Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
radio links
biblio
Effects of Man in the Middle (MITM) Attack on Bit Error Rate of Bluetooth System
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
MITM Attack
communication path
Demodulation
frequency 0.006 Hz
frequency shift keying
Gaussian Frequency Shift Keying
Gaussian frequency shift keying modulation
GFSK demodulation
hopping rate
man in the middle attack
communicating devices
radio links
radio receivers
radio transmitters
radiofrequency links
radiofrequency waves
software model
time 150.0 s
unauthorized transmitter
White noise
error statistics
pubcrawl
Human behavior
resilience
Resiliency
computer network security
composability
Ad hoc networks
Receivers
Ad-Hoc Network
Bluetooth
Telecommunications
Bit error rate
man-in-the-middle attack
Gaussian noise
Frequency modulation
advanced white Gaussian noise channel
bit error rate measurements
bluetooth security
Bluetooth system
biblio
Computational Analysis of Security Algorithm on 6LowPSec
Submitted by aekwall on Mon, 12/21/2020 - 1:26pm
radio links
IPv6 communication process
light weight IPSec
light weight variant
lightweight-based security need
message authentication
Peer-to-peer computing
personal area networks
pubcrawl
IP networks
Routing
Routing protocols
security
security Algorithm
security approach
security solutions
telecommunication security
word length 128.0 bit
AES
Resiliency
composability
Metrics
policy-based governance
6LoWPAN
6LoWPAN IoT environment
6LoWPAN radio link
6LowPSec protocol
ipv6 security
Ciphers
computer network security
Cryptographic Protocols
existing security protocol IPSec solutions
internet
Internet of Things
IoT
biblio
Lightweight Sybil-Resilient Multi-Robot Networks by Multipath Manipulation
Submitted by aekwall on Mon, 12/14/2020 - 12:43pm
Sybil attack detection
radio links
radiofrequency identification
Resiliency
rich multipath features
Robot kinematics
Robot sensing systems
robotic collaboration
ScatterID actively manipulates multipath propagation
single-antenna robot
pubcrawl
Sybil attackers
sybil attacks
telecommunication security
Trajectory
Wireless communication
wireless LAN
wireless medium
wireless networking
wireless sensor networks
fine-grained physical layer signatures
backscatter
batteryless backscatter tags
bulky multiantenna systems
collaboration
collaborative tasks
composability
computer network security
featherlight backscatter tags
fictitious robots
Robot Trust
fundamental trust assumption
lightweight Sybil-resilient multirobot networks
lightweight system
Metrics
miniaturized robots
mobile robots
Multi-robot network
multi-robot systems
multipath manipulation
biblio
Pseudo-Random Beamforming with Beam Selection for Improving Physical-Layer Security
Submitted by aekwall on Mon, 03/25/2019 - 9:58am
optimal beamforming matrix
Downlink
downlink cellular network
eavesdroppers
Interference
legitimate mobile stations
multiple beam forming matrices
novel pseudorandom beamforming technique
opportunistic feedback
opportunistic scheduling
cellular radio
orthogonal beamforming vectors
radio links
Random beamforming
received signal-to-interference-and-noise ratio value
received SINR value
secrecy rate
secrecy sum-rate maximization
signal processing security
Signal to noise ratio
security
Resiliency
pubcrawl
composability
Wireless communication
matrix algebra
Metrics
Vectors
telecommunication security
physical-layer security
antenna arrays
antennas
array signal processing
base station
beam selection
BS
Cellular networks
biblio
A secure and reliable coding scheme over wireless links in cyber-physical systems
Submitted by grigby1 on Fri, 10/26/2018 - 4:52pm
telecommunication network reliability
radio links
radio networks
Receivers
Reliability
replay attacks
Resiliency
Scalability
security
pubcrawl
telecommunication security
transmission protocol
Wireless communication
wireless communication links
wireless network
wireless networks
wireless sensor networks
encryption
coding scheme security
communication protocol security
Cryptographic Protocols
cyber threats
cyber-physical system
cyber-physical systems
embedded systems
encoding
coding scheme reliability
encryption matrices
forward error correction
forward error correction coding
lightweight coding method
matrix algebra
network coding
Protocols
biblio
SAODV: Black hole and gray hole attack detection protocol in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:30pm
secure AODV protocol
open nature
Peer-to-peer computing
Protocols
pubcrawl
radio links
resilience
Resiliency
SAODV
mobile nature
security attacks
security problem
standards
telecommunication security
Throughput
wireless links
wireless mobile nodes
Ad hoc networks
mobile computing
mobile ad hoc networks
Metrics
MANET
malicious node
gray hole attacks
gray hole attack detection protocol
Gray hole attack
forwarding packets
delays
Cryptographic Protocols
Compositionality
Black hole attack
Attack detection
AODV
biblio
Environment-Aware Indoor Localization Using Magnetic Induction
Submitted by el_wehby on Wed, 05/23/2018 - 6:07pm
Magnetic Induction
wireless networks
wireless applications
Transmitters
transmission media
Receivers
radio networks
radio links
position information
phase shifting
MI-based wireless networks
MI signals
MI communication
Coils
LOS links
line-of-sight links
joint device localization and conductive-object tomography algorithm
indoor navigation
Indoor environments
floor planning
estimation errors
environment-aware indoor localization
electromagnetic induction
Conductivity
conductive walls
complex nonLOS environments
1446484
biblio
Multiple Frequency Band Channel Modeling and Analysis for Magnetic Induction Communication in Practical Underwater Environments
Submitted by el_wehby on Wed, 05/23/2018 - 6:07pm
Magnetoacoustic effects
Wireless communication
wireless channels
water surface
water floor
underwater MI communication
underwater MI channel
underwater magnetic field propagation
underwater environment
underwater communication
tri-directional coil antenna
Reliability
radio links
multiple frequency band channel modeling
MI antenna susceptibility elimination
marine communication
arbitrarily orientated tridirectional coil antenna
magnetic susceptibility
magnetic induction communication analysis
magnetic induction communication
magnetic fields
low-delay links
Lateral wave
electromagnetic induction
directive antennas
COMSOL-multiphysics simulations
complex environments
coil antenna polarization loss
Channel models
broadband networks
broadband channel model
Broadband antennas
1446484
biblio
A Self-Healing Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks
Submitted by grigby1 on Mon, 03/05/2018 - 1:21pm
radio links
wireless sensor networks
telecommunication security
sensors
self-healing networks
self-healing key pre-distribution scheme
security
Resiliency
resilience
composability
Q-composite key scheme
pubcrawl
node compromising attacks
multiphase WSN
multiphase wireless sensor networks
Measurement
insecure communication links
Electronic mail
biblio
A Multi-token Authorization Strategy for Secure Mobile Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:22pm
multitoken authorization strategy
security
Secure Mobile Computing
secure mobile cloud computing
radio links
privacy
Organizations
omnipresent mobile-based clients
OAuth
security of data
Modified Identity Management System
mobile computing
Mobile communication
mobile cloud computing
mathematical modeling
mathematical analysis
malicious code
IdM
Computer hacking
trust
traffic interception
identity management systems
identity management system
Hacker
data privacy
credentials
computing models
vulnerable wireless communication links
cloud resources
cloud computing security
Cloud Computing
authorization architecture
authorization
authorisation
Access Control
Servers