2012
DOI: 10.1177/0037549712467827
|View full text |Cite
|
Sign up to set email alerts
|

A Pay-and-Stay model for tackling intruders in hybrid wireless mesh networks

Abstract: Intrusion handling in wireless mesh networks (WMNs) is a relatively less addressed topic. The difficulty may lie in the fact that there are other wireless networks for which some intrusion detection or prevention schemes are proposed that could also be applied in some way in a WMN setting. As those schemes are contributing, researchers may not find it necessary to specifically focus on this field. Another critical reason may be the difficulty in developing an effective scheme for WMNs. In fact, the structural … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…There is still some weakness in the existing approaches such as security resilience, connection probability and scalability. [131], MAPE [126], Linear SVM [128], IoT Malware Detection [127], ELSA [130], Hybrid Spyware Detection [129], BLOWFISH, PRESENT, HEIGHT, AES, 3DES, RSA, ECC, DSA, DH [233], [40], K-Anonymity Technique [135], BUDDIES [136], LSR [146], Lightweight RSS-Based Scheme [148], Privacy-Preserving Scheme [147], Game Theory [152], [153], [234], CHA-IDS [140], TCGA [145], INTI [143], Sensor Scheduling Technique [120], Mobile Agent-Based IDS [150], Determeministic Detection [156], Jammer Localization, Detection and Mitigation [157]- [159], [182], [189], [190] and Tamper Detection [160].…”
Section: A Discussion On Existing Security Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…There is still some weakness in the existing approaches such as security resilience, connection probability and scalability. [131], MAPE [126], Linear SVM [128], IoT Malware Detection [127], ELSA [130], Hybrid Spyware Detection [129], BLOWFISH, PRESENT, HEIGHT, AES, 3DES, RSA, ECC, DSA, DH [233], [40], K-Anonymity Technique [135], BUDDIES [136], LSR [146], Lightweight RSS-Based Scheme [148], Privacy-Preserving Scheme [147], Game Theory [152], [153], [234], CHA-IDS [140], TCGA [145], INTI [143], Sensor Scheduling Technique [120], Mobile Agent-Based IDS [150], Determeministic Detection [156], Jammer Localization, Detection and Mitigation [157]- [159], [182], [189], [190] and Tamper Detection [160].…”
Section: A Discussion On Existing Security Approachesmentioning
confidence: 99%
“…The authors designed and implemented their IDS in the Contiki operating system and evaluated using Cooja simulator [187]. Game theory-based detection model presented in [152], [153] to model and detect SF attacks for wireless mesh networks (WMNs) efficiently. The authors in [154] proposed a solution, which allows breaking the data packets into a number of smaller pieces.…”
Section: B Autonomic Approachesmentioning
confidence: 99%