Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
LLN
biblio
A Study of RPL Attacks and Defense Mechanisms in the Internet of Things Network
Submitted by grigby1 on Tue, 12/06/2022 - 2:51pm
IoT
Topology
SRPs
security
RPL
Routing protocols
Routing
network topology
LLN
6LoWPAN
Intrusion Detection
Internet of Things
IDS
pubcrawl
composability
resilience
Resiliency
biblio
IDS To Detect Worst Parent Selection Attack In RPL-Based IoT Network
Submitted by grigby1 on Tue, 12/06/2022 - 2:51pm
LLN
Worst parent selection
System performance
simulation
RPL network
Routing protocols
routing attacks
Routing
performance evaluation
Of0)
Ob-jective Function (MRHOF
6LoWPAN
Linear programming
IoT network
Intrusion Detection
IDS
Contiki-Cooja
pubcrawl
composability
resilience
Resiliency
biblio
An Optimized Mobility Management Framework for Routing Protocol Lossy Networks using Optimization Algorithm
Submitted by grigby1 on Tue, 12/06/2022 - 2:50pm
LPWN
Topology
Throughput
RPL
Routing protocols
Routing
network topology
Mobility
metaheuristics
6LoWPAN
LPLN
LLN
IoT
delays
pubcrawl
composability
resilience
Resiliency
biblio
Failure Detectors for 6LoWPAN: Model and Implementation
Submitted by grigby1 on Tue, 12/06/2022 - 2:49pm
Detectors
Wireless communication
Reliability
Memory management
LLN
IoT
Internet of Things
IEEE 802.15 Standard
failure detector
6LoWPAN
computer network reliability
Computational modeling
agreement
pubcrawl
composability
resilience
Resiliency
biblio
Identifying Rank Attacks and Alert Application in WSN
Submitted by aekwall on Mon, 11/29/2021 - 1:54pm
Routing protocols
SCF
rank attack
PDR
LLN
Dijkstra's algorithm
RPL
WSN
6LoWPAN
wireless sensor networks
Throughput
composability
Resiliency
pubcrawl
Wireless communication
performance evaluation
quality of service
Routing
biblio
Simulating RPL Attacks in 6lowpan for Detection Purposes
Submitted by aekwall on Mon, 12/21/2020 - 1:26pm
electronic devices
RPL protocol functioning
RPL attacks
routing protocol for low-power and lossy networks
IPv6 over low-power wireless personal area networks
Cooja Simulator
contiki operating system
attack condition
6LoWPAN networks
Resiliency
Packet loss
WSN
network components
personal area networks
LLN
telecommunication network topology
routing attacks
6LoWPAN
Cybersecurity
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
IoT devices
Internet of Things
IP networks
computer network security
biblio
Intrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
Scalability
resilience
Resiliency
Routing
Routing protocols
RPL
RPL attack detection techniques
RPL based loT
RPL based routing attacks
rank attack
security
security of data
source routing protocol
Topology
version attack
Wormhole
wormhole attack
Intrusion Detection
Blackhole
Blackhole attack
computer network security
Conferences
countermeasures
IDS
IDS research contribution techniques
Internet of Things
attacks
intrusion detection system
IoT
knowledge driven approach
lightweight routing protocol stack
LLN
low power lossy networks
pubcrawl
biblio
Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things
Submitted by aekwall on Wed, 02/13/2019 - 11:55am
Internal Threat
IoT
LLN
OF
Rank Attack Manipulation
RPL
Resiliency
Human behavior
pubcrawl
metric
threat mitigation