-
1
-
-
13844296355
-
Wireless mesh networks: A survey
-
DOI 10.1016/j.comnet.2004.12.001, PII S1389128604003457
-
I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Comput. Netw., vol. 47, no. 4, pp. 445-487, 2005. (Pubitemid 40242422)
-
(2005)
Computer Networks
, vol.47
, Issue.4
, pp. 445-487
-
-
Akyildiz, I.F.1
Wang, X.2
Wang, W.3
-
2
-
-
0141981548
-
IEEE Standard for Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications
-
(Revision of IEEE Std 802.11-2007)
-
IEEE Standard for Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, IEEE Std. 802.11-2012 (Revision of IEEE Std 802.11-2007), 2012.
-
(2012)
IEEE Std. 802.11 2012
-
-
-
3
-
-
48649095029
-
An efficient countermeasure to the selective forwarding attack in wireless sensor networks
-
H.-M. Sun, C.-M. Chen, and Y.-C. Hsiao, "An efficient countermeasure to the selective forwarding attack in wireless sensor networks," in Proc. 2007 TENCON, pp. 1-4.
-
Proc. 2007 TENCON
, pp. 1-4
-
-
Sun, H.-M.1
Chen, C.-M.2
Hsiao, Y.-C.3
-
4
-
-
77749339862
-
Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information
-
M. Tiwari, K. V. Arya, R. Choudhari, and K. S. Choudhary, "Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information," in Proc. 2009 ICCIT, pp. 824-828.
-
Proc. 2009 ICCIT
, pp. 824-828
-
-
Tiwari, M.1
Arya, K.V.2
Choudhari, R.3
Choudhary, K.S.4
-
5
-
-
70349743699
-
Unmask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks
-
I. Khalil, S. Bagchi, C. N. Rotaru, and N. B. Shroff, "Unmask: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks," Ad Hoc Netw., vol. 8, no. 2, pp. 148-164, 2010.
-
(2010)
Ad Hoc Netw.
, vol.8
, Issue.2
, pp. 148-164
-
-
Khalil, I.1
Bagchi, S.2
Rotaru, C.N.3
Shroff, N.B.4
-
6
-
-
84872774058
-
MDS-based wormhole detection using local topology in wireless sensor networks
-
Article ID 145702
-
X. Lu, D. Dong, and X. Liao, "MDS-based wormhole detection using local topology in wireless sensor networks," Int. J. Distributed Sensor Netw., vol. 2012, Article ID 145702, 9 pages, 2012.
-
(2012)
Int. J. Distributed Sensor Netw. 2012
, pp. 9
-
-
Lu, X.1
Dong, D.2
Liao, X.3
-
7
-
-
34548031104
-
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.025, PII S0140366407001740
-
E. C. H. Ngai, J. Liu, and M. R. Lyu, "An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks," Comput. Commun., vol. 30, no. 11-12, pp. 2353-2364, 2007. (Pubitemid 47285290)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2353-2364
-
-
Ngai, E.C.H.1
Liu, J.2
Lyu, M.R.3
-
8
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 2000 Mobicom, pp. 255-265.
-
Proc. 2000 Mobicom
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
9
-
-
67249141928
-
A reputation-based metric for secure routing in wireless mesh networks
-
F. Oliviero and S. P. Romano, "A reputation-based metric for secure routing in wireless mesh networks," in Proc. 2008 GLOBECOM, pp. 1-5.
