SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
A Low-Energy Key Management Protocol for Wireless Sensor Networks
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
Report on a working session on security in wireless ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
Relay-based deployment concepts for wireless and mobile broadband radio
IEEE Communications Magazine
A survey on wireless mesh networks
IEEE Communications Magazine
Hi-index | 0.00 |
Wireless LAN systems have been deployed for wireless internet services for hot spots, home, or offices. Recently, WLAN-Based Mesh Networking is developed with the benefit of easy deployment and easy configuration. Due to the characteristic of distributed environment, Wireless Mesh Networks(WMNs) need a new authentication scheme which allows multi-hop communication. In this paper, we propose a distributed authentication method which significantly eases the management burden and reduces the storage space on mesh points, thus enables the secure and easy deployment of WMNs.