Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
black-hole attack
biblio
Performance Analysis of Adhoc On-demand Distance Vector Protocol under the influence of Black-Hole, Gray-Hole and Worm-Hole Attacks in Mobile Adhoc Network
Submitted by aekwall on Mon, 01/10/2022 - 12:53pm
network layer attacks
Worm-hole
simulation
security mechanism
Scalability
Routing protocols
Routing
Resiliency
pubcrawl
Performance analysis
AODV
NETSIM
MANET
Human behavior
gray-hole attack
energy consumption
Earthquakes
control systems
black-hole attack
Attack vectors
biblio
Performance Impact Analysis of Security Attacks on Cross-Layer Routing Protocols in Vehicular Ad hoc Networks
Submitted by grigby1 on Tue, 05/25/2021 - 2:19pm
Cross Layer Security
black-hole attack
composability
Cross-layer routing
gray-hole attack
MAC attacks
pubcrawl
resilience
Resiliency
security
VANET
biblio
Analysis and Countermeasures of Black-Hole Attack in MANET by Employing Trust-Based Routing
Submitted by aekwall on Tue, 03/09/2021 - 12:38pm
mobile ad hoc networks
trust-based routing scheme
trust-based routing
telecommunication security
Scalability
Routing protocols
Routing Protocol
routing environment
Routing
Resiliency
reactive protocol
pubcrawl
packet delivery ratio
node data transfer mechanism
mobile nodes
Trust Routing
mobile ad hoc network
MANET
Energy states
data transaction
data retrieval
data packet
black-hole attack
Black hole attacks
Black hole attack
Attacker node
and trust-based scheme
Ad-hoc On-demand Distance Vector
Ad-doc On-Demand Distance Vector (AODV) protocol
biblio
DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification
Submitted by aekwall on Mon, 11/02/2020 - 2:41pm
log entries
anomalies detection
anomalous nodes
black-hole attack
collaborative malicious nodes
DAPV
diagnosing anomalies
direct attacks
distributed verification
expected log information
indirect attacks
abnormal nodes
malicious intermediated routers
MANET routing mechanism
Merkle hash tree
paralyzed nodes
privacy-preserving verification
provenance tracking
routing phase
university campus networks
Wireless Network Security
manet privacy
mobile radio
data privacy
telecommunication security
security
Resiliency
pubcrawl
Routing protocols
privacy
Routing
Peer-to-peer computing
Metrics
security of data
mobile ad hoc networks
Ad hoc networks
mobile computing
single nodes
central control program
cognition
routing phases
routing security
Compositionality
AODV protocol
biblio
Hierarchical Trust-Based Black-Hole Detection in WSN-Based Smart Grid Monitoring
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
Power Grid
WSN-based smart grid monitoring
wireless sensor networks
weighted clustering
telecommunication security
smart power grids
Smart Grid Sensors
smart grid monitoring
Resiliency
resilience
pubcrawl
Ad hoc networks
packets dropped ratio
Human Factors
Human behavior
hierarchical trust-based black-hole detection
hierarchical trust evaluation
data aggregation
Compositionality
cluster head
black-hole attack
biblio
Cluster-based technique for detection and prevention of black-hole attack in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
pubcrawl
MANET
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile computing
NS2 simulator
packet delivery ratio
particular node
pattern clustering
PDR
malicious nodes
rapid node mobility
resilience
Resiliency
Routing
Routing protocols
Secure Routing
security
telecommunication security
Throughput
trustworthy security protocol
clustering direction
ad hoc routing
AODV
AODV routing protocol
Attack detection
black-hole attack
black-hole attack detection
black-hole attack prevention
cluster head
Cluster-head
clustering
Ad hoc networks
Compositionality
contagious nodes
Cryptographic Protocols
data packets
data transfer
end to end delay throughput
energy simulation inferences
ETD throughput
fresh route
biblio
Trust-Based Protocol for Securing Routing in Opportunistic Networks
Submitted by grigby1 on Wed, 04/11/2018 - 3:02pm
pubcrawl
trust-based routing protocol
Trust Routing
telecommunication security
telecommunication network topology
store-carry-forward mechanism
securing routing
Scalability
Routing protocols
Routing
Resiliency
resilience
Ad hoc networks
Packet loss
Opportunistic Networks
Mathematical model
malicious nodes
gray-hole attack
end-to-end connection
dynamic network topology
delivery success ratio
composability
black-hole attack