2007 IFIP International Conference on Wireless and Optical Communications Networks 2007
DOI: 10.1109/wocn.2007.4284178
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Tolerant Routing for Mesh Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2012
2012
2013
2013

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Particularly, Figure 8 shows the processing delay according to the number of malicious nodes within a mesh network. We notice that the processing delay does not highly increase when a malicious clusterhead is only detected without being isolated, but that the same delay becomes very important when the number of malicious access nodes increases (i.e., for example when a router presents malicious entities and should broadcast its status to its neighbors or when a clusterhead should be completely isolated) [9].…”
Section: Evaluating the Performance Of The 3tca's Protocolsmentioning
confidence: 91%
See 4 more Smart Citations
“…Particularly, Figure 8 shows the processing delay according to the number of malicious nodes within a mesh network. We notice that the processing delay does not highly increase when a malicious clusterhead is only detected without being isolated, but that the same delay becomes very important when the number of malicious access nodes increases (i.e., for example when a router presents malicious entities and should broadcast its status to its neighbors or when a clusterhead should be completely isolated) [9].…”
Section: Evaluating the Performance Of The 3tca's Protocolsmentioning
confidence: 91%
“…Speed sensitive HO scheme, [6] Speed sensitive HO under hierarchical cellular system Does not consider security issues Path selection method, [7] Secures the routing for MMR networks Does not consider QoS issues QITAR, [8] Achieves QoS and intrusion tolerance for ad hoc networks -Vulnerable to high-speed mobility-May experience scalability problems MERQIT, [9] Achieves QoS and intrusion tolerance for mesh networks -Clusterheads are mobile nodes that may experience attacks and leave the network-Isolates malicious nodes WSN-TUM, [13] Fault-intrusion tolerant framework for sensor networks -Split the packet on fragments and send them on disjoint routes. However MMR networks use the same route as the routing architecture is a tree rooted at the MR-BS-Global QoS is hard to guarantee since each fragment uses a different route with different QoS constraints-All sensors participate in the securization effort.…”
Section: Research Work Characteristics Shortcomingsmentioning
confidence: 99%
See 3 more Smart Citations