Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
6LoWPAN Protocol Based Infrared Sensor Network Human Target Locating System
Submitted by aekwall on Mon, 12/21/2020 - 12:27pm
Internet of Things
Protocols
pubcrawl
composability
wireless sensor networks
6LoWPAN
sensors
Optical sensors
Sensor Systems
Wireless Sensor Network
Cost function
Resiliency
human target location
infrared sensors
PIR
biblio
LPA-SDP: A Lightweight Privacy-Aware Service Discovery Protocol for IoT Environments
Submitted by aekwall on Mon, 12/21/2020 - 12:27pm
service discovery
ubiquitous data access
resource-constrained environments
resource discovery protocols
resource directory
privacy consideration
manual discovery
LPA-SDT
LPA-SDP
lightweight privacy-aware service discovery protocol
IoT deployments
battlefields
Resiliency
IoT
CoAP
resource-constrained devices
IoT environments
ubiquitous computing
Healthcare
6LoWPAN
privacy
Protocols
composability
pubcrawl
Internet of Things
data privacy
biblio
Real Time DDoS Intrusion Detection and Monitoring Framework in 6LoWPAN for Internet of Things
Submitted by aekwall on Mon, 12/21/2020 - 12:27pm
DDoS
Internet of Things
security
pubcrawl
composability
6LoWPAN
sensors
Resiliency
Contiki
biblio
Performance Evaluation of a Wormhole Detection Method using Round-Trip Times and Hop Counts in RPL-Based 6LoWPAN Networks
Submitted by aekwall on Mon, 12/21/2020 - 12:27pm
Intrusion Detection
RPL
pubcrawl
composability
6LoWPAN
Internet of Things
wormhole attack
Resiliency
biblio
Computational Analysis of Security Algorithm on 6LowPSec
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
radio links
IPv6 communication process
light weight IPSec
light weight variant
lightweight-based security need
message authentication
Peer-to-peer computing
personal area networks
pubcrawl
IP networks
Routing
Routing protocols
security
security Algorithm
security approach
security solutions
telecommunication security
word length 128.0 bit
AES
Resiliency
composability
Metrics
policy-based governance
6LoWPAN
6LoWPAN IoT environment
6LoWPAN radio link
6LowPSec protocol
ipv6 security
Ciphers
computer network security
Cryptographic Protocols
existing security protocol IPSec solutions
internet
Internet of Things
IoT
biblio
Investigation on 6LoWPAN Data Security for Internet of Things
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
Data Security
wireless sensor networks
Wireless communication
security
Routing protocols
pubcrawl
IoT security
Internet of Things (IoT)
Internet of Things
ipv6 security
Communication system security
authentication
6LoWPAN
policy-based governance
Metrics
composability
Resiliency
biblio
Simulating RPL Attacks in 6lowpan for Detection Purposes
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
electronic devices
RPL protocol functioning
RPL attacks
routing protocol for low-power and lossy networks
IPv6 over low-power wireless personal area networks
Cooja Simulator
contiki operating system
attack condition
6LoWPAN networks
Resiliency
Packet loss
WSN
network components
personal area networks
LLN
telecommunication network topology
routing attacks
6LoWPAN
Cybersecurity
Routing
wireless sensor networks
Routing protocols
composability
pubcrawl
IoT devices
Internet of Things
IP networks
computer network security
biblio
On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System
Submitted by grigby1 on Tue, 12/15/2020 - 12:27pm
secrecy key size
Asymmetric
Codecs
exact secure rate region
Gaussian processes
key size
key size characterization
multilevel diversity coding
multilevel diversity coding systems
S-AMDCS
5G wireless networks
secure asymmetric MDCS
secure asymmetric multilevel diversity coding system
source-separate coding
superposition secure rate region
symmetric
wiretap channel
wiretap channels
wiretapped messages
Cryptography
pubcrawl
Metrics
resilience
Resiliency
private key cryptography
telecommunication security
security
data privacy
Internet of Things
5G mobile communication
Big Data
Compositionality
Communication networks
secrecy
linear codes
network coding
coding theory
biblio
A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
Submitted by aekwall on Mon, 12/14/2020 - 11:41am
first-level high-energy node detection
base station
data storage
Base stations
WSN
sensor node
malicious attackers
radio transmitters
first-level
microsensors
high-energy
microsensor
network operation
second-level high-energy node detection
Sybil node detection
three-tier
three-tier detection scheme
wireless self-organizing multihop network
malicious nodes
Internet of Things
telecommunication security
Resiliency
pubcrawl
composability
Sybil attack
Wireless Sensor Network
wireless sensor networks
Monitoring
Sybil attack detection
telecommunication power management
Wireless communication
Metrics
sybil attacks
Mathematical model
network lifetime
biblio
IoT Object Security towards the Sybil Attack Using the Trustworthiness Management
Submitted by aekwall on Mon, 12/14/2020 - 11:41am
Resiliency
trustworthiness management
trust value
Topology
time 9.3287 s
time 18.1029 s
sybil attacks
Sybil attack
Servers
sensors
security of data
security attacks
trustworthiness
physical object
performance evaluation
Metrics
IoT object security
intruder object
Internet of Things
electronic data interchange
data exchange
authentication
composability
pubcrawl
« first
‹ previous
…
42
43
44
45
46
47
48
49
50
…
next ›
last »