Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing protocols
biblio
Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
routing overhead
mobile ad-hoc network
network throughput
node mobility
packet delivery ratio
passive attacks
pubcrawl
public key cryptography
Resiliency
Routing
mobile ad hoc networks
Routing protocols
RSA
RSA encryption technique
signal detection
telecommunication network routing
telecommunication network topology
telecommunication security
wireless mobile nodes
eavesdropping attacks
black hole
CBDS
composability
cooperative bait detection scheme
cooperative blackhole
cooperative communication
data packet
dynamic topological changes
eavesdropping
active attacks
encryption
end to end delay
false routing information
malicious nodes
MANET
MANET Attack Detection
MANETs
Metrics
biblio
Intrusion Detection System for MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
mobile ad-hoc network
trust relationship
Throughput
telecommunication security
telecommunication network routing
single malicious node
Routing protocols
routing attacks
Routing
Resiliency
pubcrawl
packet delivery ratio
notice participation
black hole
mobile ad hoc networks
Metrics
MANET Attack Detection
MANET
malicious nodes
intrusion detection system
Intrusion Detection
IDS
gray hole
defense mechanism
data packets
composability
biblio
Trust-aware routing protocol for mobile crowdsensing environments
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
sensor lifetime
MCS
Measurement
mobile crowdsensing environments
multi-metric decision
network lifetime
optimal routing decision
packet delivery ratio
residual energy
link quality node selection
Signal to noise ratio
sink node
social behaviour
suboptimal data forwarding
Trust management
trust-aware routing protocol
Trust Routing
Scalability
link quality
Fuzzy logic
friendship mechanism
FR solution
Energy Efficiency
telecommunication power management
Routing
energy conservation
wireless sensor networks
Routing protocols
composability
pubcrawl
Resiliency
mobile computing
Conferences
biblio
Trust based mechanism for Securing IoT Routing Protocol RPL against Wormhole amp;Grayhole Attacks
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
Grayhole
Trust Routing
wormhole attacks
Wormhole
RPL protocol
open standard routing protocol
network traffic
network topology
loT
light weight Trust based mechanism
IoT routing protocol RPL
Indirect Trust
Grayhole attacks
RPL
direct trust
telecommunication traffic
trust
Routing
Routing protocols
composability
pubcrawl
Resiliency
security
Internet of Things
Scalability
computer network security
biblio
Security approaches for data aggregation in Wireless Sensor Networks against Sybil Attack
Submitted by aekwall on Mon, 02/18/2019 - 12:57pm
data aggregation
Metrics
sybil attacks
wireless sensor networks
Wireless Sensor Network
Routing protocols
misbehavior detection parameters
magnetic sensors
fair resourse allocation
detection techniques
telecommunication security
biosensors
batteries
Attacker node
Sybil attack
composability
pubcrawl
Program processors
security
biblio
Game Theoretical Approach with Audit Based Misbehavior Detection System
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
mobile ad-hoc networks
dynamically shifting nodes
end-to-end encrypted traffic
GAMD
game theoretical approach
incentive based reputation scheme
incentive schemes
MANET environment
misbehaving nodes
misbehavior nodes
continuous packet droppers
multichannel networks
multihop ad hoc networks
node behavior
per-packet basis
selective dropping attacks
selective packet droppers
Selfish node
supervisory game
theoretical cryptography
Routing protocols
Monitoring
pubcrawl
composability
Conferences
game theory
Ad hoc networks
telecommunication security
Peer-to-peer computing
Routing
Games
Cryptography
Compositionality
MANET
mobile ad hoc networks
mobile nodes
AMD
Audit based Misbehavior Detection system
Audit-based Misbehavior Detection
biblio
Detection of malicious node in mobile ad-hoc network
Submitted by grigby1 on Mon, 01/21/2019 - 12:32pm
mobile ad hoc networks
wireless links
Wireless communication
telecommunication network routing
selective acknowledgment
security
Routing protocols
routing overhead
Routing
Resiliency
pubcrawl
NS2 simulation
network security
network packet delivery ratio
mobile nodes
Ad Hoc Network Security
mobile ad hoc network
Metrics
MANET
malicious node detection
malicious node
intrusion detection mechanisms
firewalls software
firewalls
encryption software
Cryptography
Compositionality
Communication system security
AODV
adaptive acknowledgment
biblio
Securing data forwarding against blackhole attacks in mobile ad hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:31pm
Metrics
telecommunication security
secure message transmission
Scalability
Routing protocols
Resiliency
Receivers
pubcrawl
packet delivery ratio
network throughput
multi-path routing
mobile nodes
mobile ad hoc networks
mobile ad hoc network security
mobile ad hoc network
Ad Hoc Network Security
MANET
homomorphic encryption scheme
encryption
data transmission security
data forwarding security
data communication
Cryptographic Protocols
Compositionality
blackhole nodes
blackhole attacks
Blackhole attack
AOMDV protocol
ad hoc on-demand multipath distance vector protocol
biblio
Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
RPL DODAG
rank property
Resiliency
resource constrained Low Power and Lossy Networks
resource consumption
Routing
routing path optimization
Routing protocols
routing requirements
routing security
RPL attacks
rank based data path validation
RPL-6LOWPAN
security
security attacks
security breaches
sensor nodes
telecommunication network topology
topological isolation
topological sub-optimization
traffic disruption
vulnerability assessment
IP networks
attack graph
communication protocol
composability
computer network security
destination oriented directed acyclic graphs
directed graphs
expected transmission count
holistic security assessment
Internet of Things
IoT networks
6LoWPAN
IPv6 Routing Protocol
LLNs
loop free topology
low-power wireless personal area network
network topology
objective function
packet delivery rate
personal area networks
pubcrawl
biblio
Improving existing 6LoWPAN RPL for content based routing
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
Reliability
low-power wireless personal area network
operating systems
operating systems (computers)
packet delivery ratio
personal area networks
power consumption
Power demand
pubcrawl
Linear programming
Resiliency
Routing
routing protocol for low power and lossy network
Routing protocols
sensor networks
telecommunication traffic
Traffic congestion
cooja
6LoWPAN RPL
CBR technique
composability
computer network reliability
Conferences
content based routing
content based routing technique
contiki operating system
6LoWPAN
cooja simulator.
data aggregation
data aggregation ratio
energy consumption
Energy Efficiency
home automation
Internet of Things
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »