Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Routing protocols
biblio
Secure and attack aware routing in mobile ad hoc networks against wormhole and sinkhole attacks
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
Resiliency
wormhole attacks
wormhole attack
telecommunication security
sinkhole node
sinkhole attacks
Sinkhole attack
security attacks
security
secure attack aware routing
Routing protocols
Routing
AODV
resilience
pubcrawl
mobile nodes
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
Compositionality
attack prevention
Attack Aware Alert
biblio
Prevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
mobile ad hoc networks
WSN
wireless sensor networks
virtual node
telecommunication security
selective flooding technique
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Optimized Link State Routing protocol
OLSR protocol
OLSR
network layer attacks
attack prevention
Metrics
MANET routing protocol
MANET
formal routing
Fictitious Node Mechanism
Elliptic curve cryptography
ECC algorithm
DoS attacks
DoS
denial of service attack
Denial Contradictions
DCFM
Compositionality
biblio
Prevention of denial of service attack over vehicle ad hoc networks using quick response table
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
Throughput
Resiliency
Routing
Routing protocols
secure communication
Secure Routing
security
security mechanisms
security threat
Sybil attack
threats
resilience
tunnels
V2I
V2V
VANET
vehicle ad hoc networks
vehicular ad hoc networks
wireless
wireless adhoc network
Wireless communication
gray hole
attack prevention
black hole
Bridges
common attacks
Compositionality
computer network security
delays
denial of service attack
DoS
dynamic topology
Analytical models
high mobility environment
infrastructure based network
MANET
Metrics
Mobile adhoc Network
network performance
packet drop
pubcrawl
quick response table
biblio
New approach through detection and prevention of wormhole attack in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:38pm
mobile computing
wormhole attack
wireless mobile nodes
Victimization
unique wormhole detection and prevention algorithm
tunneling
temporary network topologies
telecommunication security
telecommunication network topology
telecommunication network routing
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Aerospace electronics
Mobile communication
Mobile adhoc Network
mobile ad hoc networks
mobile ad hoc network
Metrics
MANET
malicious node
Local Area Network consists
full routing method.
electromagnetic radio waves
contagious nodes
Compositionality
attack prevention
arbitrary network topologies
biblio
Novel IDS security against attacker routing misbehavior of packet dropping in MANET
Submitted by grigby1 on Wed, 06/20/2018 - 12:32pm
Nodes
telecommunication security
telecommunication network routing
security
Secure Routing
routing. Security
Routing protocols
Routing
Resiliency
resilience
Receivers
pubcrawl
Packet dropping
Attack detection
mobile ad hoc networks
mobile ad hoc network
Metrics
Measurement
MANET
Malicious Attacker
intermediate nodes
IDS security system
IDS
Compositionality
attacker routing misbehavior
biblio
Cluster-based technique for detection and prevention of black-hole attack in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
pubcrawl
MANET
Metrics
mobile ad hoc network
mobile ad hoc networks
mobile computing
NS2 simulator
packet delivery ratio
particular node
pattern clustering
PDR
malicious nodes
rapid node mobility
resilience
Resiliency
Routing
Routing protocols
Secure Routing
security
telecommunication security
Throughput
trustworthy security protocol
clustering direction
ad hoc routing
AODV
AODV routing protocol
Attack detection
black-hole attack
black-hole attack detection
black-hole attack prevention
cluster head
Cluster-head
clustering
Ad hoc networks
Compositionality
contagious nodes
Cryptographic Protocols
data packets
data transfer
end to end delay throughput
energy simulation inferences
ETD throughput
fresh route
biblio
Gray hole attack detection in MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
pubcrawl
MD6 security algorithm
Message Digest 5
Metrics
mobile ad hoc networks
mobile ad-hoc network
Mobile communication
mobile computing
networking system
MD5 algorithm
resilience
Resiliency
routing overhead
Routing protocols
self-stabilizing election algorithm
telecommunication network routing
telecommunication security
voting
dynamic cluster head selection
Ad-hoc on demand distance vector protocol
AES security algorithm
Attack detection
batteries
battery power
Clustering algorithms
Compositionality
data transmission rate
Ad hoc networks
dynamic nodes
Election Algorithm
gray hole attack detection
gray hole nodes
identical broadcast range
intrusion detection system
intrusion revealing system
MANET
biblio
Re-joining of authorized nodes in MANETs using EGSR scheme and detection of internal attacks using 2ACK scheme
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
resilience
Organizations
packet drop
Peer-to-peer computing
Protocols
pubcrawl
Quality metrics
Re-Routing
rejoining processing
Reliable Path
mobile computing
Resiliency
root nodes
Routing
Routing Protocol
Routing protocols
telecommunication channels
telecommunication network management
telecommunication security
wireless infrastructureless network
GroupKeyManagement
ad hoc environment
Ad hoc networks
Attack detection
authorized nodes
Compositionality
delays
dropped packets
EGSR schemes
group capacity
2ACK scheme
Hybrid based PSO
information transmission
internal attacks
MANET
MANETs
Metrics
mobile ad hoc network
mobile ad hoc networks
biblio
Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme
Submitted by grigby1 on Wed, 06/20/2018 - 12:31pm
mobile ad hoc environment
telecommunication security
security methods
security
Secure Routing
Routing protocols
Resiliency
resilience
pubcrawl
outlier detection
network simulator tool
mobile ad hoc networks
ad hoc-on-demand distance vector reactive routing protocol
Metrics
MANET
efficient outlier detection scheme based security algorithm
Conferences
Compositionality
Black hole attack
Attack detection
AODV routing protocol
AODV
Anomaly Detection
Algorithm design and analysis
biblio
Impact of unreliable positioning in location-based routing protocols for MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
mobile computing
unreliable positioning
tools
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
quality of service
pubcrawl
privacy
positioning error
node scalability
network overhead
network lifetime
Ad hoc networks
mobile ad hoc networks
Metrics
MANET
location-based routing protocols
Energy Efficiency
effective routing
DYMOselfwd
DYMO
Data Security
data privacy
Compositionality
AODV-Line
AODV
« first
‹ previous
…
16
17
18
19
20
21
22
23
24
…
next ›
last »