Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
routing path
biblio
A Lightweight Trust-Based Security Architecture for RPL in Mobile IoT Networks
Submitted by grigby1 on Wed, 02/26/2020 - 3:35pm
Scalability
nonce identity value
privacy
pubcrawl
Resiliency
Routing
routing path
Routing protocols
RPL
RPL IoT routing algorithm
RSSI
node trust value
security
sensor networks
Sybil based identity attacks
telecommunication network routing
telecommunication security
Trust Routing
Whitelists
wireless sensor networks
Wireshark
COTS IoT devices
ARSSI
average received signal strength indicator
commercial off the shelf standards
common security techniques
composability
computer architecture
Conferences
control overhead
Cooja network simulator
architecture
denial of service attack
Internet of Things
lightweight trust-based security architecture
military communities
mobile IoT network
mobile IoT wireless network
mobile radio
Network Security Architecture
network whitelist
biblio
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
routing discovery phase
Peer-to-peer computing
privacy
privacy-preserving verification
pubcrawl
PVad
resilience
Resiliency
Routing
passive attacks
routing path
routing security
security
security of data
source node
telecommunication network routing
telecommunication security
verification
expected log data
Ad hoc networks
cognition
Compositionality
data privacy
Data Transmission
Diagnostics
distributed cooperation
dynamic topology
active attacks
expected routing paths
MANET
MANETs
Metrics
mobile ad hoc networks
mobile computing
multiple malicious nodes
biblio
History Trust Routing Algorithm to Improve Efficiency and Security in Wireless Sensor Network
Submitted by grigby1 on Wed, 04/11/2018 - 2:02pm
security
wireless sensor networks
Wireless Sensor Network
Wireless communication
Trusted Computing
Trust Routing
trust path routing algorithm
telecommunication security
telecommunication network routing
technological limit
Stability analysis
source node
sink node
composability
secure route
Scalability
routing trust history table
routing path
Routing
Resiliency
resilience
pubcrawl
Peer-to-peer computing
history trust routing algorithm
History