SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks
暂无分享,去创建一个
Jonathan Loo | Shafiullah Khan | Noor Mast | Tahir Naeem | J. Loo | Shafiullah Khan | N. Mast | T. Naeem
[1] Jangeun Jun,et al. MRP: Wireless mesh networks routing protocol , 2008, Comput. Commun..
[2] John C. Bicket,et al. SrcRR : A High Throughput Routing Protocol for 802 . 11 Mesh Networks ( DRAFT ) , .
[3] Fei Xing,et al. Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[4] Yuan Xue,et al. Optimal Routing for Wireless Mesh Networks With Dynamic Traffic Demand , 2008, Mob. Networks Appl..
[5] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[6] H. T. Mouftah,et al. Wireless mesh networking , 2005, MSWiM '05.
[7] Starsky H. Y. Wong,et al. ROMER : Resilient Opportunistic Mesh Routing for Wireless Mesh Networks , 2005 .
[8] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[9] Cristina Nita-Rotaru,et al. JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks , 2009, IEEE Transactions on Dependable and Secure Computing.
[10] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[11] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[12] Sun Choi,et al. WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[13] Jaydip Sen,et al. Secure Routing in Wireless Mesh Networks , 2011, ArXiv.
[14] Lillykutty Jacob,et al. A Secure Intra-domain Routing Protocol for Wireless Mesh Networks , 2007, ICISS.
[15] Dijkstra Dijk. THE BELLMAN-FORD ALGORITHM AND “DISTRIBUTED BELLMAN-FORD” , 2006 .
[16] Martin May,et al. Routing Packets into Wireless Mesh Networks , 2007 .
[17] D.P. Agrawal,et al. Active Cache Based Defense against DoS Attacks in Wireless Mesh Network , 2007, 2007 2nd International Symposium on Wireless Pervasive Computing.
[18] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[19] Jack W. Tsai,et al. A Review of Multipath Routing Protocols : From Wireless Ad Hoc to Mesh Networks , 2006 .
[20] Syed Obaid Amin,et al. MHRP: A Secure Multi-Path Hybrid Routing Protocol for Wireless Mesh Network , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[21] Ian F. Akyildiz,et al. A survey on wireless mesh networks , 2005, IEEE Communications Magazine.
[22] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[23] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[24] Melody Moh,et al. A Delay-bounded Multi-Channel Routing Protocol for Wireless Mesh Networks using Multiple Token Rings: Extended Summary , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[25] QUTdN QeO,et al. Random early detection gateways for congestion avoidance , 1993, TNET.
[26] Yi Pan,et al. Vulnerabilities and security enhancements for the IEEE 802.11 WLANs , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[27] Brian L. Mark,et al. Byzantine robust trust establishment for mobile ad hoc networks , 2007, Telecommun. Syst..
[28] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[29] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[30] Massimo Bernaschi,et al. Access points vulnerabilities to DoS attacks in 802.11 networks , 2008, Wirel. Networks.
[31] Murat Yuksel,et al. Orthogonal Rendezvous Routing Protocol for Wireless Mesh Networks , 2009, IEEE/ACM Transactions on Networking.
[32] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[33] Martin May,et al. HEAT: Scalable Routing in Wireless Mesh Networks Using Temperature Fields , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[34] Todd R. Andel,et al. Surveying security analysis techniques in manet routing protocols , 2007, IEEE Communications Surveys & Tutorials.
[35] Reza Curtmola,et al. Secure Routing in Wireless Mesh Networks , 2011, Encyclopedia of Cryptography and Security.
[36] Farhat Anwar,et al. A Proposed QoS Multicast Routing Framework for Next-Generation Wireless Mesh Network , 2008 .
[37] Mario Gerla,et al. Enhancing TCP fairness in ad hoc wireless networks using neighborhood RED , 2003, MobiCom '03.
[38] Raouf Boutaba,et al. Routing protocols in wireless mesh networks: challenges and design considerations , 2006, Multimedia Tools and Applications.
[39] Anupam Joshi,et al. Secure Routing and Intrusion Detection in Ad Hoc Networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[40] Mario Gerla,et al. Global state routing: a new routing scheme for ad-hoc wireless networks , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).
[41] Myung J. Lee,et al. A resource-efficient and scalable wireless mesh routing protocol , 2007, Ad Hoc Networks.
[42] Kok-Keong Loo,et al. Cloned Access Point Detection and Point Detection and Prevention Mechanism in IEEE 802.11 Wireless Mesh Networks , 2008 .
[43] Tarik Taleb,et al. Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.
[44] M.R. Shikh-Bahaei,et al. Interference cancellation in W-CDMA cellular structures using statistical processing , 1999, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042).
[45] Stefan Savage,et al. Denial-of-Service Attacks : Real Vulnerabilities and Practical Solutions , 2003 .
[46] Marius Portmann,et al. HOVER: hybrid on-demand distance vector routing for wireless mesh networks , 2008, ACSC.
[47] Elizabeth M. Belding-Royer,et al. On the Design and Implementation of Infrastructure Mesh Networks , 2005 .