Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
PDR
biblio
A Novel Authentication Mechanism for Securing Underwater Wireless Sensors from Sybil Attack
Submitted by grigby1 on Wed, 03/23/2022 - 11:35am
WSN
UWSN
Underwater Sensor Network
SN
PER
ECR
fuzzy system
underwater communication
sybil attacks
PDR
Fuzzy logic
security
Metrics
energy resources
Routing
composability
Wireless communication
wireless sensor networks
authentication
Resiliency
resilience
pubcrawl
biblio
Identifying Rank Attacks and Alert Application in WSN
Submitted by aekwall on Mon, 11/29/2021 - 1:54pm
Routing protocols
SCF
rank attack
PDR
LLN
Dijkstra's algorithm
RPL
WSN
6LoWPAN
wireless sensor networks
Throughput
composability
Resiliency
pubcrawl
Wireless communication
performance evaluation
quality of service
Routing
biblio
Packet Loss Avoidance in Mobile Adhoc Network by using Trusted LDoS Techniques
Submitted by grigby1 on Mon, 12/28/2020 - 1:01pm
packet loss avoidance
essential underlying reasons
FGA
full-size module
impenetrable direction advent
LDOS
LDoS attack
LDoS cyber-attacks
malicious events
MANET protection systems
marginal end-to-end facts packet interval
Mobile adhoc Network
more advantageous facts communication
packet evaluation method
covered direction-finding
packet radio networks
PDR
QoS advantages
routing protection
time programs
traditional trust-based techniques
trust based approach routing choices
trusted LDoS techniques
unbiased have faith table
unobjectionable records forfeiture
Wi-Fi network
wicked nodes
wireless security
wireless LAN
pubcrawl
Metrics
resilience
Resiliency
computer network security
telecommunication security
security
quality of service
telecommunication network routing
telecommunication traffic
Routing protocols
DDoS
Compositionality
security of data
MANET
mobile ad hoc networks
transport protocols
mobile radio
ad hoc network
malicious node
Adhoc community
assault statistics packets
attacks
brief time period
cell system
community multifractal
confident facts communication
biblio
Performance Evaluation of RPL protocol in a 6LoWPAN based Smart Home Environment
Submitted by aekwall on Mon, 12/21/2020 - 1:28pm
IoT enabled smart home environment
Telecommunication standards
Wireshark
PDR
Device-to-device communication
Home appliances
Resiliency
Cooja Simulator
Contiki OS
Routing Protocol
IPv6 network protocol
IPv6-enabled 6LoWPAN
low range wireless applications
low-range communication protocol
network analyzer tool
short-range IoT applications
smart home architecture
mobile radio
IP networks
Internet of Things
pubcrawl
composability
Routing protocols
telecommunication power management
RPL protocol
6LoWPAN
RPL
telecommunication computing
Throughput
home computing
Smart Home
smart home environment
smart cities
personal area networks
biblio
Behaviour Analysis and Detection of Blackhole Attacker Node under Reactive Routing Protocol in MANETs
Submitted by aekwall on Tue, 05/26/2020 - 10:58am
Scalability
Resiliency
pubcrawl
Routing
Routing protocols
collaboration
Throughput
MANETs
Ad hoc networks
mobile computing
AODV
Blackhole attack
Blackhole
Energy
PDR
Routing Protocol
biblio
Cluster-based technique for detection and prevention of black-hole attack in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
pubcrawl
MANET
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile computing
NS2 simulator
packet delivery ratio
particular node
pattern clustering
PDR
malicious nodes
rapid node mobility
resilience
Resiliency
Routing
Routing protocols
Secure Routing
security
telecommunication security
Throughput
trustworthy security protocol
clustering direction
ad hoc routing
AODV
AODV routing protocol
Attack detection
black-hole attack
black-hole attack detection
black-hole attack prevention
cluster head
Cluster-head
clustering
Ad hoc networks
Compositionality
contagious nodes
Cryptographic Protocols
data packets
data transfer
end to end delay throughput
energy simulation inferences
ETD throughput
fresh route
biblio
The Effect of Buffer Management Strategies on 6LoWPAN's Response to Buffer Reservation Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 1:45pm
resilience
Internet of Things
IoT security
packet drop rate
packets tags
PDR
personal area networks
Protocols
pubcrawl
fragmentation-based buffer reservation DoS attacks
Resiliency
Scoring Systems
slotted buffer
Split Buffer
split buffer mechanism
TCP-IP model
vehicular networking applications
composability
6L0WPAN adaptation layer
6LoWPAN
Adaptation models
buffer circuits
buffer cleanups
buffer management strategies
Buffer Reservation
Buffer storage
6L0WPAN
Computer crime
computer network security
Current measurement
Cyber Physical Systems Security
defence strategies
Fragmentation Attacks
fragmentation-based buffer reservation denial of service attacks