2010
DOI: 10.1007/s11277-010-0048-y
|View full text |Cite
|
Sign up to set email alerts
|

Cross Layer Secure and Resource-Aware On-Demand Routing Protocol for Hybrid Wireless Mesh Networks

Abstract: Secure routing is one of the challenges offered by hybrid wireless mesh networks (WMNs). Researcher are implementing different approaches for mesh routing, but still need more efforts in terms of security, efficiency, deployment and capability with different scenarios and applications. Cross layer secure and resource-aware on demand routing (CSROR) protocol for hybrid WMN is designed to ensure routing security and fulfil different applications specific requirements for multimedia delivery and real-time transmi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
34
0
2

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 28 publications
(36 citation statements)
references
References 23 publications
0
34
0
2
Order By: Relevance
“…However, PEACE only secures the network from external attacks and takes for granted that every internal node is cooperative and trustworthy. In [13], Khan et al. presented a cross-layer secure and resource-aware on demand routing protocol (CSROR).…”
Section: Related Workmentioning
confidence: 99%
“…However, PEACE only secures the network from external attacks and takes for granted that every internal node is cooperative and trustworthy. In [13], Khan et al. presented a cross-layer secure and resource-aware on demand routing protocol (CSROR).…”
Section: Related Workmentioning
confidence: 99%
“…When node "e" receives packet count from cluster head which matches to its own packet count, it means node "d" is not malicious and all the packets are successfully relayed through node "d. " Our mechanism is per session basis contrary to the per packet bases mechanism proposed in [9]. e proposed security model can counter many kinds of active attacks such as blackhole, greyhole, and wormhole [1,8,9]. Blackhole is a compromised node and if it is located as intermediate node between source and destination, it is used to drop all the packets passing through it.…”
Section: Security Mechanismmentioning
confidence: 99%
“…e cluster head will send a packet count of 300 to node "e, " which means that cluster head successfully received 300 packets. When node "e" receives packet count from cluster head which matches to its own packet count, it means node "d" is not malicious and all the packets are successfully relayed through node "d. " Our mechanism is per session basis contrary to the per packet bases mechanism proposed in [9]. e proposed security model can counter many kinds of active attacks such as blackhole, greyhole, and wormhole [1,8,9].…”
Section: Security Mechanismmentioning
confidence: 99%
See 1 more Smart Citation
“…Reactive: the jammer attacks only when another radio attempts to use the channel.Several solutions to cope with these attacks have been proposed in the literature [12]. All of them are mainly based on ad hoc networks that have more energy and processing capacities, like routing algorithms [13]. Thus, to overcome these problems, WSNs need specific protection mechanism that detect and reacts to make attacks more complicated [14].…”
mentioning
confidence: 99%