References
- A. Acharya, A. Misra, S. Bansal, "High-penormance architectures for IF-based multihop 802.11 networks," IEEE Wireless Communications V.10(5), 2003, PP. 22-28.
- L F. Akyildiz, X. Wang, W. Wang, "Wireless mesh networks: a survey," Computer Networks V.47(4), 2005, PP. 445 - 487. https://doi.org/10.1016/j.comnet.2004.12.001
- IETF MANET WG, "Mobile Ad-hoc Networks," (http://datatracker.ietf. org/wg/manet/)
- IEEE Standard 802.11s, "Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 10: Mesh Networking," (http:// standards.ieee.org/ findstds/ standard/ 802 .11s-2011. html)
- N. B. Salem, J. Hubaux, "Securing Wireless Mesh Networks," IEEE Wireless Communications, v.13(2), 2006. pp.50-55.
- Z. Bankovic, et. al., "Improving security in WMNs with reputation systems and self-organizing maps," Elsevier, Journal of Network and Computer Applications, v.34, 2011, PP. 455-463. https://doi.org/10.1016/j.jnca.2010.03.023
- P. Gupta, P. Rawat, S. Malik, S. Gupta, "Securing WMN using Honeypot Technique," Int. Journal on computer Science and Engineering, v. 4(2), 2012. PP. 235-238.
- S. Khan, N. A. Alrajeh, K. Loo, "Secure route selection in wireless mesh networks," Elsevier, Computer Networks, v. 56, 2012, PP. 491-503. https://doi.org/10.1016/j.comnet.2011.07.005
- R. Lacuesta, J. Lloret, M. Garcia, L. Penalver, "Two secure and energy-saving spontaneous adhoc protocol for wireless mesh networks," Elsevier, Journal of Network and Computer Applications, v. 34, 2011, PP. 492-505. https://doi.org/10.1016/j.jnca.2010.03.024
- N. Kang, Y. Kim, J. Kwak, "H2O: Hierarchically Optimized Hybrid Routing Strategies for Multihop Wireless Networks," Conference Proceeding of ICOIN, 2007. PP. 771-780.
- S. Glass, M. Portmann, V. Muthukkumarasamy, "Securing Wireless Mesh Networks," IEEE Internet Computing - Special Issue on Mesh Networking, July/ August 2008, pp 30- 36.
- B. Wu, J. Chen, J. Wu, M. Cardei, "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks," Wireless/Mobile Network Security chapter 12, Springer 2006.
- 오민석, "Security Challenges and solutions in WMN," 한국정보보호학회논문지, 10권 2호, 2012년 2월
- M. Lin, S. Chem, "Security Challenges in Wireless Mesh Networks Deployment and User Authentication (EAP) Methods," Elsevier Energy Procedia v. 13, 2011, PP. 8875-8882. https://doi.org/10.1016/S1876-6102(14)00454-8
- M. S. Siddiqui, C. S. Hong, "Security Issues in Wireless Mesh Networks," IEEE Int. Com. Proceeding of MUE 2007.
- S. Glass, M. Portmann, V. Muthukkumarasamy. "Securing Wireless Mesh Networks", IEEE Internet Computing - Special Issue on Mesh Networking, July/ August 2008, pp 30- 36.