-
3
-
-
49949112053
-
Security issues in wireless mesh networks.
-
Hossain E, Leung KK (eds). Springer: New York, NY
-
Zhang W, Wang Z, Das SK, Hassan M. Security issues in wireless mesh networks. In Wireless Mesh Networks: Architectures and Protocols, Hossain E, Leung KK (eds). Springer: New York, NY, 2008.
-
(2008)
Wireless Mesh Networks: Architectures and Protocols
-
-
Zhang, W.1
Wang, Z.2
Das, S.K.3
Hassan, M.4
-
5
-
-
77951160532
-
Security in wireless mesh networks
-
Zhang Y, Luo J, Hu H (eds). Auerbach Publications, Taylor & Francis Group: Boca Raton, FL
-
Falk R, Huang CT, Kohlmayer F, Sui AF. Security in wireless mesh networks. In Wireless Mesh Networking: Architectures, Protocols and Standards, Zhang Y, Luo J, Hu H (eds). Auerbach Publications, Taylor & Francis Group: Boca Raton, FL, 2006.
-
(2006)
Wireless Mesh Networking: Architectures, Protocols and Standards
-
-
Falk, R.1
Huang, C.T.2
Kohlmayer, F.3
Sui, A.F.4
-
7
-
-
33748606726
-
Protocol for carrying authentication for network access (PANA)
-
May
-
Forsberg D, Ohba Y, Patil B, Tschofenig H, Yegin A. Protocol for carrying authentication for network access (PANA). RFC 5191 (Proposed Standard), May 2008.http://www.ietf.org/rfc/rfc5191.txt
-
(2008)
RFC 5191 (Proposed Standard)
-
-
Forsberg, D.1
Ohba, Y.2
Patil, B.3
Tschofenig, H.4
Yegin, A.5
-
9
-
-
34547545598
-
A secure authentication and billing architecture for wireless mesh networks
-
doi:http://dx.doi.org/10.1007/s11276-006-8148-
-
Zhang Y, Fang Y. A secure authentication and billing architecture for wireless mesh networks. Wireless Networks 2007; 13(5): 663-678.doi:http://dx. doi.org/10.1007/s11276-006-8148-z
-
(2007)
Wireless Networks
, vol.13
, Issue.5
, pp. 663-678
-
-
Zhang, Y.1
Fang, Y.2
-
10
-
-
77950341885
-
A seamless handoff mechanism for IEEE 802.11 WLANs supporting IEEE 802.11i security enhancements.
-
Hsinchu, Taiwan
-
Chen JJ, Tseng YC, Lee HW. A seamless handoff mechanism for IEEE 802.11 WLANs supporting IEEE 802.11i security enhancements. In IEEE Asia-Pacific Wireless Communications Symposium, Hsinchu, Taiwan, 2007.
-
(2007)
IEEE Asia-Pacific Wireless Communications Symposium
-
-
Chen, J.J.1
Tseng, Y.C.2
Lee, H.W.3
-
11
-
-
74349088467
-
Denial of service protection for optimized and qos-aware handover based on localized cookies
-
Barcelona, Spain
-
Chen T, Schafer G, Fan C, Adams S, Sortais M, Wolisz A. Denial of service protection for optimized and qos-aware handover based on localized cookies. In ProceedingsofEuropeanWireless 2004, Barcelona, Spain, 2004.
