Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
personal area networks
biblio
Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT
Submitted by
grigby1
on Wed, 01/16/2019 - 1:25pm
6LoWPAN
attack graph
communication protocol
composability
computer network security
destination oriented directed acyclic graphs
directed graphs
expected transmission count
holistic security assessment
Internet of Things
IoT networks
IP networks
IPv6 Routing Protocol
LLNs
loop free topology
low-power wireless personal area network
network topology
objective function
packet delivery rate
personal area networks
pubcrawl
rank based data path validation
rank property
Resiliency
resource constrained Low Power and Lossy Networks
resource consumption
Routing
routing path optimization
Routing protocols
routing requirements
routing security
RPL attacks
RPL DODAG
RPL-6LOWPAN
security
security attacks
security breaches
sensor nodes
telecommunication network topology
topological isolation
topological sub-optimization
traffic disruption
vulnerability assessment
biblio
Resolving Threats in IoT: ID Spoofing to DDoS
Submitted by
grigby1
on Wed, 01/16/2019 - 1:25pm
6LoWPAN
administrative machines
botnet
composability
Computer crime
computer network security
DDoS
DDoS stress
ID Spoofing
ID spoofing vulnerabilities
ID validation time
Internet of Things
Internet-of-Things
invasive software
IoT
IP networks
IP-enabled devices
malicious machines spoof ID
malware
Peer-to-peer computing
personal area network model
personal area networks
PRIG-adapted 6LoWPAN
Protocols
PseudoRandom Identity Generator
pubcrawl
Resiliency
resource-constrained network
security of data
unique identity
Zigbee
biblio
A software-defined networking framework for IoT based on 6LoWPAN
Submitted by
grigby1
on Wed, 01/16/2019 - 1:25pm
6LoWPAN
6LoWPAN networks
composability
Internet of Things
IoT
low power wireless network
management complexity
networking framework
personal area networks
power consumption
Power demand
Protocols
pubcrawl
Random access memory
Resiliency
SD-WSN6Lo
software defined networking
software-defined networking
software-defined wireless management
Task Analysis
telecommunication power management
Wireless communication
Wireless Sensor Network
wireless sensor networks
biblio
Improving existing 6LoWPAN RPL for content based routing
Submitted by
grigby1
on Wed, 01/16/2019 - 1:25pm
6LoWPAN
6LoWPAN RPL
CBR technique
composability
computer network reliability
Conferences
content based routing
content based routing technique
contiki operating system
cooja
cooja simulator.
data aggregation
data aggregation ratio
energy consumption
Energy Efficiency
home automation
Internet of Things
Linear programming
low-power wireless personal area network
operating systems
operating systems (computers)
packet delivery ratio
personal area networks
power consumption
Power demand
pubcrawl
Reliability
Resiliency
Routing
routing protocol for low power and lossy network
Routing protocols
sensor networks
telecommunication traffic
Traffic congestion
biblio
Implementing a real-time capable WPLS testbed for independent performance and security analyses
Submitted by
grigby1
on Thu, 06/07/2018 - 1:56pm
security
pubcrawl
Internet of Things
composability
security analyses
Entropy
physical layer security
Wireless communication
eavesdropper
telecommunication security
Correlation
real-time systems
wireless sensor networks
resilience
Metrics
Resiliency
key management
8-bit MCU 8051
Atmospheric measurements
generically multiple transceivers
IEEE 802.15.4 communication standard
independent performance
key extraction
legitimate parties
microcontrollers
off-the-shelf hardware
Particle measurements
personal area networks
real-time capable WPLS testbed
secret key rate estimation
security evaluations
Wireless Physical Layer Security
WPLS research results
biblio
A Secure PMIPv6-Based Group Mobility Scheme for 6L0WPAN Networks
Submitted by
grigby1
on Mon, 03/19/2018 - 12:46pm
6L0WPAN
6L0WPAN networks
6LoWPAN
6LoWPAN group handover scheme
authentication
composability
Cryptography
Cyber Physical Systems Security
Handover
internet
Internet of Things
Internet Protocol version 6
IoT
IP-based sensing devices
low power wireless personal area networks
mobility management (mobile radio)
personal area networks
PMIPv6
Protocols
proxy mobile IPv6
pubcrawl
resilience
Resiliency
secure PMIPv6-based group mobility scheme
Servers
symmetric encryption method
transport protocols
biblio
Efficient Probing of Heterogeneous IoT Networks
Submitted by
grigby1
on Mon, 03/19/2018 - 12:46pm
6LoWPAN
active network measurements
Bandwidth
complex security protocols
composability
computer network security
Cyber Physical Systems Security
Fingerprinting
hardware heterogeneity
heterogeneous IoT networks
IEEE 802.11 Standard
IEEE 802.15 Standard
interconnectivity
internet
Internet of Things
intrusion protection system
IoT
IoT devices
network scan
Network scans
network security
network technology
personal area networks
Probes
Protocols
pubcrawl
resilience
Resiliency
security
Servers
software heterogeneity
biblio
Review on Mechanisms for Detecting Sinkhole Attacks on RPLs
Submitted by
grigby1
on Mon, 03/19/2018 - 12:46pm
6LoWPAN
composability
computer network security
Cyber Physical Systems Security
existing detection mechanisms
existing security challenges
internet
Internet of Things
Internet Protocol version 6
IP networks
IPv6 packet
limited resources
lossy network
low power wireless personal area networks
maintenance engineering
network damage
network layer
network topology
Peer-to-peer computing
personal area networks
pubcrawl
resilience
Resiliency
Routing attack
Routing Protocol
Routing protocols
RPL
RPL components
security
Sinkhole attack
telecommunication security
Topology
wireless sensor networks
WSN
biblio
Experimental Study of IP Spoofing Attack in 6LoWPAN Network
Submitted by
grigby1
on Mon, 03/19/2018 - 12:45pm
6LoWPAN
6LoWPAN control messages
6LoWPAN network
6LoWPAN-ND
access protocols
composability
computer network security
Cooja Simulator
Cyber Physical Systems Security
encryption
energy consumption
Internet of Things
IP networks
IP spoofing attack
IPv6 protocol
IPv6 Spoofing
lossy personal area networks
low power personal area networks
Media Access Protocol
memory consumption
personal area networks
pubcrawl
Registers
resilience
Resiliency
Routing protocols
RPL
telecommunication power management
wrong IPv6-MAC binding
biblio
The Effect of Buffer Management Strategies on 6LoWPAN's Response to Buffer Reservation Attacks
Submitted by
grigby1
on Mon, 03/19/2018 - 12:45pm
6L0WPAN
6L0WPAN adaptation layer
6LoWPAN
Adaptation models
buffer circuits
buffer cleanups
buffer management strategies
Buffer Reservation
Buffer storage
composability
Computer crime
computer network security
Current measurement
Cyber Physical Systems Security
defence strategies
Fragmentation Attacks
fragmentation-based buffer reservation denial of service attacks
fragmentation-based buffer reservation DoS attacks
Internet of Things
IoT security
packet drop rate
packets tags
PDR
personal area networks
Protocols
pubcrawl
resilience
Resiliency
Scoring Systems
slotted buffer
Split Buffer
split buffer mechanism
TCP-IP model
vehicular networking applications
1
2
next ›
last »