Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trust Routing
biblio
SMTrust: Proposing Trust-Based Secure Routing Protocol for RPL Attacks for IoT Applications
Submitted by grigby1 on Mon, 11/08/2021 - 4:47pm
Resiliency
composability
Internet of Things
IoT
IoT security
Measurement
Mobility Metrics
pubcrawl
resilience
wireless sensor networks
Routing
Routing protocols
RPL attacks
Scalability
security
Transportation
trust
Trust Routing
biblio
A Trust Routing Scheme Based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks
Submitted by aekwall on Mon, 10/04/2021 - 1:58pm
Peer-to-peer computing
trust
security
Scalability
Routing
Resiliency
Reliability
pubcrawl
privacy
Trust Routing
peer to peer security
non-complete cooperative
Monitoring
Metrics
individual
Human Factors
collusive
Analytical models
biblio
Analysis and Countermeasures of Black-Hole Attack in MANET by Employing Trust-Based Routing
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
mobile ad hoc networks
trust-based routing scheme
trust-based routing
telecommunication security
Scalability
Routing protocols
Routing Protocol
routing environment
Routing
Resiliency
reactive protocol
pubcrawl
packet delivery ratio
node data transfer mechanism
mobile nodes
Trust Routing
mobile ad hoc network
MANET
Energy states
data transaction
data retrieval
data packet
black-hole attack
Black hole attacks
Black hole attack
Attacker node
and trust-based scheme
Ad-hoc On-demand Distance Vector
Ad-doc On-Demand Distance Vector (AODV) protocol
biblio
Trust Aware Routing Protocols in Wireless Body Area Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:36pm
applications of WBAN
composability
pubcrawl
quality of life
routing challenges
Scalability
Trust Routing
wireless body area network
biblio
RouteChain: Towards Blockchain-Based Secure and Efficient BGP Routing
Submitted by grigby1 on Wed, 02/26/2020 - 4:36pm
hijacking routing paths
Youtube hijacking
weak trust model
Trust Routing
telecommunication network routing
social networking (online)
Scalability
pubcrawl
malicious entities
malicious AS broadcasts IP prefixes
Internet routing paths
internet
attack surface
false prefixes
Distributed databases
computer network security
composability
blockchain-based secure BGP routing system
blockchain
bihierarchical blockchain model
BGP prefix hijacking
BGP hijacking
BGP
autonomous systems
biblio
Secure and Composite Routing Strategy through Clustering In WSN
Submitted by grigby1 on Wed, 02/26/2020 - 4:36pm
composability
data trust
Malicious Detection Rate
network lifetime
pubcrawl
Scalability
Social trust
trust model
Trust Routing
Wireless Sensor Network
biblio
Cognitive Routing for Improvement of IoT Security
Submitted by grigby1 on Wed, 02/26/2020 - 4:36pm
secure SDN paths
packet flows
pubcrawl
quality of service
Random Neural Networks
Routing
routing decisions
Scalability
SDN infrastructure
secure networks
Neural networks
security-aware routing
security-by-design concept
SerIoT
software defined networking
telecommunication network routing
telecommunication security
telecommunication traffic
trust relationships
Trust Routing
Europe
cognitive radio
Cognitive routing
Cognitive-Packet-Network
composability
Computer crime
computer network reliability
computer network security
dedicated networks
energy criteria
Cognitive Packet Networks mechanisms
information security
Internet of Things
Internet-of-Things
IoT
IoT security
network architecture
network nodes
Network-Security
neural nets
biblio
Incorporating Monitoring Points in SDN to Ensure Trusted Links Against Misbehaving Traffic Flows
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
Software-defined networking (SDN)
OpenFlow
process control
pubcrawl
real-time systems
Routing
Scalability
SDN controller
SDN design
software defined networking
software-defined networking
ongoing attacks
telecommunication traffic
traffic anomalies
traffic behavior monitoring
traffic information
traffic monitoring
traffic streams
Trust Routing
trusted communication links
Trusted Computing
Internet connectivity
behavior monitoring unit
communication links
composability
computer network security
computer networking
computer networks
control systems
data streams
information technology
internet
Anomaly Detection
Market research
misbehaving traffic flows
misconfigured devices
Monitoring
monitoring points
network devices
network links
Network Monitoring
network traffic
biblio
A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
Scalability
nonce identity value
privacy
pubcrawl
Resiliency
Routing
routing path
Routing protocols
RPL
RPL IoT routing algorithm
RSSI
node trust value
security
sensor networks
Sybil based identity attacks
telecommunication network routing
telecommunication security
Trust Routing
Whitelists
wireless sensor networks
Wireshark
COTS IoT devices
ARSSI
average received signal strength indicator
commercial off the shelf standards
common security techniques
composability
computer architecture
Conferences
control overhead
Cooja network simulator
architecture
denial of service attack
Internet of Things
lightweight trust-based security architecture
military communities
mobile IoT network
mobile IoT wireless network
mobile radio
Network Security Architecture
network whitelist
biblio
Balanced Load Clustering with Trusted Multipath Relay Routing Protocol for Wireless Sensor Network
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
quality of service
WSN
wireless sensor networks
Wireless Sensor Network
wireless channels
trusted multipath relay routing
trust values
Trust Routing
telecommunication security
Scalability
Routing protocols
relay node
relay networks (telecommunication)
balanced load clustering
pubcrawl
pattern clustering
network simulation software
multipath trust
multipath channels
malicious activity trusted multipath relay routing protocol
Hybrid medium access control (HMAC)
Energy Efficiency
energy consumption
composability
balanced load clustering concepts
« first
‹ previous
1
2
3
4
5
6
next ›
last »