Testing the Resilience of HCWN

The wireless technologies, since their birth in 1890, have revolutionized our life style and provided freedom and liberty in remote data procession and management, both in civilian and military areas. After more than a century of evolution, wireless technology is adopted globally due to its advantages and ease of use in communication and data transfer, and wireless interconnectivity surrounds us on a daily basis, from wireless CCTV cameras to smartphones.

[1]  Jaydip Sen,et al.  Security and Privacy Issues in Wireless Mesh Networks: A Survey , 2013, Wireless Networks and Security.

[2]  Frank Thornton,et al.  WarDriving and Wireless Penetration Testing , 2006 .

[3]  Gary A. Donahue Network Warrior , 2007 .

[4]  Hadi Larijani,et al.  ANCH: A New Clustering Algorithm for Wireless Sensor Networks , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[5]  Park Foreman Vulnerability Management , 2009 .