Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensor nodes
biblio
Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks
Submitted by grigby1 on Mon, 03/19/2018 - 1:45pm
sensor nodes
personal area networks
power consumption
Protocols
pubcrawl
remote server
resilience
Resiliency
resource-constrained sensors
S3K technique
Scyther security protocol verification tool
personal area network identification
sensors
Servers
session key distribution
symmetric key establishment method
telecommunication network routing
telecommunication power management
telecommunication security
trust anchor
wireless sensor networks
Cryptography
6LoWPAN wireless sensor networks
authentication
CBC mode
cipher block chaining
composability
Contiki
ContikiOS
Cooja Simulator
Cryptographic Protocols
6LoWPAN
Cyber Physical Systems Security
datagram transport layer security
DTLS
EAKES6Lo technique
Edge router
LAUP
lightweight authentication protocol
Lucky Thirteen attack
PAN ID
biblio
Secure routing against DDoS attack in wireless sensor network
Submitted by grigby1 on Tue, 01/16/2018 - 6:29pm
pubcrawl
WSNs
wireless sensor networks
Wireless Sensor Network
UDP messages
TCP messages
sink node
sensor placement
sensor nodes
security scheme
security Algorithm
secure routing protocol
Routing protocols
Routing
Resiliency
composability
Monitoring
Metrics
message passing
IPS node
IPS
IP networks
intrusion prevention scheme
intrusion
Human behavior
DDoS Attack Prevention
DDoS Attack
computer network security
Computer crime
biblio
Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security
Submitted by grigby1 on Mon, 11/20/2017 - 12:19pm
security
Policy
policy-based governance
pubcrawl
QCQP
QoS constraints
quadratically constrained quadratic problem
quality of service
quality-of-service constraints
Resiliency
SCIP algorithm
physical layer security
sensor nodes
solving constraint integer programs
telecommunication security
total energy consumption
transmitting antennas
virtual MIMO-based cooperative beamforming and jamming
virtual multiinput multioutput communication architecture
Wireless Sensor Network
wireless sensor networks
WSN
cooperative communication
array signal processing
artificial neural network
Artificial Neural Networks
artificial noise
beamforming
beamforming vector optimization
cluster-based cooperative wireless sensor networks
clustered wireless sensor network security
collaboration
computational complexity
antenna
energy consumption
Governance
Government
integer programming
Jamming
jamming vector optimization
MIMO
MIMO communication
MISO
NP-hard problem
biblio
Security techniques for the WSN link layer within military IoT
Submitted by grigby1 on Mon, 11/13/2017 - 11:59am
Resiliency
WSN link layer
wireless sensor networks
trusted platform modules
Trusted Platform Module
telecommunication security
sensor nodes
security techniques
security
composability
pubcrawl
military communication
military applications
Internet of Things
fault tolerant sensor network
energy resources
Cryptography
cryptographic protection
biblio
Optimal Power Control and Rate Adaptation for Ultra-Reliable M2M Control Applications
Submitted by grigby1 on Wed, 03/08/2017 - 1:54pm
telecommunication power management
rate adaptation problem
reliability requirements
Scheduling algorithms
sensor nodes
Shannon capacity formulation
signal-to-interference-plus-noise ratio
SINR
stringent timing
telecommunication control
pubcrawl170110
telecommunication scheduling
transmission delay
transmission power
transmission schedule
transmitting nodes
ultrareliable M2M control
ultrareliable machine-to-machine control
wireless channels
Wireless communication
limited battery resources
additive white Gaussian noise wireless channel
AWGN channels
AWGN wireless channel
continuous rate transmission
delay error
delays
discrete rate transmission
energy consumption
information theory
Adaptation models
Mobile communication
optimal control
optimal power control
optimization
packet error
polynomial time algorithm
power consumption
power control
biblio
An efficient and scalable key management mechanism for wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:38pm
processing overheads
wireless sensor networks
telecommunication security
telecommunication network topology
telecommunication network management
sensors
sensor nodes
security
secure wireless sensor networks
secret sharing techniques
scalable key management mechanism
reduced memory size
public key cryptography
Public key
Base stations
network topology
limited computation capability
large size networks
key management
key distribution schemes
group communications
encryption keys
Elliptic curves
elliptic curve public key encryption
Elliptic curve cryptography
Diffie-Hellman like key exchange
battery-based power supply
biblio
An efficient and hybrid key management for heterogeneous wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:34pm
heterogeneous wireless sensor networks
wireless sensor networks
telecommunication security
telecommunication network management
symmetric encryption
sensor nodes
sensor network security
public key encryption method
key management
hybrid key management
asymmetric key cryptography
heterogeneous sensor networks
energy consumption
encryption
Elliptic curve cryptography
Cryptography
communication security
cluster heads
Base stations
« first
‹ previous
1
2
3