-
Proc. 2008 GLOBECOM
, pp. 1-5
-
-
Oliviero, F.1
Romano, S.P.2
-
10
-
-
77952255404
-
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
-
D. M. Shila, Y. Cheng, and T. Anjali, "Mitigating selective forwarding attacks with a channel-aware approach in WMNs," IEEE Trans. Wireless Commun., vol. 9, no. 5, pp. 1661-1675, 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.5
, pp. 1661-1675
-
-
Shila, D.M.1
Cheng, Y.2
Anjali, T.3
-
11
-
-
34548852836
-
CHEMAS: Identify suspect nodes in selective forwarding attacks
-
DOI 10.1016/j.jpdc.2007.04.014, PII S0743731507000718
-
B. Xiao, B. Yu, and C. Gao, "Chemas: identify suspect nodes in selective forwarding attacks," J. Parallel Distributed Comput., vol. 67, pp. 1218-1230, 2007. (Pubitemid 47446131)
-
(2007)
Journal of Parallel and Distributed Computing
, vol.67
, Issue.11
, pp. 1218-1230
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
12
-
-
41449098948
-
LEDS: Providing location-aware end-to-end data security in wireless sensor networks
-
DOI 10.1109/TMC.2007.70753, 4358997
-
K. Ren, W. Lou, and Y. Zhang, "LEDs: providing location-aware endto-end data security in wireless sensor networks," IEEE Trans. Mobile Comput., vol. 7, no. 5, pp. 585-598, 2008. (Pubitemid 351454006)
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.5
, pp. 585-598
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
13
-
-
51249104865
-
Detection of selective forwarding attacks in heterogeneous sensor networks
-
J. Brown and X. Du, "Detection of selective forwarding attacks in heterogeneous sensor networks," in Proc. 2008 ICC, pp. 1583-1587.
-
Proc. 2008 ICC
, pp. 1583-1587
-
-
Brown, J.1
Du, X.2
-
14
-
-
70349734493
-
An authentication scheme for locating compromised sensor nodes in WSNs
-
Y. Zhang, J. Yang, W. Li, L. Wang, and L. Jin, "An authentication scheme for locating compromised sensor nodes in WSNs," J. Netw. Comput. Applicat., vol. 33, no. 1, pp. 50-62, 2010.
-
(2010)
J. Netw. Comput. Applicat.
, vol.33
, Issue.1
, pp. 50-62
-
-
Zhang, Y.1
Yang, J.2
Li, W.3
Wang, L.4
Jin, L.5
-
15
-
-
77952310498
-
A secure routing protocol for wireless sensor networks
-
ICCSA 2010, ser Springer Berlin Heidelberg, 2010
-
J. Sen and A. Ukil, "A secure routing protocol for wireless sensor networks," in ICCSA 2010, ser. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2010, vol. 6018, pp. 277-290.
-
Lecture Notes in Computer Science.
, vol.6018
, pp. 277-290
-
-
Sen, J.1
Ukil, A.2
-
16
-
-
77957941365
-
Toward resilient routing in wireless sensor networks: Gradient-based routing in focus
-
O. Erdene-Ochir, M. Minier, F. Valois, and A. Kountouris, "Toward resilient routing in wireless sensor networks: gradient-based routing in focus," in Proc. 2010 SENSORCOMM, pp. 478-483.
-
Proc. 2010 SENSORCOMM
, pp. 478-483
-
-
Erdene-Ochir, O.1
Minier, M.2
Valois, F.3
Kountouris, A.4
-
17
-
-
82955163119
-
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
-
F. L. Fessant, A. Papadimitriou, A. C. Viana, C. Sengul, and E. Palomar, "A sinkhole resilient protocol for wireless sensor networks: performance and security analysis," Comput. Commun., vol. 35, no. 2, pp. 234-248, 2012.
-
(2012)
Comput. Commun.
, vol.35
, Issue.2
, pp. 234-248
-
-
Fessant, F.L.1
Papadimitriou, A.2
Viana, A.C.3
Sengul, C.4
Palomar, E.5
-
18
-
-
53249147143
-
A survey of game-theoretic approaches in wireless sensor networks
-
R. Machado and S. Tekinay, "A survey of game-theoretic approaches in wireless sensor networks," Comput. Netw., vol. 52, no. 16, pp. 3047-3061, 2008.
-
(2008)
Comput. Netw.
