메뉴 건너뛰기




Volumn 10, Issue 5, 2010, Pages 622-646

Securing multi-operator-based QoS-aware mesh networks: Requirements and design options

Author keywords

Authentication; Intrusion detection and recovery; Key management; Secure communications; Secure routing; Wireless mesh networks

Indexed keywords

BROADBAND ACCESS; CLIENT AUTHENTICATION; DESIGN OPTION; KEY MANAGEMENT; MESH NETWORK; MISBEHAVIOR DETECTION; MULTIPLE OPERATOR; NETWORK OPERATOR; PROBLEM DOMAIN; SECURE COMMUNICATIONS; SECURE ROUTING; SECURITY ARCHITECTURE; SECURITY REQUIREMENTS; SERVICE PROVIDER; USABLE SECURITY; WIRELESS COMMUNICATIONS; WIRELESS MESH NETWORKING;

EID: 77951151719     PISSN: 15308669     EISSN: 15308677     Source Type: Journal    
DOI: 10.1002/wcm.728     Document Type: Article
Times cited : (7)

References (68)
  • 9
    • 34547545598 scopus 로고    scopus 로고
    • A secure authentication and billing architecture for wireless mesh networks
    • doi:http://dx.doi.org/10.1007/s11276-006-8148-
    • Zhang Y, Fang Y. A secure authentication and billing architecture for wireless mesh networks. Wireless Networks 2007; 13(5): 663-678.doi:http://dx. doi.org/10.1007/s11276-006-8148-z
    • (2007) Wireless Networks , vol.13 , Issue.5 , pp. 663-678
    • Zhang, Y.1    Fang, Y.2
  • 10
    • 77950341885 scopus 로고    scopus 로고
    • A seamless handoff mechanism for IEEE 802.11 WLANs supporting IEEE 802.11i security enhancements.
    • Hsinchu, Taiwan
    • Chen JJ, Tseng YC, Lee HW. A seamless handoff mechanism for IEEE 802.11 WLANs supporting IEEE 802.11i security enhancements. In IEEE Asia-Pacific Wireless Communications Symposium, Hsinchu, Taiwan, 2007.
    • (2007) IEEE Asia-Pacific Wireless Communications Symposium
    • Chen, J.J.1    Tseng, Y.C.2    Lee, H.W.3
  • 16
    • 1842665111 scopus 로고    scopus 로고
    • Proactive key distribution using neighbor graphs
    • [see also IEEE Personal Communications] doi:10.1109/MWC.2004.126971
    • Mishra A, Shin MH, Petroni JNL, Clancy T, Arbaugh W. Proactive key distribution using neighbor graphs. Wireless Communications, IEEE [see also IEEE Personal Communications] 2004; 11(1): 26-36.doi:10.1109/MWC.2004.1269714
    • (2004) Wireless Communications, IEEE , vol.11 , Issue.1 , pp. 26-36
    • Mishra, A.1    Shin, M.H.2    Petroni, J.N.L.3    Clancy, T.4    Arbaugh, W.5
  • 20
    • 84863901332 scopus 로고    scopus 로고
    • IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks- specific requirements
    • TM-2008 Amendment 2: Fast BSS Transition, July
    • TM-2008. IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks- specific requirements. Part 11: wireless lan medium access control (MAC) and physical layer (PHY) specifications. Amendment 2: Fast BSS Transition, July 2008.
    • (2008) Part 11: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications
  • 22
    • 7244227670 scopus 로고    scopus 로고
    • Fast handoff scheme based on mobility prediction in public wireless LAN systems
    • IEEE
    • Pack S, Choi Y. Fast handoff scheme based on mobility prediction in public wireless LAN systems. In IEE Proceedings Communications, Vol.151, IEEE, 2004; 489-495.
    • (2004) IEE Proceedings Communications , vol.151 , pp. 489-495
    • Pack, S.1    Choi, Y.2
  • 35
    • 0003508558 scopus 로고    scopus 로고
    • FIPS 197. US Department of Commerce, Bureau of Standards, National Technical Information Service (NIST)
    • FIPS 197. Advanced encryption standard. Federal Information Processing Standards Publication 197, US Department of Commerce, Bureau of Standards, National Technical Information Service (NIST) 2001.
    • (2001) Advanced Encryption Standard. Federal Information Processing Standards Publication , vol.197
  • 40
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad hoc mobile wireless networks
    • Royer EM, Toh C. A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications 1999; 6(2): 46-55.
    • (1999) IEEE Personal Communications , vol.6 , Issue.2 , pp. 46-55
    • Royer, E.M.1    Toh, C.2
  • 53
    • 0036793924 scopus 로고    scopus 로고
    • Denial ofservice in sensornetworks
    • Wood A, Stankovic J. Denial ofservice in sensornetworks. IEEE Computer 2002; 35: 53-57.
    • (2002) IEEE Computer , vol.35 , pp. 53-57
    • Wood, A.1    Stankovic, J.2
  • 54
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks.
    • Xu W, Trappe W, Zhang Y, Wood T. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of ACM MobiHoc, 2005.
    • (2005) Proceedings of ACM MobiHoc
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 55
    • 51949113065 scopus 로고    scopus 로고
    • Intelligent jamming in wireless networks with applications to 802.11b and other networks
    • Thuente D, Acharya M. Intelligent jamming in wireless networks with applications to 802.11b and other networks. In Proceedings ofIEEE MILCOM, 2006.
    • (2006) Proceedings OfIEEE MILCOM
    • Thuente, D.1    Acharya, M.2
  • 58
  • 59
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Zhang Y, Lee W, Huang YA. Intrusion detection techniques for mobile wireless networks. Wireless Networks 2003; 9(5): 545556.
    • (2003) Wireless Networks , vol.9 , Issue.5 , pp. 545556
    • Zhang, Y.1    Lee, W.2    Huang, Y.A.3
  • 64
    • 35148872165 scopus 로고    scopus 로고
    • A cross-layer approach to detect jamming attacks in wireless ad hoc networks.
    • Ans S Mishra GT, Sridhar R. A cross-layer approach to detect jamming attacks in wireless ad hoc networks. In Proceedings of IEEE MILCOM, 2006.
    • (2006) Proceedings of IEEE MILCOM
    • Ans, S.1    Mishra, G.T.2    Sridhar, R.3
  • 66
    • 33745062882 scopus 로고    scopus 로고
    • Jamming sensor networks: Attack and defense strategies
    • Xu W, Ma K, Trappe W, Zhang Y. Jamming sensor networks: attack and defense strategies. IEEE Network 2006; 20: 41-47.
    • (2006) IEEE Network , vol.20 , pp. 41-47
    • Xu, W.1    Ma, K.2    Trappe, W.3    Zhang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.