Survey on Attacks Pertaining to Wireless Mesh Networks and Approach towards Counter Measures
暂无分享,去创建一个
[1] Yih-Chun Hu,et al. Efficient Security Mechanisms for Routing Protocolsa , 2003, NDSS.
[2] Hassnaa Moustafa. Providing Authentication, Trust, and Privacy in Wireless Mesh Networks , 2008 .
[3] Phone Lin,et al. A study on distributed/centralized scheduling for wireless mesh network , 2006, IWCMC '06.
[4] Divya Bansal,et al. Selfish MAC Misbehaviour Detection in Wireless Mesh Network , 2010, 2010 International Conference on Advances in Computer Engineering.
[5] Xianjie Wu,et al. Application of Wireless Mesh Network in campus network , 2010, 2010 Second International Conference on Communication Systems, Networks and Applications.
[6] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[7] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[8] Yih-Chun Hu. Efficient Security Mechanisms for Routing Protocols , 2003 .
[9] Weihua Zhuang,et al. Distributed medium access control for wireless mesh networks , 2006, Wirel. Commun. Mob. Comput..
[10] V. S. Shankar Sriram,et al. Methodology for Securing Wireless LANs Against Wormhole Attack , 2009 .
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Çetin Kaya Koç,et al. High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor , 2001 .
[13] Tarun Kumar,et al. Threats and Vulnerabilities in Wireless Mesh Networks , 2009 .
[14] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[15] Monika. Denial of Service Attacks in Wireless Mesh Networks , 2012 .
[16] Mary Saira Bhanu,et al. A Survey of Secure Routing Protocols for Wireless Mesh Networks , 2014 .
[17] Sahil Seth,et al. Denial of Service Attacks and Detection Methods in Wireless Mesh Networks , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.