEE 802.15.4
IEEE 802.15 Standard
enhancing sink node anonymity
Cyber Physical Systems Security
composability
Ad hoc networks
biblio
Experimental Study of IP Spoofing Attack in 6LoWPAN Network
Submitted by grigby1 on Mon, 03/19/2018 - 12:45pm
IPv6 protocol
wrong IPv6-MAC binding
telecommunication power management
RPL
Routing protocols
Resiliency
resilience
Registers
pubcrawl
personal area networks
memory consumption
Media Access Protocol
low power personal area networks
lossy personal area networks
IPv6 Spoofing
6LoWPAN
IP spoofing attack
IP networks
Internet of Things
energy consumption
encryption
Cyber Physical Systems Security
Cooja Simulator
computer network security
composability
access protocols
6LoWPAN-ND
6LoWPAN network
6LoWPAN control messages
biblio
The Effect of Buffer Management Strategies on 6LoWPAN's Response to Buffer Reservation Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:45pm
resilience
Internet of Things
IoT security
packet drop rate
packets tags
PDR
personal area networks
Protocols
pubcrawl
fragmentation-based buffer reservation DoS attacks
Resiliency
Scoring Systems
slotted buffer
Split Buffer
split buffer mechanism
TCP-IP model
vehicular networking applications
composability
6L0WPAN adaptation layer
6LoWPAN
Adaptation models
buffer circuits
buffer cleanups
buffer management strategies
Buffer Reservation
Buffer storage
6L0WPAN
Computer crime
computer network security
Current measurement
Cyber Physical Systems Security
defence strategies
Fragmentation Attacks
fragmentation-based buffer reservation denial of service attacks
biblio
Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks
Submitted by grigby1 on Mon, 03/19/2018 - 12:45pm
sensor nodes
personal area networks
power consumption
Protocols
pubcrawl
remote server
resilience
Resiliency
resource-constrained sensors
S3K technique
Scyther security protocol verification tool
personal area network identification
sensors
Servers
session key distribution
symmetric key establishment method
telecommunication network routing
telecommunication power management
telecommunication security
trust anchor
wireless sensor networks
Cryptography
6LoWPAN wireless sensor networks
authentication
CBC mode
cipher block chaining
composability
Contiki
ContikiOS
Cooja Simulator
Cryptographic Protocols
6LoWPAN
Cyber Physical Systems Security
datagram transport layer security
DTLS
EAKES6Lo technique
Edge router
LAUP
lightweight authentication protocol
Lucky Thirteen attack
PAN ID
biblio
Neighbor-Passive Monitoring Technique for Detecting Sinkhole Attacks in RPL Networks
Submitted by K_Hooper on Wed, 02/28/2018 - 10:38am
6LoWPAN
collaboration
composability
Internet of Things
intrusion detection system
ipv6 security
Metrics
pubcrawl
Resiliency
RPL
Sinkhole attack
WSN
biblio
Intrusion Detection in the RPL-connected 6LoWPAN Networks
Submitted by K_Hooper on Wed, 02/28/2018 - 10:38am
6LoWPAN
collaboration
composability
cyber security
ETX
IDS
Internet of Things
Intrusion Detection
IPv6
ipv6 security
Metrics
pubcrawl
Resiliency
RPL
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »