Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensor nodes
biblio
Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks
Submitted by aekwall on Mon, 02/18/2019 - 12:58pm
lightweight sybilfree-APIT algorithm
Metrics
wireless localization schemes
wireless devices
Wireless communication
SF-APIT scheme
SF-APIT
sensor placement
sensor nodes
secure APIT localization scheme
RSSI
received signal strength
range-free method
location-aware applications
localization
telecommunication security
hostile WSN
distributed WSNs
distributed WSN
distributed wireless sensor networks
detection rate
Cryptography
Communication system security
antennas
Peer-to-peer computing
sybil attacks
Global Positioning System
wireless sensor networks
composability
pubcrawl
biblio
Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
RPL DODAG
rank property
Resiliency
resource constrained Low Power and Lossy Networks
resource consumption
Routing
routing path optimization
Routing protocols
routing requirements
routing security
RPL attacks
rank based data path validation
RPL-6LOWPAN
security
security attacks
security breaches
sensor nodes
telecommunication network topology
topological isolation
topological sub-optimization
traffic disruption
vulnerability assessment
IP networks
attack graph
communication protocol
composability
computer network security
destination oriented directed acyclic graphs
directed graphs
expected transmission count
holistic security assessment
Internet of Things
IoT networks
6LoWPAN
IPv6 Routing Protocol
LLNs
loop free topology
low-power wireless personal area network
network topology
objective function
packet delivery rate
personal area networks
pubcrawl
biblio
Extending the Forward Error Correction Paradigm for Multi-Hop Wireless Sensor Networks
Submitted by grigby1 on Fri, 10/26/2018 - 4:51pm
real-world data
WSN platforms
wireless sensor networks
turbo codes
Topology
telecommunication network topology
Task Analysis
sophisticated communication mechanisms
simple communication protocols
short range multihop topologies
sensor nodes
security
Scalability
Resiliency
composability
pubcrawlBase stations
pubcrawl
Protocols
multihop wireless sensor networks
multihop extended star topologies
Metrics
forward-error correction schemes
forward error correction paradigm
forward error correction
energy resources
energy consumption
Decoding
computational energy resources
biblio
Secure and concealment in cluster based framework on vehicular networks
Submitted by grigby1 on Wed, 06/20/2018 - 12:28pm
Roads
wireless sensor networks
Wireless Sensor Network
vehicular networks
Vehicular Communication
vehicular ad hoc networks
vehicular ad hoc network (VANET)
vehicular ad hoc network
VANET networks
telecommunication security
sensor nodes
Selfish node
security and privacy
security
secure concealment
Cloud Computing
Resiliency
resilience
pubcrawl
privacy
Metrics
MANET
lightweight cloud environment
Incentive scheme
embedded systems
Delay tolerant network (DTN)
Conferences
Compositionality
cluster based framework
biblio
Joint delay and energy minimization for Wireless Sensor Networks using instantly decodable network coding
Submitted by grigby1 on Mon, 06/11/2018 - 3:34pm
IDNC completion time
WSNs
wireless sensor networks
telecommunication power management
stable clustered network structure
sensors
sensor nodes
Resiliency
resilience
pubcrawl
partition form
network coding
Metrics
instantly decodable network coding
IDNC delay
Coalitional game theory
IDNC
Games
game theory
energy minimization
energy consumption
effective distributed schemes
distributed merge-and-split algorithm
delays
Decoding
cooperative game theory
cooperative data exchange scheme
Cooperative data exchange
cooperative communication
composability
biblio
Fast Real-Time Authentication Scheme for Smart Grids
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Batch verification
bilinear pairings
Compositionality
Policy
policy-based collaboration
privacy
protocol verification
pubcrawl
sensor nodes
Signatures
smart grid consumer privacy
Smart Grids
smart meters
biblio
A security aware scheduling in fog computing by hyper heuristic algorithm
Submitted by K_Hooper on Wed, 05/09/2018 - 11:03am
scheduling
Internet of Things
job scheduling
latency
Processor scheduling
pubcrawl
Resiliency
resource allocation
Scalability
integrity parameter
security
security aware scheduling
Security Heuristics
security of data
security overhead
sensor nodes
Task Analysis
data mining technique
authorisation
average energy consumption
Cloud Computing
computational overhead
confidentiality parameter
CPU utilization
data integrity
Data mining
authentication parameter
edge computing
Fog computing
fog devices
heterogeneous distributed environment
heuristic algorithm
Heuristic algorithms
hyper heuristic algorithm
biblio
A Hybrid Routing Algorithm for Secure Environmental Monitoring System in WSN
Submitted by grigby1 on Wed, 04/11/2018 - 2:54pm
sensor nodes
resilience
Resiliency
Routing
routing algorithms
Routing protocols
Scalability
secure environmental monitoring system
security
pubcrawl
telecommunication power management
telecommunication security
Time Frequency Analysis
time latency
Wireless communication
wireless sensor area
wireless sensor networks
WSN routing
hybrid routing algorithm
bio inspired algorithms
Channel measurement
Clustering algorithms
cyber physical systems
Data Transmission
environmental monitoring (geophysics)
firefly algorithm
Fireflyalgorithm
Algorithm design and analysis
LAL users
Localizability aided localization routing protocol
metaheuristic hybrid algorithm
Metrics
network lifetime
packet drop
Packet loss
Protocol frequency
biblio
Boosting Anonymity in Wireless Sensor Networks
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
resilience
wireless sensor networks
Wireless Sensor Network
traffic pattern
telecommunication security
telecommunication network topology
sensor nodes
security
Routing
ring nodes
Resiliency
anonymity
pubcrawl
privacy
Monitoring
Mobile communication
mobile BS
Metrics
Mathematical model
Human behavior
composability
base station
biblio
Enhancing Sink Node Anonymity in Tactical Sensor Networks Using a Reactive Routing Protocol
Submitted by grigby1 on Mon, 03/19/2018 - 1:45pm
resilience
WSN communication protocols
wireless sensor networks
telecommunication security
tactical WSN
tactical wireless sensor networks
tactical sensor networks
specific routing protocol
sink-node vulnerability
sensor nodes
sensor networks
security
Routing protocols
Routing
Resiliency
6LoWPAN
remote sensing
reactive routing protocol
pubcrawl
privacy
modified LOADng protocol
military communication
Lightweight Ad hoc On-Demand Next Generation reactive-routing protocol
k-anonymity
IEEE 802.15.4
IEEE 802.15 Standard
enhancing sink node anonymity
Cyber Physical Systems Security
composability
Ad hoc networks
« first
‹ previous
1
2
3
next ›
last »