VPN scalability over high performance backbones Evaluating MPLS VPN against traditional approaches
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Overview of IEEE 802.16 Security
IEEE Security and Privacy
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
IEEE Pervasive Computing
Selection of an EAP authentication method for a WLAN
International Journal of Information and Computer Security
MRP: Wireless mesh networks routing protocol
Computer Communications
Loop-free traffic engineering with path protection in MPLS VPNs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Multi-hop delay performance in wireless mesh networks
Mobile Networks and Applications
On performance analysis of challenge/response based authentication in wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Understanding dynamic denial of service attacks in mobile ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Securing wireless mesh networks
IEEE Wireless Communications
Profile-based routing and traffic engineering
Computer Communications
Mesh networks: commodity multihop ad hoc networks
IEEE Communications Magazine
Information Sciences: an International Journal
Journal of Network and Computer Applications
Hi-index | 0.00 |
The wireless mesh network (WMN) is an emerging multihop, heterogeneous, easily scalable and low cost network. The architecture of the WMN is a connectionless-oriented, mobile and dynamic traffic of routed packets. The mesh infrastructure environment easily forms multiple chains of wireless LANs (WLAN) coupled with the simultaneous multihop transmission of data packets from peripherals via mobile gateways to the wireless cloud. WMN operates as an access network to other communication technologies. This exposes the WMN to numerous security challenges not only in the mesh transmission operation security but also in the overall security against foreign attacks. We surveyed and identified the security vulnerabilities in Internet Protocol (IP) broadband networks, the security challenges in the routing layer of the WMN and explored new concepts to solving security challenges in WMN using traffic engineering (TE) security resolution mechanisms. We analyzed the advantages, comparative strengths and weakness in the use of traffic engineering based on simulation results and evaluations.