2017
DOI: 10.1007/s10586-017-0970-9
|View full text |Cite
|
Sign up to set email alerts
|

A security architecture for attacks detection and authentication in wireless mesh networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Praveen et al presented an authentication security architecture to protect the cloned AP from internal attackers. The new joining access point (AP) broadcasts the MAC details as a request message in this process [16,17]. Consequently, the gateway node checks these details in the existing database after receiving this request.…”
Section: Related Workmentioning
confidence: 99%
“…Praveen et al presented an authentication security architecture to protect the cloned AP from internal attackers. The new joining access point (AP) broadcasts the MAC details as a request message in this process [16,17]. Consequently, the gateway node checks these details in the existing database after receiving this request.…”
Section: Related Workmentioning
confidence: 99%
“…The simulation results demonstrate that the proposed technique increases the packet delivery ratio and reduces the packet drop rate in the presence of DoS attacks. In [54], the authors proposed a security architecture to cope with the detection of network attacks and their authentication for wireless mesh networks. Based on the trusted routers, the proposed architecture offers security and identifies cloned AP and internal attacks.…”
Section: Background Studymentioning
confidence: 99%
“…Table 1 illustrates the default network factors used in the experimental results and analysis. The proposed scheme is verified with security architecture for attack detection and authentication [54], and wormhole-free routing DoS attack defense [53] solutions. The experimental results of the proposed scheme with existing solutions are discussed based on a varying number of malicious and wireless mesh nodes.…”
Section: B Secure and Trusted Data Routing Between Mesh Devicesmentioning
confidence: 99%