A Secure Key Management Model for Wireless Mesh Networks
As Wireless Mesh Networks (WMNs) are newly emerging wireless technologies, they are designed to have huge potential for strengthening Internet deployment and access. However, they are far from muture for large-scale deployment in some applications due to the lack of the satisfactory guarantees on se...
| Main Authors: | Gao, Li, Chang, Elizabeth, Parvin, Sazia, Han, Song, Dillon, Tharam |
|---|---|
| Other Authors: | Wenny Rahayu |
| Format: | Conference Paper |
| Published: |
IEEE Computer Society
2010
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/37583 |
Similar Items
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010)
by: Tian, Biming, et al.
Published: (2010)
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Key management for wireless sensor network security
by: Tian, Biming
Published: (2011)
by: Tian, Biming
Published: (2011)
A novel spatial TDMA scheduler for concurrent transmit/receive wireless mesh networks
by: Chin, Kwan-wu, et al.
Published: (2010)
by: Chin, Kwan-wu, et al.
Published: (2010)
Towards enhanced key management in multi-phase ZigBee network architecture
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Enhancing quality of service in Multi-Radio Multi-Channel Wireless Mesh Networks
by: Raja Bongsu, Raja Hasyifah
Published: (2023)
by: Raja Bongsu, Raja Hasyifah
Published: (2023)
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
Wireless Multimedia Sensor Networks Applications and Security Challenges
by: Harjito, Bambang, et al.
Published: (2010)
by: Harjito, Bambang, et al.
Published: (2010)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
A Distributed Maximal Link Scheduler for Multi Tx/Rx Wireless Mesh Networks
by: Wang, H., et al.
Published: (2015)
by: Wang, H., et al.
Published: (2015)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
On Improving Capacity and Delay in Multi Tx/Rx Wireless Mesh Networks with Weighted Links
by: Loo, H., et al.
Published: (2013)
by: Loo, H., et al.
Published: (2013)
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
An architecture framework for enhanced wireless sensor network security
by: Radmand, Pedram
Published: (2012)
by: Radmand, Pedram
Published: (2012)
Novel joint routing and scheduling algorithms for minimizing end-to-end delays in multi Tx-Rx wireless mesh networks
by: Wang, L., et al.
Published: (2015)
by: Wang, L., et al.
Published: (2015)
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Secure Communication in Wireless Multimedia Sensor Networks using Watermarking
by: Harjito, Bambang, et al.
Published: (2010)
by: Harjito, Bambang, et al.
Published: (2010)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Secure geographic forwarding protocols for wireless sensor networks
by: Adnan, Ali Idarous
Published: (2017)
by: Adnan, Ali Idarous
Published: (2017)
Hypergraph-based resource allocation in wireless mesh networks
by: Abbas, Bashar Khudhair
Published: (2017)
by: Abbas, Bashar Khudhair
Published: (2017)
Trust Based Security for Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
by: Abdullah, Muhammad Daniel Hafiz
Published: (2018)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
by: Malekzadeh, Mina
Published: (2011)
by: Malekzadeh, Mina
Published: (2011)
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Wireless sensor nodes deployment using multi-robot based on improved spanning tree algorithm
by: Arezoumand, Reza
Published: (2015)
by: Arezoumand, Reza
Published: (2015)
An efficient self-healing key distribution scheme
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Minimising coverage holes for prediction-based mobile object target tracking in wireless sensor networks
by: Ali, Khalid Abdullahi
Published: (2017)
by: Ali, Khalid Abdullahi
Published: (2017)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
Cognitive radio network security: A survey
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Search algorithms for path planning problems in harsh wireless sensor network environment
by: Hong, Siaw Swin
Published: (2017)
by: Hong, Siaw Swin
Published: (2017)
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
by: Qadawi, Zahraa D.A.
Published: (2013)
by: Qadawi, Zahraa D.A.
Published: (2013)
Efficient construction of wireless personal area networks for disaster control
by: Yasunobu, S., et al.
Published: (2012)
by: Yasunobu, S., et al.
Published: (2012)
Efficient node cooperation stimulation mechanism in wireless multihop networks
by: Samian, Normalia
Published: (2017)
by: Samian, Normalia
Published: (2017)
Alternative discrete variable protocol for point to point Quantum Key Distribution system
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
by: Ahmad Ghazali, Lizal Iswady
Published: (2012)
An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2008)
by: Malekzadeh, Mina, et al.
Published: (2008)
Totally opportunistic routing algorithm for underwater wireless sensor network
by: Rahman, Ziaur
Published: (2019)
by: Rahman, Ziaur
Published: (2019)
Similar Items
-
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010) -
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
by: Tian, Biming, et al.
Published: (2011) -
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005) -
Key management for wireless sensor network security
by: Tian, Biming
Published: (2011) -
A novel spatial TDMA scheduler for concurrent transmit/receive wireless mesh networks
by: Chin, Kwan-wu, et al.
Published: (2010)