Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Sinkhole attack
biblio
Network Layers Threats its Countermeasures in WSNs
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
security countermeasures
WSN
wormhole attack
wireless sensor networks
telecommunication security
telecommunication network reliability
Sybil attack
Sinkhole attack
selective forwarding attack
security requirements
security hazards
Blackhole attack
Scalability
Resiliency
resilience
reliable file exchange
pubcrawl
network layer threats
network layer intrusions
hello flood attack
dimensionally diffused nodes
Blackhole Attack And Hello Flood Attac
biblio
HCOBASAA: Countermeasure Against Sinkhole Attacks in Software-Defined Wireless Sensor Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
probability of false negative
wireless sensor networks
telecommunication security
software-defined wireless sensor cognitive radio network
Sinkhole attack
sink node
sensor nodes
Resiliency
resilience
pubcrawl
probability of false positive
Base stations
probability of detection
Performance Metrics
Hop Count-Based Sinkhole Attack detection Algorithm
HCOBASAA
detection algorithms
Databases
Communication system security
Cognitive Radio Security
cognitive radio
change in position
biblio
Watchdog and Pathrater based Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:15am
routing table
open nodes
pathrater
pathrater method
Peer-to-peer computing
pubcrawl
Resiliency
Routing
Routing protocols
network topology
security
security of data
Sinkhole attack
telecommunication security
unwanted malicious attacks
Watchdog
watchdog method
Ad-hoc On-demand Distance Vector
mobile radio
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
fake route
effective intrusion detection system
dynamic source routing
computer network security
composability
broad distribution
AODV routing protocol
biblio
An Efficient and Secure Directed Diffusion in Industrial Wireless Sensor Networks
Submitted by aekwall on Mon, 02/18/2019 - 12:57pm
pubcrawl
composability
directed diffusion
iwsns
node compromise
pairing
Sinkhole attack
Sybil attack
sybil attacks
Metrics
biblio
Detection and Prevention of Black Hole Attacks in IOT Amp;Amp; WSN
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
smart toasters
refrigerators
resilience
Resiliency
security
selective forwarding attack
Sensor
sensors
Sinkhole attack
Smart Grid Sensors
smart grid stations
Smart Grids
pubcrawl
smartphone
Sybil attack
VANET
vulnerabilities
Wireless communication
Wireless Sensor Network
wireless sensor networks
wormhole attack
WSN
WSN network
Human behavior
autonomous cars
Base stations
black hole
Black hole attacks
body sensor networks
Compositionality
computer network security
gateway nodes
Generic Nodes
grey hole
hello flood attacks
attacks
Human Factors
internet
Internet of Everything
Internet of Things
internetworking
IoET
jamming-attack
Logic gates
network servers
PDA
biblio
Secure and attack aware routing in mobile ad hoc networks against wormhole and sinkhole attacks
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
Resiliency
wormhole attacks
wormhole attack
telecommunication security
sinkhole node
sinkhole attacks
Sinkhole attack
security attacks
security
secure attack aware routing
Routing protocols
Routing
AODV
resilience
pubcrawl
mobile nodes
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
Compositionality
attack prevention
Attack Aware Alert
biblio
Review on Mechanisms for Detecting Sinkhole Attacks on RPLs
Submitted by grigby1 on Mon, 03/19/2018 - 1:46pm
RPL
Peer-to-peer computing
personal area networks
pubcrawl
resilience
Resiliency
Routing attack
Routing Protocol
Routing protocols
network topology
RPL components
security
Sinkhole attack
telecommunication security
Topology
wireless sensor networks
WSN
IP networks
composability
computer network security
Cyber Physical Systems Security
existing detection mechanisms
existing security challenges
internet
Internet of Things
Internet Protocol version 6
6LoWPAN
IPv6 packet
limited resources
lossy network
low power wireless personal area networks
maintenance engineering
network damage
network layer
biblio
Neighbor-Passive Monitoring Technique for Detecting Sinkhole Attacks in RPL Networks
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
6LoWPAN
collaboration
composability
Internet of Things
intrusion detection system
ipv6 security
Metrics
pubcrawl
Resiliency
RPL
Sinkhole attack
WSN