Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Dsr
biblio
A Trust Based Scheme for Spotting Malicious Node of Wormhole in Dynamic Source Routing Protocol
Submitted by grigby1 on Mon, 11/08/2021 - 4:48pm
pubcrawl
composability
Cryptography
delays
Dsr
Hardware
MANET
mobile ad hoc networks
NS3 simulation
wormhole attack
resilience
Resiliency
Routing
Routing protocols
Scalability
Task Analysis
Trust Routing
biblio
Wormhole Formation and Simulation in Dynamic Source Routing Protocol using NS3
Submitted by aekwall on Mon, 08/02/2021 - 3:12pm
security
simulation
Packet loss
Routing
mobile ad hoc networks
pubcrawl
Metrics
Resiliency
Compositionality
MANET
Throughput
Routing protocols
Dsr
NS3 simulation
wormhole attack
MANET security
biblio
Performance Evaluation of Routing Protocols under Black Hole Attack in Cognitive Radio Mesh Network
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
protocol selection
Black hole attacks
Cognitive Radio Mesh Network
Cognitive Radio Network
cognitive radio networks
Demand Routing Protocol
intelligent radio network
maximum available spectrum
maximum licensed bandwidth
packet delivery ratio
cognitive radio
SAMER
selected routing protocol
SORP
spectrum allocation
Spectrum Aware Mesh Routing
un-licensed users
unused spectrum
wireless wired networks
radio networks
Resiliency
pubcrawl
Routing protocols
Routing
telecommunication network routing
mobile radio
delays
Mesh networks
Scalability
performance evaluation
Throughput
radio spectrum management
network topology
Black hole attack
wireless technology
Dsr
Performance analysis
biblio
Solutions to Black Hole Attacks in MANETs
Submitted by aekwall on Tue, 03/09/2021 - 12:37pm
mobile computing
ZRP
self-organising networks
original routing protocol
numerous routing protocols
importance each day
black hole attack solutions
Black hole attacks
OLSR
Dsr
AODV
black holes
Black hole attack
Energy Efficiency
security
Ad hoc networks
Throughput
mobile ad hoc networks
MANET
testing
Routing
Routing protocols
pubcrawl
Resiliency
telecommunication security
Scalability
RPL
biblio
Secure DSR Routing from Malicious Node by PGP Encryption
Submitted by grigby1 on Thu, 10/29/2020 - 11:59am
Routing protocols
pubcrawl
Public key
resilience
Resiliency
Route cache
route reply control messages
route request
Routing
PGP
RREP
RREP control message
RREQ
RREQ control message
secure DSR Routing
telecommunication security
UIV
weather RREP
malicious node
Cryptography
data transmission source
demand wireless communication
destination source
Dsr
dynamic source routing
encryption
intermediate node
Compositionality
MANET
manet privacy
MANET reactive routing protocol
Metrics
mobile ad hoc network
mobile ad hoc networks
neighbor nodes
Peer-to-peer computing
biblio
Performance Analysis of AODV and DSR Routing Protocols of MANET under Wormhole Attack and a Suggested Trust Based Routing Algorithm for DSR
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
mobile ad hoc network
wormhole tunnels
wormhole attack
trust
Throughput
telecommunication security
suggested trust based routing algorithm
spoofing attack
self-assembly
Routing protocols
routing algorithm
Routing
Resiliency
pubcrawl
Performance analysis
mobile ad hoc networks
Attack vectors
Metrics
MANET security
MANET
Jitter
dynamic source routing
DSR routing protocols
Dsr
delays
Compositionality
common routing protocols
Black hole attack
AODV routing protocols
AODV
Ad-hoc On-demand Distance Vector
biblio
A Security Mechanism in DSR Routing for MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
Resiliency
mobile ad hoc networks
mobile ad-hoc network
mobile nodes
prevention mechanism
Proposals
pubcrawl
radio range
reactive routing protocols
resilience
Metrics
route diversion
Routing Protocol
Routing protocols
RREP
security mechanism
security threads
source address
telecommunication security
wrong destination address
GDH
bandwidth constraint multihop wireless network
Compositionality
Conferences
Cryptographic Protocols
data communication
Destination address
Dsr
DSR Routing
dynamic source routing
autonomous collection
group Diffie-Hellman key management
Hash Function
intended required destination
intermediate node
intermediate trusted node start
malicious node
MANET
MANET routing
MANET security
biblio
Secure DSR Routing Protocol Based on Homomorphic Digital Signature
Submitted by grigby1 on Wed, 08/02/2017 - 1:40pm
detection
Dsr
Homomorphic
integrity
MANET
manet attack prevention
pubcrawl
security