Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DYMO
biblio
Detection Jellyfish Attacks Against Dymo Routing Protocol on Manet Using Delay Per-Hop Indicator (Delphi) Method
Submitted by aekwall on Mon, 02/07/2022 - 4:08pm
delays
Routing
information technology
Wireless communication
pubcrawl
Metrics
Resiliency
Compositionality
MANET
Throughput
mobile computing
Routing protocols
DELPHI
DYMO
Jellyfish
MANET Attack Detection
biblio
RAD: Reinforcement Authentication DYMO Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
demand protocol
Secret key
Compositionality
Encryption technique
mobility management (mobile radio)
malicious node
MANET security
authentication technique
average throughput
cryptographic operations
mobile ad hoc network
DYMO
dynamic MANET
infrastructure centralized server
MD5
Message Digest 5
RAD
reinforcement authentication DYMO protocol
Reinforcement.
Routing protocols
telecommunication security
Cryptographic Protocols
learning (artificial intelligence)
Resiliency
pubcrawl
Routing
Metrics
Reinforcement learning
authentication
encryption
message authentication
packet delivery ratio
telecommunication computing
delays
MANET
mobile ad hoc networks
Throughput
end to end delay
biblio
Impact of unreliable positioning in location-based routing protocols for MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
mobile computing
unreliable positioning
tools
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
quality of service
pubcrawl
privacy
positioning error
node scalability
network overhead
network lifetime
Ad hoc networks
mobile ad hoc networks
Metrics
MANET
location-based routing protocols
Energy Efficiency
effective routing
DYMOselfwd
DYMO
Data Security
data privacy
Compositionality
AODV-Line
AODV