Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Intrusion detection techniques for mobile wireless networks
Wireless Networks
A framework for misuse detection in ad hoc Networks-part I
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
This paper examines wireless mesh network use in small businesses as well as large organizations and how they are compromised. This paper uses an evaluation approach to understanding how organizations protect their wireless mesh networks and how incident response, disaster recovery and business continuity plans are affected as a result. As network architectures continue to change, the use of wireless mesh networks are growing. Network monitoring and incident handling polices mechanisms are important and effective deterrents to computer abuse when they are actively enforced when using wireless mesh networks. This paper provides valuable considerations in developing a complete security policy when using wireless mesh networks in organizations.