Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cluster head
biblio
An Energy Aware Fuzzy Trust based Clustering with group key Management in MANET Multicasting
Submitted by aekwall on Mon, 11/02/2020 - 1:41pm
pubcrawl
MANET multicasting
manet privacy
member movement
Metrics
mobile ad hoc networks
multicast communication
pattern clustering
Polynomial-based key management
polynomials
Protocols
lower capacity resources
Reliability
repeated node movement
Resiliency
secure multicast transmission
style
telecommunication power management
telecommunication security
trust
trustable environment fuzzy based trust
Energy states
clustered networks
clustering
clustering concepts
Compositionality
considerably stable environment fuzzy based trust
Cryptography
delays
energy aware fuzzy trust
energy consumption
cluster head
Fuzzy based
Fuzzy logic
fuzzy set theory
group key
group key maintenance
Group key management
highest trust
key refreshment
link breakdown
biblio
Key distribution protocol for Identity Hiding in MANETs
Submitted by aekwall on Mon, 11/02/2020 - 1:40pm
identity
authentication scheme
mobile nodes
central administration
mobile ad-hoc networks
anonymous
centralization problem
centralized counterpart
clustered ad-hoc networks
high dense networks
wireless links
identity disclosure
identity hiding
identity spoofing
key distribution protocol
key distribution scheme
networks scales
periodically updated security keys
manet privacy
authentication
Receivers
telecommunication security
Cryptographic Protocols
Resiliency
pubcrawl
malicious nodes
Cryptography
Metrics
data privacy
Routing protocols
MANET
mobile ad hoc networks
MANETs
Ad hoc networks
mobile computing
Compositionality
cluster head
biblio
Will Blockchain Technology Become a Reality in Sensor Networks?
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
telecommunication network routing
sensor networks
security features
resource-constrained wireless sensor network
private communication blockchain framework
memory storage
load balancing multihop routing shares
LBMH routing shares
control overhead reduction
constant bit rate
computation power
cluster heads
cluster head
battery life
blockchain technology
sensor security
telecommunication security
resource allocation
blockchain
Metrics
Computational modeling
sensor nodes
Peer-to-peer computing
Routing
wireless sensor networks
batteries
composability
pubcrawl
Human behavior
Resiliency
security
biblio
New Approach to Secure Cluster Heads in Wireless Sensor Networks
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
inter-cluster communication
cluster head
resource constraints
Aggregation
Cluster.
cryptographic algorithm
genetic algorithm based search
Head
hierarchical architecture security
malicious attacks
intra-cluster communication
multihop approach
node failure probability
overhead communication
overhead computation
secured WSN deployment
wireless links
Wireless Sensor Network
Metrics
telecommunication security
security
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
sensor nodes
Monitoring
Clustering algorithms
probability
genetic algorithms
security threats
sensor security
Topology
data aggregation
biblio
Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks
Submitted by aekwall on Mon, 02/17/2020 - 1:33pm
pubcrawl
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication network reliability
sensor security
selective forwarding attacks
selective forwarding attack
security attacks
security
Routing protocols
Routing
robust recovery schemes
Resiliency
reliable transmission scheme
cluster head
Protocols
Predictive Metrics
network coding
Metrics
malicious security attacks
low energy adaptive clustering hierarchy
LEACH protocol
Human behavior
encoding
diversity coding
delays
cyber physical systems
composability
cluster routing protocols
biblio
Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach
Submitted by aekwall on Mon, 12/09/2019 - 11:24am
illegitimate sensor nodes
cluster head
cluster member
clustered-sensor enabled IoT
control packets
EETE scheme
Energy
Energy Efficiency
energy efficient trust evaluation scheme
game theory oriented approach
hierarchical trust evaluation model
cluster formation game
light weight security
malicious activity
Nash Equilibrium
network wide dissemination
optimal cluster formation dilemma game
sensor enabled Internet of Things
sensor networks
trust recommendations
trust requests
Computing Theory and Trust
Computational modeling
Internet of Things
telecommunication security
Internet of Things (IoT)
Trusted Computing
game theory
pubcrawl
composability
wireless sensor networks
energy conservation
Cryptography
security
clustering
trust
network lifetime
Games
energy consumption
Compositionality
anomaly detection technique
activity-based trust dilemma game
CH
biblio
Hierarchical Trust-Based Black-Hole Detection in WSN-Based Smart Grid Monitoring
Submitted by grigby1 on Mon, 11/19/2018 - 11:32am
Power Grid
WSN-based smart grid monitoring
wireless sensor networks
weighted clustering
telecommunication security
smart power grids
Smart Grid Sensors
smart grid monitoring
Resiliency
resilience
pubcrawl
Ad hoc networks
packets dropped ratio
Human Factors
Human behavior
hierarchical trust-based black-hole detection
hierarchical trust evaluation
data aggregation
Compositionality
cluster head
black-hole attack
biblio
Cluster-based technique for detection and prevention of black-hole attack in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 11:31am
pubcrawl
MANET
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile computing
NS2 simulator
packet delivery ratio
particular node
pattern clustering
PDR
malicious nodes
rapid node mobility
resilience
Resiliency
Routing
Routing protocols
Secure Routing
security
telecommunication security
Throughput
trustworthy security protocol
clustering direction
ad hoc routing
AODV
AODV routing protocol
Attack detection
black-hole attack
black-hole attack detection
black-hole attack prevention
cluster head
Cluster-head
clustering
Ad hoc networks
Compositionality
contagious nodes
Cryptographic Protocols
data packets
data transfer
end to end delay throughput
energy simulation inferences
ETD throughput
fresh route