Review on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security
暂无分享,去创建一个
Mohammed Anbar | Tat-Chee Wan | Muhammad Rizwan Ghori | Gian Chand Sodhy | Amna Rizwan | M. R. Ghori | Mohammed Anbar | T. Wan | G. Sodhy | Amna Rizwan
[1] Piyush Pathak,et al. Detecting MAC Misbehavior Switching Attacks in Wireless Mesh Networks , 2011 .
[2] Xinghua Yang,et al. Efficient Intrusion Detection System Model in Wireless Mesh Network , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.
[3] Khulumani Sibanda,et al. Analysis of the effect of malicious packet drop attack on packet transmission in wireless mesh networks , 2018, 2018 Conference on Information Communications Technology and Society (ICTAS).
[4] Shiuh-Pyng Shieh,et al. On the security of password-based pairing protocol in Bluetooth , 2011, 2011 13th Asia-Pacific Network Operations and Management Symposium.
[5] Alexandre Adomnicai,et al. Hardware Security Threats Against Bluetooth Mesh Networks , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).
[6] M. Mosleh,et al. Notice of Violation of IEEE Publication PrinciplesA new secure scheme purposed for recognition and authentication protocol in Bluetooth environment , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).
[7] Stéphane Maag,et al. Protecting Wireless Mesh Networks through a distributed intrusion prevention framework , 2015, 2015 7th IEEE Latin-American Conference on Communications (LATINCOM).
[8] Carles Gomez,et al. Bluetooth Low Energy Mesh Networks: A Survey , 2017, Sensors.
[9] Xin Yu,et al. Secure Constructing Bluetooth Scatternet Based on BTCP , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[10] Maryline Laurent-Maknavicius,et al. An authentication scheme for IEEE 802.11s mesh networks relying on Sakai-Kasahara ID-Based Cryptographic algorithms , 2012, Third International Conference on Communications and Networking.
[11] Vallipuram Muthukkumarasamy,et al. Securing Wireless Mesh Networks , 2008, IEEE Internet Computing.
[12] Douglas S. Reeves,et al. Bluetooth Network-Based Misuse Detection , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[13] David Hutchison,et al. OpenLIDS: a lightweight intrusion detection system for wireless mesh networks , 2009, MobiCom '09.
[14] Bin Yu,et al. Security enhanced design of the Bluetooth simple pairing protocol , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.
[15] Aggeliki Sgora,et al. A survey on security and privacy issues in Wireless Mesh Networks , 2016, Secur. Commun. Networks.
[16] Zhang Minqing,et al. The research on certificateless hierarchical key management in wireless mesh network , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[17] Liu Ning,et al. Securing Wireless Mesh Network with Mobile Firewall , 2010 .
[18] Thaier Hayajneh,et al. Security Vulnerabilities in Bluetooth Technology as Used in IoT , 2018, J. Sens. Actuator Networks.
[19] Zhuo Chen,et al. Probability Based IDS Towards Secure WMN , 2010, 2010 2nd International Workshop on Intelligent Systems and Applications.
[20] Abdulghani Ali Ahmed,et al. Review of Access Control Mechanisms in Cloud Computing , 2018 .