Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

RPL security

biblio

Visible to the public Trust-Based Enhanced Secure Routing against Rank and Sybil Attacks in IoT

Submitted by grigby1 on Wed, 02/26/2020 - 4:34pm
  • routing protocol for low power and lossy network
  • trustworthy nodes
  • trust-based enhanced secure RPL routing attacks
  • trust value
  • Trust Routing
  • trust evaluation methods
  • sybil attacks
  • Sybil attack
  • standardized proactive routing protocol
  • security
  • Secure DODAG Construction
  • Sec-Trust protocol
  • Scalability
  • RPL security
  • Routing protocols
  • composability
  • Routing
  • resource constrained characteristics
  • rank attack
  • pubcrawl
  • providing routing security using the technique of collective trust mechanism
  • PROTECT
  • performance evaluation
  • IoT network
  • IoT
  • Internet of Things
  • forwarding data packets
  • energy consumption
  • computer network security
biblio

Visible to the public A Trust-Based Intrusion Detection System for Mobile RPL Based Networks

Submitted by grigby1 on Mon, 03/19/2018 - 1:46pm
  • resilience
  • wireless sensor networks
  • Trusted Platform Module co-processor
  • Trust Routing
  • telecommunication security
  • T-IDS
  • Sybil-Mobile attack
  • Sybil attack
  • security attacks
  • RPL security
  • routing security
  • Routing protocols
  • Routing Protocol
  • Routing
  • Resiliency
  • 6LoWPAN
  • pubcrawl
  • Peer-to-peer computing
  • off-load security related computation
  • Monitoring
  • mobility support
  • mobile RPL based networks
  • mobile radio
  • Mobile communication
  • IoT
  • Intrusion Detection System scheme
  • intrusion detection system
  • Intrusion Detection
  • Cyber Physical Systems Security
  • composability

Terms of Use  |  ©2023. CPS-VO