The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless networking is the preferred method for establishing new computer networks, more and more organizations and users are switching over to wireless communication because of its benefits such as flexibility and portability, increased productivity and low installation cost over wired networks. Therefore there are a growing number of regulatory requirements for the security of confidential data,...
We investigate the risk associated with multihop wireless communications due to eavesdropping. When the same message traverses cross a multihop wireless network, potential security leaks may occur because of intelligent and collaborative eavesdroppers even if all individual links from source to destination have signal leakage below a security threshold. We termed this phenomenon ??cumulative security...
Mobile ad-hoc network (MANET) is an appealing technology that has attracted lots of research efforts. Due to frequent communication failures, multipath routing is preferred than single-path routing in many applications such as multimedia streaming over MANET as the former can provide robustness, load balancing and reduce end-to-end delay. However, a security remains important factor that hinders the...
Wireless Mesh Network (WMN) is an emerging technology that has developed a lot these years. WMN has the feather of self-organization, distributed structure. The main topological characteristic of WMN is that there are only one or several node connecting to the infrastructure network as gateway and all other nodes connect to the gateway through the relay of the neighboring nodes, and then connect with...
A wireless mesh network (WMN) comprises of mesh access points (MAPs), mesh routers and mesh clients (MCs), where MAPs are almost static and form the back-bone of WMNs. MCs are wireless devices and dynamic in nature, communicating among themselves over possibly multi-hop paths, with or without the help of MAPs. Security has been a primary concern in order to provide protected communication in WMNs...
The continuous growth of wireless networks calls for more and more sophisticated solutions for their security. In particular, mechanisms for limiting effects of routing protocol attacks are becoming a mandatory requirement: black-hole and gray-hole attacks can in fact seriously compromise the performance of a critical infrastructure like a Wireless Mesh Network. In this paper we present a new routing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.