, vol.52
, Issue.16
, pp. 3047-3061
-
-
MacHado, R.1
Tekinay, S.2
-
19
-
-
32644453532
-
Security enforcement in wireless sensor networks: A framework based on non-cooperative games
-
DOI 10.1016/j.pmcj.2005.12.001, PII S1574119205000714, Security in Wireless Mobile Computing Systems
-
A. Agah, K. Basu, and S. K. Das, "Security enforcement in wireless sensor networks: a framework based on non-cooperative games," Pervasive Mobile Comput., vol. 2, no. 2, pp. 137-158, 2006. (Pubitemid 43243856)
-
(2006)
Pervasive and Mobile Computing
, vol.2
, Issue.2
, pp. 137-158
-
-
Agah, A.1
Basu, K.2
Das, S.K.3
-
20
-
-
79955681745
-
Game theory model for selective forward attacks in wireless sensor networks
-
Y. B. Reddy and S. Srivathsan, "Game theory model for selective forward attacks in wireless sensor networks," in Proc. 2009 MED, pp. 458-463.
-
Proc. 2009 MED
, pp. 458-463
-
-
Reddy, Y.B.1
Srivathsan, S.2
-
21
-
-
84886530194
-
Detection of colluding selective forwarding nodes in wireless mesh networks based on channel aware detection algorithm
-
V. V. V
-
V. V. V and V. M. A. Rajam, "Detection of colluding selective forwarding nodes in wireless mesh networks based on channel aware detection algorithm," MES J. Technol. Manage., pp. 62-66, 2011.
-
MES J. Technol. Manage.
, Issue.2011
, pp. 62-66
-
-
Rajam, V.M.A.1
-
22
-
-
77955715403
-
An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks
-
S. Misra, P. V. Krishna, K. I. Abraham, N. Sasikumar, and S. Fredun, "An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks," Comput. Mathematics Applicat., vol. 60, no. 2, pp. 294-306, 2010.
-
(2010)
Comput. Mathematics Applicat.
, vol.60
, Issue.2
, pp. 294-306
-
-
Misra, S.1
Krishna, P.V.2
Abraham, K.I.3
Sasikumar, N.4
Fredun, S.5
-
23
-
-
79952931949
-
Secure high-throughput multicast routing in wireless mesh networks
-
J. Dong, R. Curtmola, and C. Nita-Rotaru, "Secure high-throughput multicast routing in wireless mesh networks," IEEE Trans. Mobile Comput., vol. 10, no. 5, pp. 653-668, 2011.
-
(2011)
IEEE Trans. Mobile Comput.
, vol.10
, Issue.5
, pp. 653-668
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
24
-
-
84944925335
-
Defending against collaborative packet drop attacks on manets
-
W. Wang, B. Bhargava, and M. Linderman, "Defending against collaborative packet drop attacks on manets," in 2009 DNCMS.
-
2009 DNCMS
-
-
Wang, W.1
Bhargava, B.2
Linderman, M.3
-
25
-
-
84873323007
-
Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks
-
S. Banerjee, "Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks," in 2008 WCECS.
-
2008 WCECS
-
-
Banerjee, S.1
-
26
-
-
79952568191
-
A security framework for wireless mesh networks
-
P. S. Mogre, K. Graffi, M. Hollick, and R. Steinmetz, "A security framework for wireless mesh networks," Wireless Commun. Mobile Comput., vol. 11, no. 3, pp. 371-391, 2011.
-
(2011)
Wireless Commun. Mobile Comput.
, vol.11
, Issue.3
, pp. 371-391
-
-
Mogre, P.S.1
Graffi, K.2
Hollick, M.3
Steinmetz, R.4
-
27
-
-
77954758626
-
SRPM: Secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks
-
S. Khan, K.-K. Loo, N. Mast, and T. Naeem, "SRPM: secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks," J. Netw. Syst. Manage., vol. 18, no. 2, pp. 190-209, 2010.
