Random early detection gateways for congestion avoidance
IEEE/ACM Transactions on Networking (TON)
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Enhancing TCP fairness in ad hoc wireless networks using neighborhood RED
Proceedings of the 9th annual international conference on Mobile computing and networking
Secure Routing and Intrusion Detection in Ad Hoc Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Routing protocols in wireless mesh networks: challenges and design considerations
Multimedia Tools and Applications
A resource-efficient and scalable wireless mesh routing protocol
Ad Hoc Networks
Orthogonal Rendezvous Routing Protocol for Wireless Mesh Networks
ICNP '06 Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks
SUTC '08 Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008)
HOVER: hybrid on-demand distance vector routing for wireless mesh networks
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
Optimal routing for wireless mesh networks with dynamic traffic demand
Mobile Networks and Applications
A Simulation Analysis of Routing Misbehaviour in Mobile Ad Hoc Networks
NGMAST '08 Proceedings of the 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies
SRPM: Secure Routing Protocol for IEEE 802.11 Infrastructure Based Wireless Mesh Networks
Journal of Network and Systems Management
A secure intra-domain routing protocol for wireless mesh networks
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Understanding dynamic denial of service attacks in mobile ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
Surveying security analysis techniques in manet routing protocols
IEEE Communications Surveys & Tutorials
Routing security in wireless ad hoc networks
IEEE Communications Magazine
A survey on wireless mesh networks
IEEE Communications Magazine
Detecting and avoiding wormhole attacks in wireless ad hoc networks
IEEE Communications Magazine
Matrix-based pairwise key establishment for wireless mesh networks
Future Generation Computer Systems
Hi-index | 0.00 |
The large scale coverage and multi-hop architecture of wireless mesh networks (WMNs) are such characteristics which are vulnerable to network layer threats. So far many secure routing techniques have been proposed but they are only capable to handle single network layer attack. In this paper, we propose a secure route selection mechanism for WMN, which is robust against a variety of multi-hop threats and performs well over a range of scenarios we tested.