2010
DOI: 10.4103/0256-4602.58969
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Security in Wireless Mesh Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0
1

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(29 citation statements)
references
References 15 publications
0
28
0
1
Order By: Relevance
“…As the wireless network became the main Internet way and the country's attention was drew to the network security, it was imperative to enable Portal access certification [6][7][8][9][10]. In order to implement the deployment of Portal access, and to improve the experience of the Internet, the combination of Portal and Mac were used in the whole school.…”
Section: Non-sensory Authentication Topologymentioning
confidence: 99%
“…As the wireless network became the main Internet way and the country's attention was drew to the network security, it was imperative to enable Portal access certification [6][7][8][9][10]. In order to implement the deployment of Portal access, and to improve the experience of the Internet, the combination of Portal and Mac were used in the whole school.…”
Section: Non-sensory Authentication Topologymentioning
confidence: 99%
“…Comprehensive surveys of cyber threats and defence mechanisms in general-use wireless networks can be found in [78] for WMNs and in [79] for MANETs. Here, we present the information security measures taken by wireless communication networks that have been recently designed specifically for use in emergencies.…”
Section: Wireless Communication Networkmentioning
confidence: 99%
“…Hence, the source node would not be able to find secure routes, that is, routes that do not include the adversary node. It is extremely difficult to detect such attacks in ad hoc wireless networks [3].…”
Section: ) Rushing Attackmentioning
confidence: 99%
“…It provides point-to-point authentication of a routing message using a message authentication code (MAC) and a shared key between the two communicating parties. Although ARIADNE is free from a flood of RREQ packets and cache poisoning attack, but it is immune to the wormhole attack and rushing attack [3].…”
Section: (Ijacsa) International Journal Of Advanced Computer Science mentioning
confidence: 99%
See 1 more Smart Citation