Privacy preserved and secured reliable routing protocol for wireless mesh networks

N Thandava Meganathan… - The Scientific World …, 2015 - Wiley Online Library
Privacy preservation and security provision against internal attacks in wireless mesh
networks (WMNs) are more demanding than in wired networks due to the open nature and …

Privacy preserving protocol for secure routing in wireless mesh networks

G Akilarasu, SM Shalinie - International Journal of Mobile …, 2018 - inderscienceonline.com
In wireless mesh networks (WMN), there are possibilities of lossy links, security attacks and
privacy attacks. In order to overcome these issues, in this paper, we propose a privacy …

Trust based authentication and key establishment for secure routing in WMN

G Akilarasu, SM Shalinie - KSII Transactions on Internet and …, 2014 - koreascience.kr
Abstract In Wireless Mesh Networks (WMN), an authentication technique can be
compromised due to the distributed network architecture, the broadcast nature of the …

Game theoretic analysis of jamming attack in wireless mesh network with delay tolerance

S Benromarn, P Komolkiti… - … Computer Science and …, 2013 - ieeexplore.ieee.org
This paper proposes a framework for studying the impact of a smart attacker in a wireless
mesh network that is used to provide delay-tolerant internet connectivity. Non-cooperative …

Privacy based optimal routing in wireless mesh networks

TM Navamani, P Yogesh - ICT and Critical Infrastructure: Proceedings of …, 2014 - Springer
User privacy and security have been primary concerns in Wireless Mesh Networks (WMNs)
due to their peer-to-peer network topology, shared wireless medium and highly dynamic …