-
(2010)
J. Netw. Syst. Manage.
, vol.18
, Issue.2
, pp. 190-209
-
-
Khan, S.1
Loo, K.-K.2
Mast, N.3
Naeem, T.4
-
28
-
-
84856717994
-
Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks
-
S. Khan and J. Loo, "Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks," Wireless Pers. Commun., vol. 62, no. 1, pp. 201-214, 2012.
-
(2012)
Wireless Pers. Commun.
, vol.62
, Issue.1
, pp. 201-214
-
-
Khan, S.1
Loo, J.2
-
30
-
-
74449087312
-
A global security architecture for operated hybrid WLAN mesh networks
-
V. Toubiana, H. Labiod, L. Reynaud, and Y. Gourhant, "A global security architecture for operated hybrid WLAN mesh networks," Comput. Netw., vol. 54, no. 2, pp. 218-230, 2010.
-
(2010)
Comput. Netw.
, vol.54
, Issue.2
, pp. 218-230
-
-
Toubiana, V.1
Labiod, H.2
Reynaud, L.3
Gourhant, Y.4
-
31
-
-
77951151719
-
Securing multi-operator-based QoS-aware mesh networks: Requirements and design options
-
I. Askoxylakis, B. Bencśath, L. Buttýan, L. D́ora, V. Siris, D. Szili, and I. Vajda, "Securing multi-operator-based QoS-aware mesh networks: requirements and design options," Wireless Commun. Mobile Comput., vol. 10, no. 5, pp. 622-646, 2010.
-
(2010)
Wireless Commun. Mobile Comput.
, vol.10
, Issue.5
, pp. 622-646
-
-
Askoxylakis, I.1
Bencśath, B.2
Buttýan, L.3
D́ora, L.4
Siris, V.5
Szili, D.6
Vajda, I.7
-
32
-
-
84866631026
-
-
IEEE Commun. Lett.
-
Q. Liu, J. Yin, V. C. M. Leung, and Z. Cai, "ISAR: improved situationaware routing method for wireless mesh backbones," IEEE Commun. Lett., vol. 16, no. 9, pp. 1404-1407, 2012.
-
(2012)
ISAR: Improved situationaware routing method for wireless mesh backbones
, vol.16
, Issue.9
, pp. 1404-1407
-
-
Liu, Q.1
Yin, J.2
Leung, V.C.M.3
Cai, Z.4
-
33
-
-
0742292815
-
Ad hoc on-Demand distance vector (AODV) routing
-
July Available
-
C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing," IETF RFC 3561, July 2003. Available: http://tools.ietf.org/html/rfc3561
-
(2003)
IETF RFC
, vol.3561
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
34
-
-
82155166330
-
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
-
M. Omar, Y. Challal, and A. Bouabdallah, "Certification-based trust models in mobile ad hoc networks: a survey and taxonomy," J. Netw. Comput. Applicat., vol. 35, no. 1, p. 268-286, 2012.
-
(2012)
J. Netw. Comput. Applicat.
, vol.35
, Issue.1
, pp. 268-286
-
-
Omar, M.1
Challal, Y.2
Bouabdallah, A.3
-
35
-
-
79251595067
-
Proxy encryption based secure multicast in wireless mesh networks
-
Y. Han, X. Gui, X. Wu, and X. Yang, "Proxy encryption based secure multicast in wireless mesh networks," J. Netw. Comput. Applicat., vol. 34, no. 2, pp. 469-477, 2011.
-
(2011)
J. Netw. Comput. Applicat.
, vol.34
, Issue.2
, pp. 469-477
-
-
Han, Y.1
Gui, X.2
Wu, X.3
Yang, X.4
-
36
-
-
80052337836
-
Secret key generation exploiting channel characteristics in wireless communications
-
K. Ren, H. Su, and Q. Wang, "Secret key generation exploiting channel characteristics in wireless communications," IEEE Wireless Commun., vol. 18, no. 4, pp. 6-12, 2011.
-
(2011)
IEEE Wireless Commun.