-
(2004)
ProceedingsofEuropeanWireless 2004
-
-
Chen, T.1
Schafer, G.2
Fan, C.3
Adams, S.4
Sortais, M.5
Wolisz, A.6
-
12
-
-
33845519453
-
Reducing reauthentication delay in wireless networks
-
IEEE Computer Society, Athens, Greece doi: http://dx.doi.org/10.1109/ SECURECOMM.2005.58
-
Aura T, Roe M. Reducing reauthentication delay in wireless networks. In SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), IEEE Computer Society, Athens, Greece, 2005; 139-148.doi: http://dx.doi.org/10.1109/ SECURECOMM.2005.58
-
(2005)
SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
, pp. 139-148
-
-
Aura, T.1
Roe, M.2
-
15
-
-
34247376050
-
Improved EAP keying framework for a secure mobility access service
-
DOI 10.1145/1143549.1143587, IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference
-
Lopez RM, Skarmeta AG, Bournelle J, Laurent-Maknavicus M, Combes JM. Improved EAP keying framework for a secure mobility access service. In IWCMC '06: Proceedings ofthe 2006 international conference on Wireless communications and mobile computing, ACM, New York, NY, USA, 2006; 183-188.doi:http://doi.acm. org/10.1145/1143549.1143587 (Pubitemid 46645194)
-
(2006)
IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference
, vol.2006
, pp. 183-188
-
-
Lopez, R.M.1
Skarmeta, A.G.2
Bournelle, J.3
Laurent-Maknavicus, M.4
Combes, J.M.5
-
16
-
-
1842665111
-
Proactive key distribution using neighbor graphs
-
[see also IEEE Personal Communications] doi:10.1109/MWC.2004.126971
-
Mishra A, Shin MH, Petroni JNL, Clancy T, Arbaugh W. Proactive key distribution using neighbor graphs. Wireless Communications, IEEE [see also IEEE Personal Communications] 2004; 11(1): 26-36.doi:10.1109/MWC.2004.1269714
-
(2004)
Wireless Communications, IEEE
, vol.11
, Issue.1
, pp. 26-36
-
-
Mishra, A.1
Shin, M.H.2
Petroni, J.N.L.3
Clancy, T.4
Arbaugh, W.5
-
17
-
-
32144451516
-
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
-
DOI 10.1145/1089737.1089746, WMuNeP'05 - Proceedings of the First ACM International Workshop on Wireless Multimedia Networking and Performance Modeling
-
Kassab M, Belghith A, Bonnin JM, Sassi S. Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks. In WMuNeP '05: Proceedings ofthe 1st ACM workshop on Wireless multimedia networking and performance modeling, ACM, New York, NY, USA, 2005; 46-53.doi:http://doi.acm. org/10.1145/1089737.1089746 (Pubitemid 43206640)
-
(2005)
WMuNeP'05 - Proceedings of the First ACM International Workshop on Wireless Multimedia Networking and Performance Modeling
, pp. 46-53
-
-
Kassab, M.1
Belghith, A.2
Bonnin, J.-M.3
Sassi, S.4
-
18
-
-
77951161147
-
An user authentication scheme for fast handover between wifi access points
-
Austin, Texas, U. S. A.
-
Bohak A, Buttyan L, Doora L. An user authentication scheme for fast handover between wifi access points. In Proceedings of the Third Annual International Wireless Internet Conference, ACM, Austin, Texas, U. S. A., 2007.
-
(2007)
Proceedings of the Third Annual International Wireless Internet Conference, ACM
-
-
Bohak, A.1
Buttyan, L.2
Doora, L.3
-
20
-
-
84863901332
-
IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks- specific requirements
-
TM-2008 Amendment 2: Fast BSS Transition, July
-
TM-2008. IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks- specific requirements. Part 11: wireless lan medium access control (MAC) and physical layer (PHY) specifications. Amendment 2: Fast BSS Transition, July 2008.
-
(2008)
Part 11: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications
-
-
-
21
-
-
84904326049
-
Pre-authenticated fast handoff in a public wireless LAN based on IEEE 802.1x model
-
Kluwer, B. V., Deventer, The Netherlands
-
Pack S, Choi Y. Pre-authenticated fast handoff in a public wireless LAN based on IEEE 802.1x model. In PWC '02: Proceedings of the IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications, Kluwer, B. V., Deventer, The Netherlands, 2002; 175-182.
-
(2002)
PWC '02: Proceedings of the IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications
, pp. 175-182
-
-
Pack, S.1
Choi, Y.2
-
22
-
-
7244227670
-
Fast handoff scheme based on mobility prediction in public wireless LAN systems
-
IEEE
-
Pack S, Choi Y. Fast handoff scheme based on mobility prediction in public wireless LAN systems. In IEE Proceedings Communications, Vol.151, IEEE, 2004; 489-495.
