1 |
M.Jayanthi and .M.A.Mukunthan, "A Security Architecture for Implementing Anonymity and Traceability in Wireless Mesh Network using Clustering Concept," International Journal of Soft Computing and Engineering (IJSCE), vol. 1, Issue-ETIC-2011, January, 2012.
|
2 |
Celia Li, Zhuang Wang, and Cungang Yang, "Secure Routing for Wireless Mesh Networks," International Journal of Network Security, vol. 13, no. 2, pp. 109-120, Sept, 2011.
|
3 |
Francesco Oliviero and Simon Pietro Romano, "A Reputation-based Metric for Secure Routing in Wireless Mesh Networks," IEEE GLOBECOM, 2008.
|
4 |
Shams Qazi, Yi Mu and Willy Susilo, "Securing Wireless Mesh Networks with Ticket-Based Authentication," in Proc. of 2nd International Conference on Signal Processing and Communication Systems, 2008.
|
5 |
Tianhan Gao, Nan Guo and Kangbin Yim, "Delegation-based Mutual Authentication Scheme for Multi-operator Wireless Mesh Network," in Proc. of Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012.
|
6 |
Bing He and Dharma P. Agrawal, "An Identity-based Authentication and Key Establishment Scheme for Multi-operator Maintained Wireless Mesh Networks," in Proc. of 7th International Conference on Mobile Adhoc and Sensor Systems (MASS), 2010.
|
7 |
Chen Dajun, Wang Chao and Lin Qiang, "Ant-Based Trusted Routing Algorithm for Wireless Mesh Networks," in Proc. of Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics, 2009.
|
8 |
Ramya R, Navamani T.M and Yogesh, "Secured Identity Based Routing and Privacy Preservation in Wireless Mesh Networks," IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011.
|
9 |
Tianhan Gao, Nan Guo, Kangbin Yim and Qingshan Li, "Anonymity Scheme with Unlink ability Property in Wireless Mesh Networks," in Proc. of Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013.
|
10 |
Xin Zhao, Yuqin Lv, Tet Hin Yeap and Bin Hou, "A Novel Authentication and Key Agreement Scheme for Wireless Mesh Networks," in Proc. of Fifth International Joint Conference on INC, IMS and IDC, 2009.
|
11 |
Farah Kandah, Yashaswi Singh and Weiyi Zhang, "Mitigating Eavesdropping Attack Using Secure Key Management Scheme in Wireless Mesh Networks," Journal of Communications, vol. 7, no.8, 2012.
|
12 |
Jaydip Sen, "Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks," Applied Cryptography and Network Security.
|
13 |
Jaydip Sen, "Efficient Routing Anomaly Detection in Wireless Mesh Networks," in Proc. of First International Conference on Integrated Intelligent Computing, 978-0-7695-4152-5/10 $26.00 IEEE, 2010.
|
14 |
Network Simulator: http:///www.isi.edu/nsnam/ns
|