메뉴 건너뛰기




Volumn , Issue , 2006, Pages

Security vulnerabilities in channel assignment of multi-radio multi-channel wireless mesh networks

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CHANNEL ESTIMATION; COMPUTER SIMULATION; INFORMATION MANAGEMENT; RADIO SYSTEMS;

EID: 50949095981     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2006.300     Document Type: Conference Paper
Times cited : (34)

References (14)
  • 2
    • 25844513674 scopus 로고    scopus 로고
    • Ashish Raniwala, Tzi-cker Chiueh. Architecture and Algorithms for an IEEE 802.11-based Multi-channel Wireless Mesh Network. In proceedings of IEEE InfoCom. March 2005
    • Ashish Raniwala, Tzi-cker Chiueh. Architecture and Algorithms for an IEEE 802.11-based Multi-channel Wireless Mesh Network. In proceedings of IEEE InfoCom. March 2005
  • 3
    • 32144440287 scopus 로고    scopus 로고
    • Characterizing the capacity region in multi-radio multi-channel wireless mesh networks
    • August
    • Murali Kodialam, Thyaga Nandagopal. Characterizing the capacity region in multi-radio multi-channel wireless mesh networks. In proceedings of Mobile Computing and Networking. August 2005
    • (2005) proceedings of Mobile Computing and Networking
    • Kodialam, M.1    Nandagopal, T.2
  • 5
    • 32144457179 scopus 로고    scopus 로고
    • Pradeep Kyasanur, Nitin H. Vaidya. Capacity of Multi-Channel Wireless Networks: Impact of number of channels and Interfaces. In proceedings of Mobile Computing and Networking. August 2005.
    • Pradeep Kyasanur, Nitin H. Vaidya. Capacity of Multi-Channel Wireless Networks: Impact of number of channels and Interfaces. In proceedings of Mobile Computing and Networking. August 2005.
  • 10
    • 34547315237 scopus 로고    scopus 로고
    • V. Gupta, S. Krishnamurthy, and M. Faloutsos. Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks. In Proceedings of Milcom, 2002.
    • V. Gupta, S. Krishnamurthy, and M. Faloutsos. Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks. In Proceedings of Milcom, 2002.
  • 11
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Y. Zhang and W. Lee. Intrusion detection in wireless ad hoc networks. ACM MOBICOM, 2000.
    • (2000) ACM MOBICOM
    • Zhang, Y.1    Lee, W.2
  • 12
  • 13
    • 34547350023 scopus 로고    scopus 로고
    • Rupinder Gill, Jason Smith, Mark Looi and Andrew Clark. Passive Techniques for Detecting Session. Hijacking Attacks in IEEE 802.11 Wireless. In proceedings of Auscert2005, Jan 2005.
    • Rupinder Gill, Jason Smith, Mark Looi and Andrew Clark. Passive Techniques for Detecting Session. Hijacking Attacks in IEEE 802.11 Wireless. In proceedings of Auscert2005, Jan 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.