-
(2004)
IEE Proceedings Communications
, vol.151
, pp. 489-495
-
-
Pack, S.1
Choi, Y.2
-
23
-
-
84878692257
-
Eliminating handoff latencies in 802.11 WLANs using multiple radios: Applications, experience, and evaluation
-
USENIX Association, Berkeley, CA, U. S. A.
-
Brik V, Mishra A, Banerjee S. Eliminating handoff latencies in 802.11 WLANs using multiple radios: applications, experience, and evaluation. In IMC'05: Proceedings of the Internet Measurement Conference 2005 on Internet Measurement Conference, USENIX Association, Berkeley, CA, U. S. A., 2005; 27-27.
-
(2005)
IMC'05: Proceedings of the Internet Measurement Conference 2005 on Internet Measurement Conference
, pp. 27-27
-
-
Brik, V.1
Mishra, A.2
Banerjee, S.3
-
26
-
-
42549128811
-
Secure, fast handhoff techniques for 802.1X based wireless network.
-
IEEE
-
Maccari L, Fantacci R, Pecorella T, Frosali F. Secure, fast handhoff techniques for 802.1X based wireless network. In Proceedings of the IEEE International Conference on Communications 2006, IEEE, 2006.
-
(2006)
Proceedings of the IEEE International Conference on Communications 2006
-
-
MacCari, L.1
Fantacci, R.2
Pecorella, T.3
Frosali, F.4
-
29
-
-
13244299564
-
-
RFC 3748 (Proposed Standard), June
-
Aboba B, Blunk L, Vollbrecht J, Carlson J, Levkowetz H. Extensible authentication protocol (EAP). RFC 3748 (Proposed Standard), June 2004.http://www.ietf.org/rfc/rfc3748.txt
-
(2004)
Extensible Authentication Protocol (EAP)
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
Levkowetz, H.5
-
35
-
-
0003508558
-
-
FIPS 197. US Department of Commerce, Bureau of Standards, National Technical Information Service (NIST)
-
FIPS 197. Advanced encryption standard. Federal Information Processing Standards Publication 197, US Department of Commerce, Bureau of Standards, National Technical Information Service (NIST) 2001.
-
(2001)
Advanced Encryption Standard. Federal Information Processing Standards Publication
, vol.197
-
-
-
40
-
-
0032621035
-
A review of current routing protocols for ad hoc mobile wireless networks
-
Royer EM, Toh C. A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications 1999; 6(2): 46-55.
-
(1999)
IEEE Personal Communications
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.2
-
41
-
-
77951160225
-
Routing in wireless mesh networks.
-
Zhang Y, Luo J, Hu H (eds). Auerbach: Boca Raton, FL
-
Bahr M, Wang J, Jia X. Routing in wireless mesh networks. In Wireless Mesh Networking: Architectures, Protocols and Standards, Zhang Y, Luo J, Hu H (eds). Auerbach: Boca Raton, FL, 2006.
-
(2006)
Wireless Mesh Networking: Architectures, Protocols and Standards
-
-
Bahr, M.1
Wang, J.2
Jia, X.3
-
44
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks.
-
San Francisco, CA, U. S. A.
-
Hu Y, Perrig A, Johnson D. Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM), San Francisco, CA, U. S. A., 2003.
-
(2003)
Proceedings of the IEEE Conference on Computer Communications (INFOCOM)
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
45
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols.
-
San Diego, CA, U. S. A.
-
Hu YC, Perrig A, Johnson D. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the ACM Workshopon Wireless Security (WiSe), San Diego, CA, U. S. A., 2003.
-
(2003)
Proceedings of the ACM Workshopon Wireless Security (WiSe)
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.3
-
46
-
-
84982836904
-
Efficient security mechanisms for routing protocols.
-
San Diego, California, U. S. A.
