2006
DOI: 10.1109/glocom.2006.300
|View full text |Cite
|
Sign up to set email alerts
|

NIS07-5: Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(40 citation statements)
references
References 6 publications
0
40
0
Order By: Relevance
“…Recently, three new misbehavior scenarios have appeared in the literature, namely the NEPA (Network Endo-Parasite Attack), CEPA (Channel Ecto-Parasite Attack) and LORA (Low-cost Rippleeffect Attack) attacks [62]. They pose a threat to the operation of modern mesh networks, but can also be executed against DSA schemes.…”
Section: Identity Theft/multiple Identitiesmentioning
confidence: 99%
“…Recently, three new misbehavior scenarios have appeared in the literature, namely the NEPA (Network Endo-Parasite Attack), CEPA (Channel Ecto-Parasite Attack) and LORA (Low-cost Rippleeffect Attack) attacks [62]. They pose a threat to the operation of modern mesh networks, but can also be executed against DSA schemes.…”
Section: Identity Theft/multiple Identitiesmentioning
confidence: 99%
“…The security issue in multi-channel multi-radio WMNs has been studied in [5,9]. In [9], Naveed et al identify vulnerabilities in channel assignment algorithms and briefly suggest possible solutions.…”
Section: Related Workmentioning
confidence: 99%
“…We say that a solution only satisfying (9) and (10) is fractional since some of its components may be non-integral. The algorithm PIPAGE takes a BP and a fractional x as its input and outputs a new fractional solution x .…”
Section: Deterministic Rounding Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The primary concern of any security solution for DSR should be to satisfy security standards, mainly, Integrity, Authentication, Confidentiality and non-repudiation [6], [15] and [24]. To achieve these standards, the designed security solution must safeguard against attacks possible at each layer.…”
Section: Security Challengesmentioning
confidence: 99%