Survey on sybil attack defense mechanisms in wireless ad hoc networks
A Vasudeva, M Sood - Journal of Network and Computer Applications, 2018 - Elsevier
Wireless ad hoc networks are vulnerable to Sybil attacks due to the broadcast nature of the
wireless medium and an absence of central authority. In a Sybil attack, an adversary …
wireless medium and an absence of central authority. In a Sybil attack, an adversary …
PASER: Secure and efficient routing approach for airborne mesh networks
M Sbeiti, N Goddemeier, D Behnke… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Low-altitude unmanned aerial vehicles (UAVs) combined with WLAN mesh networks
(WMNs) have facilitated the emergence of airborne network-assisted applications. In …
(WMNs) have facilitated the emergence of airborne network-assisted applications. In …
Security and privacy issues in wireless mesh networks: A survey
J Sen - Wireless networks and security: issues, challenges and …, 2013 - Springer
This chapter presents a detailed survey on various aspects on security and privacy issues in
Wireless Mesh Networks. The chapter is written both for the general readers as well as for …
Wireless Mesh Networks. The chapter is written both for the general readers as well as for …
[PDF][PDF] Security concerns with open research issues of present computer network
Present networks are the mainstay of modern communication. The existence of networks is
enriching our society in countless different ways. Now days, wireless mesh network is …
enriching our society in countless different ways. Now days, wireless mesh network is …
[PDF][PDF] Designing interference-robust wireless mesh networks using a defender-attacker-defender model
PJ Nicholas, DL Alderson - Naval Postgraduate School, Tech. Rep., 2015 - core.ac.uk
Wireless mesh networks (WMNs) are interconnected systems of wireless access points
(APs) that provide untethered network connectivity for a group of users who require data …
(APs) that provide untethered network connectivity for a group of users who require data …
MCDM based trust model for secure routing in Wireless Mesh Networks
Wireless Mesh Networks (WMNs) do not rely on any centralized administration and they are
built by the connection of various static and mobile entities (ie nodes). The cooperation and …
built by the connection of various static and mobile entities (ie nodes). The cooperation and …
[PDF][PDF] An overview of contemporary security problems in wireless mesh networks
M Sudhakar, V Khare - IOSR Journal of Electronics and …, 2015 - academia.edu
Wireless mesh network (WMN) is a new wireless networking concept. Unlike traditional
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an …
wireless networks, Wireless Mesh Networks do not rely on any fixed communications. As an …
[PDF][PDF] Trusted M-OLSR for Secure Routing in Wireless Mesh Networks.
Wireless Mesh Networks (WMNs) do not rely on any centralized administration and they are
built by the connection of various static and mobile entities (ie nodes). The cooperation and …
built by the connection of various static and mobile entities (ie nodes). The cooperation and …
Secured and fast handoff in wireless mesh networks
F Zarai, I Daly, MS Obaidat… - Security and …, 2013 - Wiley Online Library
Wireless mesh networks are one of the most important improvements in the world of wireless
technologies. In fact, they offer many advantages to ensure a free mobility and a self …
technologies. In fact, they offer many advantages to ensure a free mobility and a self …
[PDF][PDF] Reliable and trust-based forwarder selection for a class of multi-hop networks
AB Paul - 2019 - iitg.ac.in
Over the past years, a decentralized wireless network technology called Mobile Ad hoc
Networks (MANETs) have received a great deal of attention and popularity for its …
Networks (MANETs) have received a great deal of attention and popularity for its …