2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium 2015
DOI: 10.1109/hpcc-css-icess.2015.118
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic Cooperative Monitor Node Selection Algorithm in Wireless Mesh Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…The authors in [17] proposed a dynamic cooperative monitoring interface-selection mechanism based on social network analysis, which can effectively reduce the network cost of direct measurement. Besides, the authors in [18] studied the problem of selecting a set of monitoring interfaces, and proposed a Cross-Layer Security Monitoring selection algorithm based on Traffic Prediction (CLSM-TP). The authors in [19] proposed a mechanism to support the Software Defined Network (SDN) to distribute the monitoring load on multiple switches in the network by monitoring traffic in a distributed manner.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [17] proposed a dynamic cooperative monitoring interface-selection mechanism based on social network analysis, which can effectively reduce the network cost of direct measurement. Besides, the authors in [18] studied the problem of selecting a set of monitoring interfaces, and proposed a Cross-Layer Security Monitoring selection algorithm based on Traffic Prediction (CLSM-TP). The authors in [19] proposed a mechanism to support the Software Defined Network (SDN) to distribute the monitoring load on multiple switches in the network by monitoring traffic in a distributed manner.…”
Section: Related Workmentioning
confidence: 99%
“…2) Confidentiality [4] .Data confidentiality dictates that only the two communicating entities can read the interchanged data. To ensure this our proposed scheme uses encryption along with key-pair LKMN while interchanging data.…”
Section: ) Security and Privacy Requirementsmentioning
confidence: 99%