Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Malicious Attacker

biblio

Visible to the public SQMAA: Security, QoS and Mobility Aware ACO Based Opportunistic Routing Protocol for MANET

Submitted by aekwall on Tue, 05/26/2020 - 10:58am
  • mobility conditions
  • ACO
  • ad hoc network
  • ant colony optimisation
  • Ant colony optimization
  • guaranteed QoS performance
  • Malicious Attacker
  • malicious attackers
  • MANET open nature network
  • MANET routing protocols
  • mobile nodes
  • opportunistic routing protocol
  • QoS aware protocol
  • QoS improvement algorithm
  • RSSI measurements
  • Secure-QMAA
  • security Algorithm
  • security-QoS mobility aware ACO routing protocol
  • SQMAA
  • RSSI
  • authorisation
  • Data Security
  • telecommunication security
  • security
  • network security
  • Resiliency
  • pubcrawl
  • Routing protocols
  • Routing
  • Scalability
  • Swarm Intelligence
  • quality of service
  • secure communication
  • mobile ad hoc networks
  • Blackhole attack
  • mobility management (mobile radio)
  • DoS attacks
  • user authentication
biblio

Visible to the public Novel IDS security against attacker routing misbehavior of packet dropping in MANET

Submitted by grigby1 on Wed, 06/20/2018 - 12:32pm
  • Nodes
  • telecommunication security
  • telecommunication network routing
  • security
  • Secure Routing
  • routing. Security
  • Routing protocols
  • Routing
  • Resiliency
  • resilience
  • Receivers
  • pubcrawl
  • Packet dropping
  • Attack detection
  • mobile ad hoc networks
  • mobile ad hoc network
  • Metrics
  • Measurement
  • MANET
  • Malicious Attacker
  • intermediate nodes
  • IDS security system
  • IDS
  • Compositionality
  • attacker routing misbehavior

Terms of Use  |  ©2023. CPS-VO