, vol.18
, Issue.4
, pp. 6-12
-
-
Ren, K.1
Su, H.2
Wang, Q.3
-
37
-
-
79251633483
-
Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks
-
Article No. 16
-
R. Azarderskhsh and A. Reyhani-Masoleh, "Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks," EURASIP J. Wireless Commun. Netw., vol. 2011, Article No. 16, 12 pages, 2011.
-
(2011)
EURASIP J. Wireless Commun. Netw. 2011
, pp. 12
-
-
Azarderskhsh, R.1
Reyhani-Masoleh, A.2
-
38
-
-
79251618754
-
Efficient public key certificate management for mobile ad hoc networks
-
Article No. 18
-
P. Caballero-Gil and C. Herńandez-Goya, "Efficient public key certificate management for mobile ad hoc networks," EURASIP J. Wireless Commun. Netw., vol. 2011, Article No. 18, 11 pages, 2011.
-
(2011)
EURASIP J. Wireless Commun. Netw. 2011
, pp. 11
-
-
Caballero-Gil, P.1
Herńandez-Goya, C.2
-
39
-
-
84555195648
-
Survivable key management on WANETs
-
M. Nogueira, E. Silva, A. Santos, and L. Albini, "Survivable key management on WANETs," IEEE Wireless Commun., vol. 18, no. 6, pp. 82-88, 2011.
-
(2011)
IEEE Wireless Commun.
, vol.18
, Issue.6
, pp. 82-88
-
-
Nogueira, M.1
Silva, E.2
Santos, A.3
Albini, L.4
-
40
-
-
84957364590
-
A new paradigm for collision-free hashing: Incrementality at reduced cost
-
Available
-
M. Bellare and D. Micciancio, "A new paradigm for collision-free hashing: incrementality at reduced cost," in 1997 EUROCRYPT, pp. 163-192. Available: http://dl.acm.org/citation.cfm?id=1754542.1754560
-
1997 EUROCRYPT
, pp. 163-192
-
-
Bellare, M.1
Micciancio, D.2
-
41
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
D. Johnson, A. Menezes, and S. Vanstone, "The elliptic curve digital signature algorithm (ECDSA)," Int. J. Inf. Security, vol. 1, no. 1, pp. 36-63, 2001.
-
(2001)
Int. J. Inf. Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
42
-
-
84890116809
-
Applied Cryptography
-
InTech
-
J. Sen, Applied Cryptography and Network Security. InTech, 2012.
-
(2012)
Network Security
-
-
Sen, J.1
-
43
-
-
2442551009
-
Optimized link state routing protocol (olsr)
-
Oct. Available
-
T. Clausen and P. Jacquet, "Optimized link state routing protocol (olsr)," IETF RFC 3626, Oct. 2003. Available: http://tools.ietf.org/html/ rfc3626
-
(2003)
IETF RFC
, vol.3626
-
-
Clausen, T.1
Jacquet, P.2
-
44
-
-
1542265638
-
Us secure hash algorithm 1 (sha1)
-
Sept Available
-
D. Eastlake and P. Jones, "Us secure hash algorithm 1 (sha1)," IETF RFC 3174, Sept. 2001. Available: http://tools.ietf.org/html/rfc3174
-
(2001)
IETF RFC
, vol.3174
-
-
Eastlake, D.1
Jones, P.2
-
45
-
-
50049106991
-
Adaptive FECbased packet loss resilience scheme for supporting voice communication over ad hoc wireless networks
-
V. R. Gandikota, B. R. Tamma, and C. S. R. Murthy, "Adaptive FECbased packet loss resilience scheme for supporting voice communication over ad hoc wireless networks," IEEE Trans. Mobile Comput., vol. 7, no. 10, pp. 1184-1199, 2008.
-
(2008)
IEEE Trans. Mobile Comput.
, vol.7
, Issue.10
, pp. 1184-1199
-
-
Gandikota, V.R.1
Tamma, B.R.2
Murthy, C.S.R.3
|