Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cooja Simulator
biblio
Performance Analysis of Internet of Things Routing Protocol for Low Power and Lossy Networks (RPL): Energy, Overhead and Packet Delivery
Submitted by aekwall on Mon, 11/29/2021 - 12:54pm
6LoWPAN
composability
Control Message Overhead
Cooja Simulator
electromagnetic interference
energy consumption
Internet of Things
Internet of Things Routing Protocol
packet delivery ratio
performance evaluation
pubcrawl
Resiliency
Routing protocols
standards
traffic control
biblio
Performance Evaluation of RPL protocol in a 6LoWPAN based Smart Home Environment
Submitted by aekwall on Mon, 12/21/2020 - 12:28pm
IoT enabled smart home environment
Telecommunication standards
Wireshark
PDR
Device-to-device communication
Home appliances
Resiliency
Cooja Simulator
Contiki OS
Routing Protocol
IPv6 network protocol
IPv6-enabled 6LoWPAN
low range wireless applications
low-range communication protocol
network analyzer tool
short-range IoT applications
smart home architecture
mobile radio
IP networks
Internet of Things
pubcrawl
composability
Routing protocols
telecommunication power management
RPL protocol
6LoWPAN
RPL
telecommunication computing
Throughput
home computing
Smart Home
smart home environment
smart cities
personal area networks
biblio
Simulating RPL Attacks in 6lowpan for Detection Purposes
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
electronic devices
RPL protocol functioning
RPL attacks
routing protocol for low-power and lossy networks
IPv6 over low-power wireless personal area networks
Cooja Simulator
contiki operating system
attack condition
6LoWPAN networks
Resiliency
Packet loss
WSN
network components
personal area networks
LLN
telecommunication network topology
routing attacks
6LoWPAN
Cybersecurity
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
IoT devices
Internet of Things
IP networks
computer network security
biblio
Experimental Study of IP Spoofing Attack in 6LoWPAN Network
Submitted by grigby1 on Mon, 03/19/2018 - 12:45pm
IPv6 protocol
wrong IPv6-MAC binding
telecommunication power management
RPL
Routing protocols
Resiliency
resilience
Registers
pubcrawl
personal area networks
memory consumption
Media Access Protocol
low power personal area networks
lossy personal area networks
IPv6 Spoofing
6LoWPAN
IP spoofing attack
IP networks
Internet of Things
energy consumption
encryption
Cyber Physical Systems Security
Cooja Simulator
computer network security
composability
access protocols
6LoWPAN-ND
6LoWPAN network
6LoWPAN control messages
biblio
Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks
Submitted by grigby1 on Mon, 03/19/2018 - 12:45pm
sensor nodes
personal area networks
power consumption
Protocols
pubcrawl
remote server
resilience
Resiliency
resource-constrained sensors
S3K technique
Scyther security protocol verification tool
personal area network identification
sensors
Servers
session key distribution
symmetric key establishment method
telecommunication network routing
telecommunication power management
telecommunication security
trust anchor
wireless sensor networks
Cryptography
6LoWPAN wireless sensor networks
authentication
CBC mode
cipher block chaining
composability
Contiki
ContikiOS
Cooja Simulator
Cryptographic Protocols
6LoWPAN
Cyber Physical Systems Security
datagram transport layer security
DTLS
EAKES6Lo technique
Edge router
LAUP
lightweight authentication protocol
Lucky Thirteen attack
PAN ID
biblio
Contiki-based mitigation of UDP flooding attacks in the Internet of things
Submitted by grigby1 on Tue, 01/16/2018 - 5:27pm
composability
Computer crime
Contiki
Cooja Simulator
DDoS attack mitigation
Floods
Human behavior
ICMP
IEEE 802.15 Standard
Internet of Things
Limiting
Metrics
Protocols
pubcrawl
Resiliency
UDP flood