1 |
Mahmoud, M. M., Lin, X. and Shen, X. S. "Secure and reliable routing protocols for heterogeneous multihop wireless networks," IEEE Transactions on Parallel & Distributed Systems, vol. 26, no. 4, pp. 1140-1153, 2015.
DOI
|
2 |
Lin, H., Hu, J., Xu, L., Tian, Y., Liu, L. and Blakeway, S., "A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks," Computers & Electrical Engineering, vol. 64, pp. 407-419, 2017.
DOI
|
3 |
Bhanu, M. S., "A Survey of Secure Routing Protocols for Wireless Mesh Networks," International Journal of Computer Applications, vol. 97, no. 6, 2014.
|
4 |
Zapata, M. G., & Asokan, N., "Securing ad hoc routing protocols," in Proc. of the 1st ACM workshop on Wireless security, ACM, pp. 1-10, September 2002.
|
5 |
Yi, S., Naldurg, P. and Kravets, R., "A security-aware routing protocol for wireless ad Hoc networks," Urbana, 51, 61801, 2002.
|
6 |
Khan, S., & Loo, J., "Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks," Wireless Personal Communications, vol.62, no. 1, pp. 201-214, 2012.
DOI
|
7 |
Azhari, S. V., Afshari, N. and Nassiri, M, "Novel lifetime routing metric for IEEE 802.11 wireless mesh networks," International Journal of Ad Hoc and Ubiquitous Computing, vol. 28, no. 1, pp. 1-12, 2018.
DOI
|
8 |
Nanda, A., Nanda, P., He, X., Jamdagni, A. and Puthal, D., "A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks," Future Generation Computer Systems, 2018.
|
9 |
Mahmoud, M. M., Taha, S., Misic, J. and Shen, X., "Lightweight privacy-preserving and secure communication protocol for hybrid ad hoc wireless networks," IEEE Transactions on Parallel & Distributed Systems, vol. 25, no. 8, pp. 2077-2090, 2014.
DOI
|
10 |
Yu, Y., Ning, Z. and Guo, L., "A secure routing scheme based on social network analysis in wireless mesh networks," Science China Information Sciences, vol. 59, 122310, 2016.
DOI
|
11 |
Siddiqui, M. S., Amin, S. O., Kim, J. H., & Hong, C. S., "MHRP: A secure multi-path hybrid routing protocol for wireless mesh network," in Proc. of Military Communications Conference, MILCOM 2007, IEEE, pp. 1-7, October 2007.
|
12 |
Khan, S., Loo, K. K., Mast, N. and Naeem, T, "SRPM: secure routing protocol for IEEE 802.11 infrastructure based wireless mesh networks," Journal of Network and Systems Management, vol. 18, no. 2, pp. 190-209, 2010.
DOI
|
13 |
Li, C., Wang, Z. and Yang, C., "Secure Routing for Wireless Mesh Networks," IJ Network Security, vol. 13, no. 2, pp.109-120, 2011.
|
14 |
Siddiqui, M. S., "Security issues in wireless mesh networks," in Proc. of International Conference on Multimedia and Ubiquitous Engineering, MUE'07, IEEE, pp. 717-722, April, 2007.
|
15 |
Bansal, D., Sofat, S., & Singh, G., "Secure routing protocol for hybrid wireless mesh Network (HWMN)," in Proc. of International Conference on Computer and Communication Technology (ICCCT), IEEE, pp. 837-843, 2010.
|
16 |
You, Z. and Wang, Y. "An efficient and secure routing protocol for a hybrid wireless mesh network," Journal of Computational Information Systems, vol. 8, no. 21, pp. 8693-8705, 2012.
|
17 |
Yu, M. and Leung, K. K., "A trustworthiness-based QoS routing protocol for wireless ad hoc Networks," IEEE Transactions on Wireless Communications, vol. 8, no. 4, pp. 1888-1898, 2009.
DOI
|
18 |
Konwar, S., Paul, A. B., Nandi, S. and Biswas, S., "MCDM based trust model for secure routing in Wireless Mesh Networks," in Proc. of Information and Communication Technologies (WICT), 2011 World Congress, IEEE, pp. 910-915, December 2011.
|
19 |
Matam, R. and Tripathy, S, "THWMP: trust based secure routing for wireless mesh networks," in Proc. of the 2011 International Conference on Communication, Computing & Security, ACM, pp. 40-45, February 2011.
|
20 |
Hwang, R. J. and Hsiao, Y. K., "A secure and reliable routing protocol for wireless mesh networks," Journal of Shanghai Jiaotong University (Science), vol. 19, no. 4, pp. 466-475, 2014.
DOI
|
21 |
Popalyar, F. and Yaqini, A., "A trust model based on evidence-based subjective logic for Securing wireless mesh networks," in Proc. of 21st Conference on Innovation in Clouds, Internet and Networks and workshops (ICIN), IEEE, February 2018.
|
22 |
Tan, H. C., Ma, M., Labiod, H., Chong, P. H. J. and Zhang, J., "A non-biased trust model for wireless mesh networks," International Journal of Communication Systems, vol. 30, no. 9, e3200, 2017.
DOI
|
23 |
Shafer, G., "A mathematical theory of evidence," Princeton university press, vol. 42, 1976.
|
24 |
Sen, J., "Secure routing in wireless mesh networks," arXiv preprint arXiv:1102.1226, 2011.
|
25 |
Mogaibel, H. A and Othman, M., "Review of routing protocols and it's metrics for wireless mesh networks," in Proc. of 2010 Second Pacific-Asia Conference on Circuits, Communications and System, pp. 27-30, 2010.
|
26 |
Akyildiz, I. F., Wang, X. and Wang, W, "Wireless mesh networks: a survey," Computer networks, vol. 47, no. 4, pp. 445-487, 2005.
DOI
|
27 |
Waharte, S., Boutaba, R., Iraqi, Y.,and Ishibashi, B. "Routing protocols in wireless mesh networks: Challenges and design considerations," Multimedia Tools and Applications, vol. 29, no. 3, pp. 285-303, 2006.
DOI
|
28 |
Campista, M. E. M., Esposito, P. M., Moraes, I. M., Costa, L. H. M., Duarte, O. C. M., Passos, D. G., and Rubinstein, M. G., "Routing metrics and protocols for wireless mesh networks," IEEE network, vol. 22, no. 1, pp. 6-12, 2008.
DOI
|
29 |
Lin, H., Hu, J., Ma, J., Xu, L. and Nagar, A., "A role based privacy-aware secure routing protocol for wireless mesh networks". Wireless Personal Communications, vol. 75, no. 3, pp. 1611-1633, 2014.
DOI
|
30 |
Lin, H., Ma, J., Hu, J., and Yang, K., "PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11 s wireless mesh networks," EURASIP Journal on Wireless Communications and Networking, vol. 2012, p. 69, 2012.
DOI
|
31 |
Paris, S., Nita-Rotaru, C., Martignon, F. and Capone, A, "Cross-layer metrics for reliable routing in wireless mesh networks," IEEE/ACM Transactions on Networking (TON), vol. 21, no. 3, pp. 1003-1016, 2013.
DOI
|