Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RPL
biblio
Intrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
Scalability
resilience
Resiliency
Routing
Routing protocols
RPL
RPL attack detection techniques
RPL based loT
RPL based routing attacks
rank attack
security
security of data
source routing protocol
Topology
version attack
Wormhole
wormhole attack
Intrusion Detection
Blackhole
Blackhole attack
computer network security
Conferences
countermeasures
IDS
IDS research contribution techniques
Internet of Things
attacks
intrusion detection system
IoT
knowledge driven approach
lightweight routing protocol stack
LLN
low power lossy networks
pubcrawl
biblio
Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
network devices
Watchdog based approaches
Strainer based intrusion detection of blackhole in 6LoWPAN for the Internet of Things
SIEWE
Scalability
RPL
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
pubcrawl
promiscuous mode
personal area networks
packet delivery ratio
network lifetime
6LoWPAN based Internet of Things
Measurement
malicious blackhole nodes
Linear programming
Intrusion detection mechanism
Intrusion Detection
Internet of Things
DoS attacks
computer network security
computer network reliability
Blackhole formation
Blackhole detection
Blackhole attack
Blackhole
anomaly based approach
biblio
Cuckoo-RPL: Cuckoo Filter based RPL for Defending AMI Network from Blackhole Attacks
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
Law
Wireless communication
version number attack
smart power grids
smart meters
Smart Grid
Scalability
RPL
Routing protocols
routing protocol for low-power and lossy networks
Routing
Resiliency
resilience
pubcrawl
power system security
advanced metering infrastructure
IETF ROLL working group
filtering theory
Cyber Attacks
cuckoo-RPL
cuckoo filter.
cuckoo filter based RPL
computer network security
computer network reliability
Blackhole attack
authorisation
authentication
AMI network
Advanced Metering Infrastructure (AMI)
biblio
Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
IoT environment
topological isolation
smoothing methods
low power and lossy network
IPv6 routing protocol over LLN
IPv6 over low power personal area network
Internet of things environment
high performance computing environment
forecasting
exponential window function
exponential smoothing time series data
exponential smoothing
blackhole attack detection approach
Blackhole attack
personal area networks
time series
IoT
blackhole attacks
telecommunication network topology
sensors
RFID
sink node
6LoWPAN
internet
Routing
Routing protocols
pubcrawl
Resiliency
Internet of Things
Scalability
IP networks
RPL
biblio
A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
Submitted by grigby1 on Wed, 02/26/2020 - 4:35pm
Scalability
nonce identity value
privacy
pubcrawl
Resiliency
Routing
routing path
Routing protocols
RPL
RPL IoT routing algorithm
RSSI
node trust value
security
sensor networks
Sybil based identity attacks
telecommunication network routing
telecommunication security
Trust Routing
Whitelists
wireless sensor networks
Wireshark
COTS IoT devices
ARSSI
average received signal strength indicator
commercial off the shelf standards
common security techniques
composability
computer architecture
Conferences
control overhead
Cooja network simulator
architecture
denial of service attack
Internet of Things
lightweight trust-based security architecture
military communities
mobile IoT network
mobile IoT wireless network
mobile radio
Network Security Architecture
network whitelist
biblio
ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things
Submitted by aekwall on Mon, 01/13/2020 - 12:06pm
local repair attacks
bagged trees
boosted trees
classifier validation methods
ELNIDS
Ensemble Learning
ensemble learning based network intrusion detection system
global connectivity
heterogeneous smart devices
IPv6 Routing Protocol
lossy networks
NIDS
RPL based Internet of Things
RPL-NIDDS17 dataset
RUSBoosted trees
smart devices
subspace discriminant method
RPL
intrusion detection model
wireless networks
classification
routing attacks
Intrusion Detection
6LoWPAN
Vegetation
Routing
Routing protocols
composability
pubcrawl
Resiliency
learning (artificial intelligence)
Internet of Things
security of data
biblio
An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
gaussian distribution
specific internal attacks
special protocol
RPL-based internet
RPL networks
resource-constrained nature
networking
Neighbor Attack
Low-Power
lossy networks
large-scale networks
human interaction
everyday life
DIS Attack
Communications
anomaly-based lightweight Intrusion Detection System
IoT
6LoWPAN
RPL protocol
internet
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
Resiliency
telecommunication security
Internet of Things
Monitoring
IDS
computer network security
RPL
biblio
Attribute Based Trust Evaluation for Secure RPL Protocol in IoT Environment
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
Resiliency
location based service authentication
Low-Power and Lossy Networks
Medical services
memory requirements
personal area networks
physical objects
Protocols
pubcrawl
Public key
location based service
Routing
Routing protocols
RPL
secure RPL Protocol
security
security attacks
smart health care system
Symmetric matrices
Data collection
6LoWPAN networks
ABTE
advanced automation technology
attribute based trust evaluation
authentication
composability
computer network reliability
computer network security
critical data transfer reliability
6LoWPAN
energy constraint networks
energy consumption
Internet of Things
IoT constrained environments
IPv6 Routing Protocol
LBS
lightweight LBS authentication
LL networks
biblio
IPv6-Based Smart Grid Communication over 6LoWPAN
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
local electric transformer
CAS
customer agents
Electric Grid
electric utilities
energy data
energy usage
future demand growth
IEEE 2030.5
IEEE 802.15 Standard
IPv6-based smart grid communication system
Carleton University
Low-Power and Lossy Networks
MESH network
OpenLab IEEE 802.15.4 chips
Routing Protocol
self-healing mesh network
Smart City concept
transformer agent
Two-Way Communication
two-way communication system
utility
6LoWPAN
IoT
RPL
IP networks
Resiliency
pubcrawl
composability
Routing protocols
Routing
Reliability
smart power grids
security
Smart Grids
Smart Grid
Mesh networks
wireless LAN
Zigbee
communication technologies
Communication Network
personal area networks
IPv6
biblio
Secure Routing for MANET Connected Internet of Things Systems
Submitted by grigby1 on Mon, 09/09/2019 - 10:57am
Resiliency
trusted device
telecommunication security
standardized routing protocol for low-power and lossy networks
sensor network
security threats
security enhanced routing protocols
security
Secure Routing
RPL
Routing protocols
Routing
Compositionality
resilience
pubcrawl
network security
mobile ad hoc networks
Metrics
MANET-IoT connectivity
MANET-connected Internet-of-Things systems
MANET security
MANET
IoT
Internet of Things
« first
‹ previous
1
2
3
4
5
next ›
last »