Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RPL
biblio
RMDD: Cross Layer Attack in Internet of Things
Submitted by grigby1 on Mon, 08/26/2019 - 11:10am
PAN
Throughput
telecommunication network topology
TCP
stealthy attack
single protocol layer
Simultaneous attack
security
RPL
Routing protocols
Routing
Resiliency
resilience
rank manipulation and drop delay cross-layer attack
pubcrawl
6LoWPAN
IPv6
IoT
Internet of Things
intensity attack
intelligent attack
DODAG
DAG
cross-layer
Cross Layer Security
coordinated attack
computer network security
composability
brutal attack
biblio
Trust based mechanism for Securing IoT Routing Protocol RPL against Wormhole amp;Grayhole Attacks
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
Grayhole
Trust Routing
wormhole attacks
Wormhole
RPL protocol
open standard routing protocol
network traffic
network topology
loT
light weight Trust based mechanism
IoT routing protocol RPL
Indirect Trust
Grayhole attacks
RPL
direct trust
telecommunication traffic
trust
Routing
Routing protocols
composability
pubcrawl
Resiliency
security
Internet of Things
Scalability
computer network security
biblio
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things
Submitted by aekwall on Wed, 02/13/2019 - 11:55am
Internal Threat
IoT
LLN
OF
Rank Attack Manipulation
RPL
Resiliency
Human behavior
pubcrawl
metric
threat mitigation
biblio
Detection and Prevention of Routing Attacks in Internet of Things
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
MatLab simulation
Trusted Computing
smart objects
smart network
Sinkhole
Selective Forwarding
security
RPL
routing attack prevention
routing attack detection
Routing attack
Routing
Resiliency
pubcrawl
Protocols
message authentication
6LoWPAN
Key Match Algorithm
IoT based network
Intrusion Detection System (IDS)
intrusion detection system
Intrusion Detection
Internet of Things
internet
encryption techniques
Cryptography
composability
Clustering algorithms
Cluster-Based Algorithm
CBA algorithm
authentication techniques
biblio
IPv6 Routing Protocol for Low-Power and Lossy Networks Implementation in Network Simulator \#x2014; 3
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Policy
wireless sensor networks
Topology
telecommunication power management
RPL multiple instances
RPL
Routing protocols
Routing
reliable communication
pubcrawl
protocol verification
privacy
policy-based collaboration
Compositionality
physical environments
NS3
ns-3 implementation
network simulator
maintenance engineering
lossy networks implementation
lossy environments
Linear programming
IPv6 Routing Protocol
IP networks
Hardware
efficient energy management system
biblio
Performance Evaluation of RPL Protocol under Mobile Sybil Attacks
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
RPL protocol
pubcrawl
resilience
Resiliency
Routing
routing protocol for low-power and lossy networks
Routing protocols
routing security
RPL
power aware computing
Scalability
stolen identities
Sybil attack
SybM
Topology
Trust Routing
trust-based intrusion detection system
IoT security
computer network performance evaluation
computer network security
control overhead
energy consumption
fake control messages
Internet of Things
Internet of Things applications
IoT
composability
mobile computing
mobile nodes
mobile sybil attacks
network topology
packet delivery
performance evaluation
physical adversary
biblio
New Trust Metric for the RPL Routing Protocol
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
security
resilience
Resiliency
Routing
routing nodes
Routing protocols
RPL
RPL routing protocol
Scalability
Secure Routing
reliable routing processes
Selfish nodes
telecommunication network reliability
telecommunication security
trust inference problem
Trust management
trust metric
trust objective function
Trust Routing
vital security requirement
Linear programming
BR
collaboration
composability
distributed Bellman-Ford algorithm
DODAG information object message
ERNT
extended RPL node trustworthiness
Internet of Things
IoT security
border router
lossy networks
Low power
maintenance engineering
Measurement
metric based RPL trustworthiness scheme
MRTS
new Objective Function TOF
pubcrawl
biblio
Link Reliable and Trust Aware RPL Routing Protocol for Internet of Things
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
Scalability
QoS
QoS guarantees
quality of service
resilience
Resiliency
Routing
Routing protocols
RPL
pubcrawl
security
standardized protocols
telecommunication security
Topology
trust model
Trust Routing
trust value computation
composability
processing resources
power consumption
network routing topology
multidimensional approach
memory usage
low-power lossy networks
link reliable-trust aware RPL routing protocol
IoT environment
IoT entities
IoT
Internet of Things
heterogeneous devices
Energy Efficiency
deployed devices
Computational modeling
biblio
Review on Mechanisms for Detecting Sinkhole Attacks on RPLs
Submitted by grigby1 on Mon, 03/19/2018 - 1:46pm
RPL
Peer-to-peer computing
personal area networks
pubcrawl
resilience
Resiliency
Routing attack
Routing Protocol
Routing protocols
network topology
RPL components
security
Sinkhole attack
telecommunication security
Topology
wireless sensor networks
WSN
IP networks
composability
computer network security
Cyber Physical Systems Security
existing detection mechanisms
existing security challenges
internet
Internet of Things
Internet Protocol version 6
6LoWPAN
IPv6 packet
limited resources
lossy network
low power wireless personal area networks
maintenance engineering
network damage
network layer
biblio
Experimental Study of IP Spoofing Attack in 6LoWPAN Network
Submitted by grigby1 on Mon, 03/19/2018 - 1:45pm
IPv6 protocol
wrong IPv6-MAC binding
telecommunication power management
RPL
Routing protocols
Resiliency
resilience
Registers
pubcrawl
personal area networks
memory consumption
Media Access Protocol
low power personal area networks
lossy personal area networks
IPv6 Spoofing
6LoWPAN
IP spoofing attack
IP networks
Internet of Things
energy consumption
encryption
Cyber Physical Systems Security
Cooja Simulator
computer network security
composability
access protocols
6LoWPAN-ND
6LoWPAN network
6LoWPAN control messages
« first
‹ previous
1
2
3
4
5
next ›
last »