Sciweavers

1463 search results - page 8 / 293
» Securing Wireless Mesh Networks
Sort
View
JNW
2008
97views more  JNW 2008»
13 years 7 months ago
Secure Multicast in WiMAX
Abstract-- Multicast enables efficient large-scale content distribution and has become more and more popular in network service. Security is a critical issue for multicast because ...
Sen Xu, Chin-Tser Huang, Manton M. Matthews
CONEXT
2007
ACM
13 years 11 months ago
A cross-layer load-independent link cost metric for wireless mesh networks
We present Cross-layer Unicast Transmission Time (X-UTT), a MAC-aware load-independent link cost metric for 802.11based wireless mesh networks. X-UTT utilizes information acquired...
Marianna Carrera, Henrik Lundgren, Theodoros Salon...
TWC
2008
154views more  TWC 2008»
13 years 7 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
ISCC
2008
IEEE
254views Communications» more  ISCC 2008»
14 years 2 months ago
Mesh Topology Viewer (MTV): an SVG-based interactive mesh network topology visualization tool
—This paper discusses wireless mesh network topology visualization tools and their requirements. It presents an interactive tool for visualizing mesh network topologies. The prop...
Rafael De T. Valle, Diego G. Passos, Célio ...
WIMOB
2007
IEEE
14 years 2 months ago
Routing Packets into Wireless Mesh Networks
— Wireless mesh networks are a promising way to provide Internet access to fixed and mobile wireless devices. In mesh networks, traffic between mesh nodes and the Internet is r...
Rainer Baumann, Simon Heimlicher, Vincent Lenders,...