A pay-and-stay model for tackling intruders in hybrid wireless mesh networks
Intrusion handling in Wireless Mesh Networks (WMNs) is a relatively less addressed topic. The difficulty may lie in the fact that there are other wireless networks for which some intrusion detection or prevention schemes (IDS or IPS) are proposed that could also be applied in some way in a WMN setti...
| Main Authors: | Pathan, Al-Sakib Khan, Abduallah, Wafaa Mustafa, Khanam, Shapla, Saleem, Habibullah Yusuf |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
SAGE Publications, USA
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/26316/ http://irep.iium.edu.my/26316/1/INTRU_HWMN_CAMERA.pdf |
Similar Items
Tackling Intruders in Wireless Mesh Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
An efficient detection model of selective forwarding attacks in wireless mesh networks
by: Khanam, Shapla, et al.
Published: (2012)
by: Khanam, Shapla, et al.
Published: (2012)
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
A new data hiding technique based on irreducible polynomials
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Reversible data hiding scheme based on 3-Least significant bits and mix column transform
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Data hiding within color images based on MCT with x-or operations
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2014)
A scalable routing protocol for hybrid wireless mesh networks
by: Mahmod, Zainab Senan, et al.
Published: (2012)
by: Mahmod, Zainab Senan, et al.
Published: (2012)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Adaptive Concurrent Transmission Protocol for
Wireless Mesh Network
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Evaluation and analysis of an enhanced hybrid wireless mesh protocol for vehicular adhoc network
by: Eltahir, Amal A., et al.
Published: (2016)
by: Eltahir, Amal A., et al.
Published: (2016)
Adaptive Concurrent Medium Access Control for Wireless Mesh Network
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
by: Ibrahim, Mohd Sufiz, et al.
Published: (2010)
Denial of service in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Intruder detection in camera networks using the one-class neighbor machine
by: Ahmed, Tarem Ozair, et al.
Published: (2011)
by: Ahmed, Tarem Ozair, et al.
Published: (2011)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Intruder detection
by: Muhamad Haffiz, Muhamad Adlin
Published: (2013)
by: Muhamad Haffiz, Muhamad Adlin
Published: (2013)
Implementation and performance analysis of wireless Ad-hoc Mesh networks
by: Mok, Thomas Shao Chung
Published: (2024)
by: Mok, Thomas Shao Chung
Published: (2024)
Algorithm for enhancing the QoS of video traffic over wireless mesh networks
by: A. Moh, Abdul Nasser, et al.
Published: (2019)
by: A. Moh, Abdul Nasser, et al.
Published: (2019)
Enhanced multicast routing protocol for wireless mesh networks (WMN)
by: Anwar, Farhat
Published: (2011)
by: Anwar, Farhat
Published: (2011)
On the issues and challenges of Fiber-Wireless (Fi-Wi) networks
by: Win, Harry Tin, et al.
Published: (2013)
by: Win, Harry Tin, et al.
Published: (2013)
Introduction to wireless sensor network security
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
On the key revocation schemes in wireless sensor networks
by: Mall, Dieynaba, et al.
Published: (2013)
by: Mall, Dieynaba, et al.
Published: (2013)
Performance analysis of on-demand routing protocols in wireless mesh networks
by: Rahman, Md. Arafatur, et al.
Published: (2009)
by: Rahman, Md. Arafatur, et al.
Published: (2009)
Multicasting challenges in wireless mesh networks
by: Sanni, Mistura L., et al.
Published: (2011)
by: Sanni, Mistura L., et al.
Published: (2011)
Hypergraph-based resource allocation in wireless mesh networks
by: Abbas, Bashar Khudhair
Published: (2017)
by: Abbas, Bashar Khudhair
Published: (2017)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Security wireless sensor networks: prospects, challenges, and future
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Modeling and Performance Analysis of Throughput-Received Power Relationship for Indoor Wireless Mesh Network
by: Zakaria, Mohd Sharim, et al.
Published: (2010)
by: Zakaria, Mohd Sharim, et al.
Published: (2010)
Experimental Analysis on Available Bandwidth Estimation Tools for Wireless Mesh Network
by: Imran Edzereiq, Kamarudin, et al.
Published: (2015)
by: Imran Edzereiq, Kamarudin, et al.
Published: (2015)
Automated surveillance in distributed, wireless visual networks: a comparative study
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Energy-efficient secure routing in heavily deployed wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Intruder localization wireless sensor network radar design with virtual reference tags
by: Abdullah, Hadi
Published: (2014)
by: Abdullah, Hadi
Published: (2014)
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
An experimental research on GPS based boundary intruding boat monitoring system
by: Puviarasi, R., et al.
Published: (2019)
by: Puviarasi, R., et al.
Published: (2019)
Strengths and weaknesses of prominent data dissemination techniques in wireless sensor networks
by: Guerroumi, Mohamed, et al.
Published: (2013)
by: Guerroumi, Mohamed, et al.
Published: (2013)
Similar Items
-
Tackling Intruders in Wireless Mesh Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2013) -
An efficient detection model of selective forwarding attacks in wireless mesh networks
by: Khanam, Shapla, et al.
Published: (2012) -
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014) -
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012) -
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012)