-
Hu Y, Perrig A, Johnson D. Efficient security mechanisms for routing protocols. In Proceedings of'the Network and Distributed System Security Symposium (NDSS), San Diego, California, U. S. A., 2003.
-
(2003)
Proceedings of'The Network and Distributed System Security Symposium (NDSS)
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
48
-
-
0842283101
-
A secure routing protocol for ad hoc networks.
-
Paris, France
-
Sanzgiri K, Dahill B, Levine B, Shields C, Belding-Royer E. A secure routing protocol for ad hoc networks. In Proceedings ofthe International Conference on Network Protocols (ICNP), Paris, France, 2002.
-
(2002)
Proceedings Ofthe International Conference on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.3
Shields, C.4
Belding-Royer, E.5
-
53
-
-
0036793924
-
Denial ofservice in sensornetworks
-
Wood A, Stankovic J. Denial ofservice in sensornetworks. IEEE Computer 2002; 35: 53-57.
-
(2002)
IEEE Computer
, vol.35
, pp. 53-57
-
-
Wood, A.1
Stankovic, J.2
-
54
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks.
-
Xu W, Trappe W, Zhang Y, Wood T. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of ACM MobiHoc, 2005.
-
(2005)
Proceedings of ACM MobiHoc
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
55
-
-
51949113065
-
Intelligent jamming in wireless networks with applications to 802.11b and other networks
-
Thuente D, Acharya M. Intelligent jamming in wireless networks with applications to 802.11b and other networks. In Proceedings ofIEEE MILCOM, 2006.
-
(2006)
Proceedings OfIEEE MILCOM
-
-
Thuente, D.1
Acharya, M.2
-
57
-
-
51349091564
-
On the performance of IEEE 802.11 under jamming.
-
Bayraktaroglu E, King C, Liu X, Noubir G, Rajaraman R, Thapa B. On the performance of IEEE 802.11 under jamming. In Proceedings ofIEEE INFOCOM, 2008.
-
(2008)
Proceedings OfIEEE INFOCOM
-
-
Bayraktaroglu, E.1
King, C.2
Liu, X.3
Noubir, G.4
Rajaraman, R.5
Thapa, B.6
-
59
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Zhang Y, Lee W, Huang YA. Intrusion detection techniques for mobile wireless networks. Wireless Networks 2003; 9(5): 545556.
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.A.3
-
62
-
-
49449096549
-
An analytic framework for modeling and detecting access layer misbehavior in wireless networks
-
Radosavac S, Moustakides G, Baras J, Koutsopoulos I. An analytic framework for modeling and detecting access layer misbehavior in wireless networks. ACM Transactions on Information and System Security 2008; 11(4): 1-28.
-
(2008)
ACM Transactions on Information and System Security
, vol.11
, Issue.4
, pp. 1-28
-
-
Radosavac, S.1
Moustakides, G.2
Baras, J.3
Koutsopoulos, I.4
-
63
-
-
33750825847
-
DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots
-
Raya M, Aad I, Hubaux JP, Fawal AE. DOMINO: detecting MAC layer greedy behavior in IEEE 802.11 hotspots. IEEE Transactions on Mobile Computing 2006; 5(12): 1691-1705.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.12
, pp. 1691-1705
-
-
Raya, M.1
Aad, I.2
Hubaux, J.P.3
Fawal, A.E.4
-
64
-
-
35148872165
-
A cross-layer approach to detect jamming attacks in wireless ad hoc networks.
-
Ans S Mishra GT, Sridhar R. A cross-layer approach to detect jamming attacks in wireless ad hoc networks. In Proceedings of IEEE MILCOM, 2006.
-
(2006)
Proceedings of IEEE MILCOM
-
-
Ans, S.1
Mishra, G.T.2
Sridhar, R.3
-
66
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
Xu W, Ma K, Trappe W, Zhang Y. Jamming sensor networks: attack and defense strategies. IEEE Network 2006; 20: 41-47.
-
(2006)
IEEE Network
, vol.20
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
|