Protecting IEEE 802.11s wireless mesh networks against insider attacks
暂无分享,去创建一个
Ralf Steinmetz | Matthias Hollick | Andreas Reinhardt | André König | Daniel Seither | R. Steinmetz | M. Hollick | André König | Andreas Reinhardt | Daniel Seither
[1] Voon Chin Phua,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .
[2] Somanath Tripathy,et al. THWMP: trust based secure routing for wireless mesh networks , 2011, ICCCS '11.
[3] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, Ad Hoc Networks.
[4] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[5] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[6] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[7] D. Harkins,et al. Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).
[8] Choong Seon Hong,et al. A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network , 2008, ICCSA.
[9] Ralf Steinmetz,et al. The rise and fall of the AODV protocol: A testbed study on practical routing attacks , 2010, IEEE Local Computer Network Conference.
[10] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .