Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
AODV protocol
biblio
An Efficient and Reliable Routing Protocol Using Bio-Inspired Techniques for Congestion Control in WSN
Submitted by grigby1 on Wed, 12/02/2020 - 12:51pm
AODV protocol
artificial bee colony algorithm.
bioinspired techniques
congested resources
Congestion Control
congestion free path
congestion problem
congestion recognition
coupled congestion control
cuckoo search algorithm
delays
network delay
network performance
Packet loss
pubcrawl
resilience
Resiliency
Routing
Routing Protocol
Routing protocols
Scalability
telecommunication congestion control
Wireless Sensor Network
wireless sensor networks
biblio
DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification
Submitted by aekwall on Mon, 11/02/2020 - 1:41pm
security of data
data privacy
telecommunication security
security
Resiliency
pubcrawl
Routing protocols
privacy
Routing
Peer-to-peer computing
Metrics
mobile radio
mobile ad hoc networks
Ad hoc networks
mobile computing
single nodes
central control program
cognition
routing phases
routing security
Compositionality
AODV protocol
abnormal nodes
anomalies detection
anomalous nodes
black-hole attack
collaborative malicious nodes
DAPV
diagnosing anomalies
direct attacks
distributed verification
expected log information
indirect attacks
log entries
malicious intermediated routers
MANET routing mechanism
Merkle hash tree
paralyzed nodes
privacy-preserving verification
provenance tracking
routing phase
university campus networks
Wireless Network Security
manet privacy
biblio
Detecting Black hole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET
Submitted by grigby1 on Thu, 10/29/2020 - 10:23am
security
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
Routing
computer science
Routing protocols
message passing
Compositionality
AODV
Black hole attack
MANET
mobile ad hoc networks
detection
mobile ad hoc network
ad hoc network
AODV protocol
AOMDV
AOMDV protocol
AOMDV routing protocol
appropriate routes
Diffie-Hellman algorithm
Diffie-Hellman key exchange algorithm
Distance vector routing protocols
Hybrid Security Method
Normalized Routing Load
on-demand routing protocols
SHA-3 algorithm
single route discovery
useful internet protocol
wireless ad hoc networks
MANET Attack Detection
biblio
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
ad hoc on-demand distance vector routing
AODV based adhoc networks
AODV protocol
automata
Compositionality
delays
disaster recovery
Internet of Things
IoT
Loss measurement
MANET
MANET AODV protocol
MANET routing protocol
MANET security
Metrics
mobile ad hoc networks
mobile adhoc networks
network security
NS3 simulator
pubcrawl
Resiliency
Routing
Routing Protocol
Routing protocols
security
security vulnerabilities
telecommunication security
uav
unmanned aerial unit
biblio
Simulation Based Study of Blackhole Attack Under AODV Protocol
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
Scalability
telecommunication security
Resiliency
pubcrawl
Routing protocols
Routing
Handheld computers
delays
MANET
mobile ad hoc networks
Throughput
Ad hoc networks
mobile computing
NS-2
Blackhole attack
AODV protocol
AODV
Blackhole
MANET nodes
Mobile adhoc Network
open access
target node
unauthorized node
biblio
A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network
Submitted by aekwall on Tue, 05/26/2020 - 9:57am
IoT
Scalability
Internet-of-Things
telecommunication security
security
feature extraction
Resiliency
pubcrawl
Routing protocols
Routing
ns-3
network security
MANET
mobile ad hoc networks
Throughput
mobile ad hoc network
Loss measurement
external attacks
AODV protocol
AODV
Blackhole attack
blackhole attack feature extraction
blackhole nodes
end-to-end delay
intermediate nodes
internal attacks
MANET security measurement
mobile multihop network
mobile nodes
network performance parameters
ns-3 network simulator
Packet loss rate
biblio
Simulation of MANET's Single and Multiple Blackhole Attack with NS-3
Submitted by aekwall on Tue, 05/26/2020 - 9:57am
Scalability
telecommunication security
network security
Resiliency
pubcrawl
Routing protocols
Routing
mobile radio
delays
network nodes
Relays
wireless LAN
MANET
mobile ad hoc networks
telecommunication network topology
Ad hoc networks
mobile computing
fixed infrastructure
Blackhole attack
ad hoc nature
AODV protocol
battery power
central authority
dynamic topologies
IEEE 802.11ac protocol
industrial fields
memory space
Mobile ad hoc networks (MANETs)
mobile ad-hoc networks
mobility model
multiple Blackhole attack
NS-3 simulator
NS-3.27 simulator
OLSRprotocol
physical protection
single Blackhole attack
biblio
Mitigating techniques of black hole attack in MANET: A review
Submitted by grigby1 on Wed, 06/20/2018 - 11:41am
Ad-hoc On-demand Distance Vector
AODV protocol
AODV routing protocol
attack mitigation
Black hole attack
black hole node
Compositionality
detection and prevention
dynamic topology
infrastructure-less network
MANET
Market research
Metrics
mobile ad hoc networks
mobile ad-hoc network
pubcrawl
resilience
Resiliency
Routing
Routing Protocol
Routing protocols
telecommunication network topology
telecommunication security
Wireless communication
wireless connections
biblio
Improving Trusted Routing by Identifying Malicious Nodes in a MANET Using Reinforcement Learning
Submitted by grigby1 on Wed, 04/11/2018 - 2:02pm
ad-hoc on-demand distance vector protocol
AODV
AODV protocol
composability
dynamic MANET environment
dynamic wireless connections
healthcare systems
learning (artificial intelligence)
malicious behaviour
malicious nodes
MANET
military operations
mobile ad hoc networks
mobile ad-hoc networks
mobile conferences
Peer-to-peer computing
Protocols
pubcrawl
Reinforcement learning
reinforcement learning agent
reliable trust improvement
resilience
Resiliency
Routing
Scalability
security
self-organizing communication systems
telecommunication security
trust
Trust Routing
trusted routing
vehicular networks
biblio
A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:58am
ad hoc on demand distance vector protocol
AODV
AODV protocol
Base stations
ECC
Elliptic curve cryptography
false report detection
Gray hole attack
individual sensor nodes
Protocols
public key cryptography
Routing
Routing protocols
Secure Routing
secure routing method
security
Statistical En-Route
statistical en-route filtering
Wireless Sensor Network
wireless sensor networks
1
2
next ›
last »