Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Aggregation
biblio
DEAVD - Data Encryption and Aggregation using Voronoi Diagram for Wireless Sensor Networks
Submitted by aekwall on Mon, 02/15/2021 - 4:48pm
energy conservation
wireless sensor networks
voronoi diagram paradigm
Voronoi diagram
sensed data
secure data exchange
Resiliency
pubcrawl
providing security
Protocols
military surveillance
environmental monitoring
energy efficient encryption
energy consumption
Aggregation
encryption
efficient encryption
Decryption Technique
decryption
DEAVD protocol compresses data
data encryption
data communication
data aggregation
cyber physical systems
Cryptography
Cryptographic Protocols
computational geometry
composability
biblio
New Approach to Secure Cluster Heads in Wireless Sensor Networks
Submitted by aekwall on Mon, 02/17/2020 - 2:34pm
inter-cluster communication
cluster head
resource constraints
Aggregation
Cluster.
cryptographic algorithm
genetic algorithm based search
Head
hierarchical architecture security
malicious attacks
intra-cluster communication
multihop approach
node failure probability
overhead communication
overhead computation
secured WSN deployment
wireless links
Wireless Sensor Network
Metrics
telecommunication security
security
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
sensor nodes
Monitoring
Clustering algorithms
probability
genetic algorithms
security threats
sensor security
Topology
data aggregation
biblio
Two-Phase Incentive-Based Secure Key System for Data Management in Internet of Things
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
Scalability
Internet of Things
key complexity
key cost
light-weight keys
low-level secure keys
multiphase security
network optimization
privacy
Privacy Policies
pubcrawl
Human Factors
security keys
self-trust incentive level
server-trust incentive level
Servers
service providers
TISK phase-I Generic Service Manager
TISK phase-II Dedicated Service Manager
TISK system
two-phase incentive-based secure key system
user nodes
data manager nodes
authentication
authorisation
authorized transactions
Certificate Generation
Complexity theory
computer network security
data aggregator nodes
data collector nodes
data expert nodes
data integrity
Aggregation
data privacy
data transactions
Database management in IoT
distributed data management
Distributed databases
distributed secure data management system
DSM-C module verifies
expert systems
GSM-C module
high-level secure keys
biblio
Aggregation architecture for data reduction and privacy in advanced metering infrastructure
Submitted by grigby1 on Wed, 02/21/2018 - 1:53pm
Human Factors
utility grid analysis
temporary data buffering
smart power grids
smart meters
Smart Grid Privacy
smart grid consumer privacy
Scalability
Resiliency
resilience
pubcrawl
privacy
power grids
Measurement
international interest
advanced metering infrastructure
Human behavior
Floods
estimation
electricity conservation
data reduction
data privacy
consumer privacy
Big Data
architecture
anonymized summary data
aggregators
aggregation architecture
Aggregation
biblio
Distributed Software Infrastructure for General Purpose Services in Smart Grid
Submitted by grigby1 on Mon, 11/13/2017 - 11:50am
open systems
web services
UK distribution network
smart power grids
Smart Grid
sensors
security
Resiliency
Reliability
pubcrawl
power system security
power engineering computing
power distribution reliability
pervasive computing
peer-to-peer distributed software infrastructure
Peer-to-peer computing
Aggregation
middleware security
middleware reliability
middleware
interoperability
heterogeneous technology
hardware-independent interoperability
general purpose services
event-driven middleware
event-based middleware
distribution network
distributed systems
Demand response (DR)
composability
communication technology attacks
collaboration