2011
DOI: 10.1016/j.jnca.2010.03.027
|View full text |Cite
|
Sign up to set email alerts
|

Wireless mesh network security: A traffic engineering management approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…Since the practical problems in all layers of WMNs are very complicated in general, previous studies often investigated simplified versions of those problems after some degree of abstraction and assumption. In order to meet practical requirements, a variety of research challenges for WMNs remain, e.g., the routing problems with different concerns [2], the assignment problems for multi-channel WMNs [10,24,25], the security problems in WMNs [20], among others.…”
Section: Introductionmentioning
confidence: 99%
“…Since the practical problems in all layers of WMNs are very complicated in general, previous studies often investigated simplified versions of those problems after some degree of abstraction and assumption. In order to meet practical requirements, a variety of research challenges for WMNs remain, e.g., the routing problems with different concerns [2], the assignment problems for multi-channel WMNs [10,24,25], the security problems in WMNs [20], among others.…”
Section: Introductionmentioning
confidence: 99%
“…We used NS-2 simulator for implementing WMN model for security [37,38] against collaborative flooding attack (DDOS). The model is adapted from the IEEE 802.11b/g based adhoc network including the mesh clients that are mobile and backbone mesh routers that are stable.…”
Section: Performance Resultsmentioning
confidence: 99%
“…The collaborative flooding DDoS attacks [42] are spread by natural distributed processing architecture of the network. It normally floods the mesh clients and the intermediate mesh routers using hierarchal control points [37] to congest the WMN traffic communication. Collaborative flooding DDoS attacks exploits the huge resource asymmetry between the internet and the victim.…”
Section: Introductionmentioning
confidence: 99%
“…A wireless video network can be a structure composed of point to multipoint, multilevel relay, point to point network. For safety performance in the transmission channel, MAC address filtering and 128-bit WEP/WPA/WPA2/dual-layer isolation are used, end-user's connection with a wireless device is limited to protect the safety of video channels [9]. Multipolarized antenna design, antenna power, and wireless network management make it possible for video communication and flexible networking over more than 10 kilometers through software control.…”
Section: Monitor Front Endmentioning
confidence: 99%