2012
DOI: 10.1186/1687-1499-2012-69
|View full text |Cite
|
Sign up to set email alerts
|

PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks

Abstract: Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless networks and provide a low-cost and convenient solution to the last-mile problem. Security and privacy issues are of paramount importance to WMNs for their wide deployment and for supporting service-oriented applications. Moreover, to support real-time services, WMNs must also be equipped with secure, reliable, and efficient routing protocols. Therefore, a number of research studies have been devoted to privacy-preservi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(28 citation statements)
references
References 17 publications
0
28
0
Order By: Relevance
“…Lin et al [14] proposed a Privacy-Aware Secure Hybrid Wireless Mesh Protocol (PA-SHWMP) to defend against inside attacks in WMNs, and later [15] proposed a role based secure routing protocol. Compared with these previous work [14,15], this paper offers original and important contributions by 1) taking into account energy consumption in the routing process; 2) considering HWMNs that is more practical and exposed to attacks than WMNs; 3) optimal route selection and route maintenance; 4) malicious node classification and management.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Lin et al [14] proposed a Privacy-Aware Secure Hybrid Wireless Mesh Protocol (PA-SHWMP) to defend against inside attacks in WMNs, and later [15] proposed a role based secure routing protocol. Compared with these previous work [14,15], this paper offers original and important contributions by 1) taking into account energy consumption in the routing process; 2) considering HWMNs that is more practical and exposed to attacks than WMNs; 3) optimal route selection and route maintenance; 4) malicious node classification and management.…”
Section: Related Workmentioning
confidence: 99%
“…Compared with these previous work [14,15], this paper offers original and important contributions by 1) taking into account energy consumption in the routing process; 2) considering HWMNs that is more practical and exposed to attacks than WMNs; 3) optimal route selection and route maintenance; 4) malicious node classification and management.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, a novel dynamic cross-layer reputation computation model named CRM is extended from our previous work [17][18]. CRM couples uncertainty based reputation computation models [11] [ [19][20][21] with the cross-layer design [13] [14] and multi-level security technology [15].…”
Section: Cross-layer Dynamic Reputation Computation Modelmentioning
confidence: 99%
“…Improve the existing or introduce new highperformance algorithms and protocols to cope with security issues in WMNs. Although some recent studies, such as [65] focus on internal attacks due to compromised nodes, the necessity of introducing more efficient algorithms is inevitable. 7.…”
Section: Remaining Issues and Future Workmentioning
confidence: 99%