Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
rank attack
biblio
Identifying Rank Attacks and Alert Application in WSN
Submitted by aekwall on Mon, 11/29/2021 - 1:54pm
Routing protocols
SCF
rank attack
PDR
LLN
Dijkstra's algorithm
RPL
WSN
6LoWPAN
wireless sensor networks
Throughput
composability
Resiliency
pubcrawl
Wireless communication
performance evaluation
quality of service
Routing
biblio
RPL Assessment using the Rank Attack in Static and Mobile Environments
Submitted by grigby1 on Tue, 02/16/2021 - 1:41pm
energy consumption
Damage Assessment
Static environment
rank attack
Mobility
mobile environment
Informatics
Technological innovation
RPL
security
Measurement
network topology
Topology
Resiliency
resilience
pubcrawl
IoT
biblio
Intrusion Detection System Based RPL Attack Detection Techniques and Countermeasures in IoT: A Comparison
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
Scalability
resilience
Resiliency
Routing
Routing protocols
RPL
RPL attack detection techniques
RPL based loT
RPL based routing attacks
rank attack
security
security of data
source routing protocol
Topology
version attack
Wormhole
wormhole attack
Intrusion Detection
Blackhole
Blackhole attack
computer network security
Conferences
countermeasures
IDS
IDS research contribution techniques
Internet of Things
attacks
intrusion detection system
IoT
knowledge driven approach
lightweight routing protocol stack
LLN
low power lossy networks
pubcrawl
biblio
Trust-Based Enhanced Secure Routing against Rank and Sybil Attacks in IoT
Submitted by grigby1 on Wed, 02/26/2020 - 4:34pm
routing protocol for low power and lossy network
trustworthy nodes
trust-based enhanced secure RPL routing attacks
trust value
Trust Routing
trust evaluation methods
sybil attacks
Sybil attack
standardized proactive routing protocol
security
Secure DODAG Construction
Sec-Trust protocol
Scalability
RPL security
Routing protocols
composability
Routing
resource constrained characteristics
rank attack
pubcrawl
providing routing security using the technique of collective trust mechanism
PROTECT
performance evaluation
IoT network
IoT
Internet of Things
forwarding data packets
energy consumption
computer network security