Yi et al., 2010 - Google Patents
A survey on security in wireless mesh networksYi et al., 2010
- Document ID
- 1271928517685972088
- Author
- Yi P
- Wu Y
- Zou F
- Liu N
- Publication year
- Publication venue
- IETE Technical Review
External Links
Snippet
Wireless mesh networks is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. However, it is particularly vulnerable due to its features of open medium, dynamic changing topology, and cooperative routing algorithms …
- 238000001514 detection method 0 abstract description 34
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yi et al. | A survey on security in wireless mesh networks | |
Deng et al. | Routing security in wireless ad hoc networks | |
El Defrawy et al. | Privacy-preserving location-based on-demand routing in MANETs | |
Lee et al. | A secure alternate path routing in sensor networks | |
Singh et al. | Security for wireless sensor network | |
Datta et al. | Security for mobile ad hoc networks | |
Kumar | Classification and review of security schemes in mobile computing | |
Palacharla et al. | Wormhole attack: a major security concern in internet of things (IoT) | |
Modirkhazeni et al. | Empirical Study on Secure Routing Protocols in Wireless Sensor Networks. | |
Kaur et al. | A review on security attacks in mobile ad-hoc networks | |
Yi et al. | Security in wireless mesh networks: challenges and solutions | |
Dixit et al. | A review: black hole and gray hole attack in MANET | |
Lakkadi et al. | Security in ad hoc networks | |
Bononi et al. | Intrusion detection for secure clustering and routing in mobile multi-hop wireless networks | |
Du et al. | A survey on sensor network security | |
Singh et al. | Survey of secure routing protocols in MANET | |
Al-Karaki | Analysis of routing security-energy trade-offs in wireless sensor networks | |
Mariyappan et al. | Power draining prevention in Ad-Hoc Sensor networks using sensor network encryption protocol | |
Boukerche et al. | ARMA: an efficient secure ad hoc routing protocol | |
Deeptha | A Comprehensive Survey of Routing Attacks and Defense Mechanisms in MANETs | |
Bononi et al. | A wireless intrusion detection system for secure clustering and routing in ad hoc networks | |
Dureja et al. | Comparative Study Of Collaborative Attacks & Security Mechanisms In Manet | |
Palanisamy et al. | Curbing and curing sybil attack in ad hoc network | |
Peter et al. | Security and dynamic encryption system in mobile AD-hoc network | |
Sobana et al. | Security in Mobile Ad hoc Networks: Challenges and Solutions |