Sciweavers

365 search results - page 45 / 73
» Secure Routing in Wireless Mesh Networks
Sort
View
ICC
2007
IEEE
14 years 3 months ago
RARE - Resource Aware Routing for mEsh
— An important element of any routing protocol used for Wireless Mesh Networks (WMNs) is the link cost function used to represent the radio link characteristic. The majority of t...
Karol Kowalik, Brian Keegan, Mark Davis
GLOBECOM
2006
IEEE
14 years 3 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
IJSN
2008
90views more  IJSN 2008»
13 years 9 months ago
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
: In the paper, we propose an efficient two-factor localised authentication scheme for inter-domain handover and roaming in IEEE 802.11 based service-oriented wireless mesh network...
Xiaodong Lin, Xinhua Ling, Haojin Zhu, Pin-Han Ho,...
ICNP
2007
IEEE
14 years 3 months ago
Identifying High Throughput Paths in 802.11 Mesh Networks: a Model-based Approach
Abstract— We address the problem of identifying high throughput paths in 802.11 wireless mesh networks. We introduce an analytical model that accurately captures the 802.11 MAC p...
Theodoros Salonidis, Michele Garetto, A. Saha, Edw...
JNW
2008
97views more  JNW 2008»
13 years 9 months ago
Secure Multicast in WiMAX
Abstract-- Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because ...
Sen Xu, Chin-Tser Huang, Manton M. Matthews