Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
sensor node
biblio
MicroPython-based Sensor Node with Asymmetric Encryption for Ubiquitous Sensor Networks
Submitted by aekwall on Mon, 01/10/2022 - 11:45am
Resistance
Compositionality
Resiliency
Asymmetric Encryption
smartcard
sensor node
Runtime environment
MicroPython
programming
embedded systems
Knowledge engineering
Human behavior
Metrics
pubcrawl
encryption
Switches
IoT
biblio
Development of security mechanisms for a remote sensing system based on opportunistic and mesh networks
Submitted by aekwall on Mon, 03/01/2021 - 3:44pm
remote sensing
wireless sensor networks
wireless mesh networks
Wireless Mesh Network Security
telecommunication security
sensor node
security mechanisms
security mechanism development
Resiliency
remote sensing system
composability
remote environment monitoring system
pubcrawl
Opportunistic Networks
opportunistic network
Metrics
Mesh networks
MESH network
environment monitoring system
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 11:41am
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
biblio
Experimental Evaluation of Source Location Privacy Routing Schemes and Energy Consumption Performance
Submitted by aekwall on Mon, 10/26/2020 - 11:04am
source location privacy
Location Privacy in Wireless Networks
route node
relatively lower energy
modified schemes
inversely proportional relationship
guarantee longer network lifetime
Experimental Evaluation
energy consumption performance
dynamic route creation process
control angle
angle-based routing
source location privacy routing schemes
routing schemes
data privacy
sensor node
Compositionality
energy consumption
Metrics
sensor nodes
wireless sensor networks
Wireless Sensor Network
Routing protocols
pubcrawl
Human behavior
Resiliency
telecommunication security
biblio
Simulating the Efficiency of Thermoelectrical Generators for Sensor Nodes
Submitted by grigby1 on Thu, 07/16/2020 - 10:44am
Resiliency
Mathematical model
Metrics
power grids
power system security
precise monitoring
production site
pubcrawl
renewable energy sources
renewable sources
resilience
HVDC power transmission
sensor node
simulation
simulations
specific environment
Substations
Temperature sensors
thermoelectric conversion
thermoelectrical generator
wireless sensor networks
wireless sensor nodes
electrical vehicles
batteries
composability
computational fluid dynamics
computational fluid dynamics model converter
Conductivity
converter
converter station
course means
CPS modeling
Electric Vehicles
autarkic energy supply
electricity
energy harvesting
environmental factors
Europe
fossil fuels
Generators
green electrical power
Grid Security
high voltage direct current technology
HVDC power convertors
biblio
ANFIS based Trust Management Model to Enhance Location Privacy in Underwater Wireless Sensor Networks
Submitted by aekwall on Mon, 03/02/2020 - 11:36am
MDP
adaptive neuro fuzzy inference system
ANFIS
complex security
FIS learning rules
forwarding node
malicious node
marine communication
MATLAB
UWSN
resource constraint behaviour
sensor node
trust behaviour
trust management model
trusted node
Underwater Wireless Sensor Networks
Underwater Networks
Routing
Scalability
data privacy
telecommunication security
Resiliency
pubcrawl
wireless sensor networks
location privacy
privacy
Intrusion Detection
Metrics
authentication
Data mining
information and communication technology
Markov Decision Process
Markov processes
Trust management
biblio
Using Minimum Mobile Chargers to Keep Large-Scale Wireless Rechargeable Sensor Networks Running Forever
Submitted by el_wehby on Fri, 05/25/2018 - 2:50pm
MinMCP
WRSN
wireless sensor networks
sensor node
recharging routes
optimisation
NP-hard
mobile computing
Mobile communication
mobile charger
Algorithm design and analysis
minimum mobile charger problem
Measurement
large-scale wireless rechargeable sensor networks
inapproximability bound
energy-constrained MC
distance constrained vehicle routing problem
approximation theory
Approximation methods
Approximation algorithms
1536086
biblio
An efficient hardware implementation of few lightweight block cipher
Submitted by grigby1 on Wed, 03/08/2017 - 1:33pm
FPGA
sensor node
security system
Schedules
RFID
resource-efficient cryptographic incipient
radiofrequency identification
radio-frequency identification
pubcrawl170112
high level synthesis
Hardware Implementation
Hardware
Algorithm design and analysis
field programmable gate arrays
Field Programmable Gate Array (FPGA)
FeW lightweight block cipher
FeW cryptography algorithm
FeW Algorithm
Feistel structure
encryption
Cryptography
Ciphers
Block Cipher