Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoV
biblio
Overview Of Vanet Network Security
Submitted by grigby1 on Fri, 08/25/2023 - 10:34am
VANET
vehicular
V2I.
Human Factors
black hole
quality assurance
mathematical models
V2V
IoV
information science
Trajectory
vehicular ad hoc networks
Compositionality
information security
network security
composability
Information Assurance
Scalability
Resiliency
resilience
collaboration
policy-based governance
Metrics
Human behavior
pubcrawl
biblio
The Impact of Sybil Attacks on Vehicular Fog Networks
Submitted by grigby1 on Wed, 03/23/2022 - 11:34am
Metrics
Vehicular fog computing
IoV
sybil attacks
Sybil attack
Fog computing
Mathematics
vehicular ad hoc networks
Time factors
Internet of Things
composability
privacy
Safety
Resiliency
resilience
pubcrawl
security
biblio
Asynchronous Coded Caching Strategy With Nonuniform Demands for IoV Networks
Submitted by grigby1 on Mon, 03/14/2022 - 12:21pm
Policy Based Governance
content placement
coded- multicasting
backhaul load
asynchronous coded caching
road side unit
IoV
simulation
Metrics
Internet of Things
Safe Coding
optimization
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Servers
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
security
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
resilience
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
control systems
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
Access Control
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
biblio
An Efficient Secured Routing Protocol for Software Defined Internet of Vehicles
Submitted by aekwall on Mon, 10/19/2020 - 11:48am
central point coordination
Human Factors
vehicular ad hoc network
Intelligent Transportation Systems
Internet of Vehicles
IoV
cyber physical systems
Routing Protocol
dynamic topology
Software Defined Networks
Energy efficient secured routing protocol
intelligence secure routing
intelligent transport system
network intelligence
RBM
restricted Boltzmann algorithm
software defined Internet of Vehicles
vehicle dynamics
Routing
Internet of Things
security
Software
software defined networking
Resiliency
Human behavior
pubcrawl
Routing protocols
computer network security
telecommunication power management
vehicular ad hoc networks
Metrics
internet
attacks
network lifetime
delays
telecommunication network topology
biblio
Blockchain-Based Internet of Vehicles (IoV): An Efficient Secure Ad Hoc Vehicular Networking Architecture
Submitted by aekwall on Mon, 10/19/2020 - 11:47am
connected vehicles
secured communication
secure ad hoc vehicular networking architecture
distribution cloud
distributed access control system
connected vehicle communication network
blockchain-based Internet of Vehicles
information sharing
network resources
Smart City
cyber physical systems
IoV
Internet of Vehicles
distributed control
telecommunication network reliability
security
Human Factors
blockchain technology
Intelligent sensors
Reliability
blockchain
Metrics
vehicular ad hoc networks
privacy
pubcrawl
Human behavior
Resiliency
telecommunication security
Internet of Things
telecommunication traffic
biblio
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
minimum human interventions
vehicle sensors
Physical Unclonable Function
two-factor authentication
AKA protocol
elaborate security analysis
ever-increasing penetration
factor authentication protocol
Internet of Vehicles
IoV
key agreement protocol
Physical attack
mutual authentication
onboard sensors
physically secure authentication
route planning
secret information
transportation sector
user device
vehicle management
two factor authentication
authentication
authorisation
data privacy
Internet of Things
telecommunication security
Cryptographic Protocols
Protocols
pubcrawl
vehicular ad hoc networks
privacy
Servers
message authentication
password
public key cryptography
physical attacks
sensors
information protection
Human Factors
Security Properties
PUF