Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
virtual node
biblio
Permissioned Blockchains and Virtual Nodes for Reinforcing Trust Between Aggregators and Prosumers in Energy Demand Response Scenarios
Submitted by aekwall on Mon, 09/28/2020 - 11:17am
grid stability
renewable energy sources
end-to-end security
cyber physical systems
active consumer participation
auditable DR framework
DERs
design innovative DR schemes
DR services
DR signals
energy demand response scenarios
energy stakeholders
energy supply
energy waste
open systems
legacy energy systems
Load management
modern smart grid technologies
modern smart grids
reliable DR framework
RES
scale deployment
smart contract-based DR framework
software stakeholders
tamper-resistant DR framework
virtual node
virtual nodes
CPS Privacy
Permissioned Blockchains
Internet of Things
IoT devices
security
Human behavior
pubcrawl
blockchain
privacy
smart power grids
Stakeholders
smart contracts
power engineering computing
Smart Grids
power grids
data privacy
distributed power generation
energy management systems
power system stability
smart meters
Human Factors
demand side management
demand response
Fog computing
energy system
contracts
blockchains
interoperability
biblio
Prevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm
Submitted by grigby1 on Wed, 06/20/2018 - 11:39am
mobile ad hoc networks
WSN
wireless sensor networks
virtual node
telecommunication security
selective flooding technique
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Optimized Link State Routing protocol
OLSR protocol
OLSR
network layer attacks
attack prevention
Metrics
MANET routing protocol
MANET
formal routing
Fictitious Node Mechanism
Elliptic curve cryptography
ECC algorithm
DoS attacks
DoS
denial of service attack
Denial Contradictions
DCFM
Compositionality