Skip to main content
Erschienen in: International Journal of Information Security 1/2015

01.02.2015 | Regular contribution

Routing management for performance and security tradeoff in wireless mesh networks

verfasst von: Helber Silva, Aldri Santos, Michele Nogueira

Erschienen in: International Journal of Information Security | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless mesh networks (WMNs) support multimedia applications that claim for high level of security and performance simultaneously. However, wireless medium and multihop communication allow the action of attackers that can violate data packets or compromise the routing service, reducing performance and quality of service (QoS) of applications. Even in normal conditions of the network, without the presence of attackers, interferences in the shared wireless medium reduce the overall performance of paths. Such aspects require the development of new routing management approaches to address security and performance together. In this work, we integrate a path selection scheme, called CRoss-layer and Adaptive path selection scheme for Balancing performance and security on WMN data routing (CRAB), in the routing service to improve performance and security of multimedia applications, even in face of attacks. Novel results from scenarios under different data traffic patterns representative from multimedia applications show that the CRAB scheme yields a better tradeoff between network performance and security, even when the network is under routing attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz, I., Wang, X.: A survey on wireless mesh networks. IEEE Commun. Mag. 43(9), 23–30 (2005)CrossRef Akyildiz, I., Wang, X.: A survey on wireless mesh networks. IEEE Commun. Mag. 43(9), 23–30 (2005)CrossRef
2.
Zurück zum Zitat Akyildiz, I., Wang, X.: Cross-layer design in wireless mesh networks. IEEE Trans. Veh. Technol. 57(2), 1061–1076 (2008)CrossRef Akyildiz, I., Wang, X.: Cross-layer design in wireless mesh networks. IEEE Trans. Veh. Technol. 57(2), 1061–1076 (2008)CrossRef
3.
Zurück zum Zitat Arce, I.: The weakest link revisited. IEEE Secur. Priv. 1(2), 72–76 (2003)CrossRef Arce, I.: The weakest link revisited. IEEE Secur. Priv. 1(2), 72–76 (2003)CrossRef
4.
Zurück zum Zitat Athreya, A., Tague, P.: Towards secure multi-path routing for wireless mobile ad-hoc networks: a cross-layer strategy. IEEE Sens. Mesh Ad Hoc Commun. Netw. 146–148 (2011) Athreya, A., Tague, P.: Towards secure multi-path routing for wireless mobile ad-hoc networks: a cross-layer strategy. IEEE Sens. Mesh Ad Hoc Commun. Netw. 146–148 (2011)
5.
Zurück zum Zitat Benayoun, R., Roy, B., Sussman, N.: Manual de reference du programme electre. Note De Synthese et Formaton 25 (1966) Benayoun, R., Roy, B., Sussman, N.: Manual de reference du programme electre. Note De Synthese et Formaton 25 (1966)
6.
Zurück zum Zitat Bhandari, V., Vaidya, N.H.: Channel and interface management in a heterogeneous multi-channel multi-radio wireless network. Technical report, UIUC, Illinois, USA (2009) Bhandari, V., Vaidya, N.H.: Channel and interface management in a heterogeneous multi-channel multi-radio wireless network. Technical report, UIUC, Illinois, USA (2009)
7.
Zurück zum Zitat Borges, V., Curado, M., Monteiro, E.: Cross-layer routing metrics for mesh networks: current status and research directions. Comput. Commun. 34(6), 681–703 (2011)CrossRef Borges, V., Curado, M., Monteiro, E.: Cross-layer routing metrics for mesh networks: current status and research directions. Comput. Commun. 34(6), 681–703 (2011)CrossRef
8.
Zurück zum Zitat Camp, J., Robinson, J., Steger, C., Knightly, E.: Measurement driven deployment of a two-tier urban mesh access network. In: International Conference on Mobile Systems, Applications and Services, pp. 96–109 (2006) Camp, J., Robinson, J., Steger, C., Knightly, E.: Measurement driven deployment of a two-tier urban mesh access network. In: International Conference on Mobile Systems, Applications and Services, pp. 96–109 (2006)
9.
Zurück zum Zitat Chakraborty, S., Yeh, C.H.: Comparative study of normalization procedures in multiattribute decision making. In: International Conference on Artificial Intelligence, Knowledge Engineering and Data, Bases, pp. 102–109 (2007) Chakraborty, S., Yeh, C.H.: Comparative study of normalization procedures in multiattribute decision making. In: International Conference on Artificial Intelligence, Knowledge Engineering and Data, Bases, pp. 102–109 (2007)
10.
Zurück zum Zitat Cheng, L., Das, S., Chen, C., Ma, J., Wang, W.: Robust forwarding for reactive routing protocols in wireless ad hoc networks with unreliable links. In: IEEE International Conference on Communications, pp. 1–6 (2011) Cheng, L., Das, S., Chen, C., Ma, J., Wang, W.: Robust forwarding for reactive routing protocols in wireless ad hoc networks with unreliable links. In: IEEE International Conference on Communications, pp. 1–6 (2011)
11.
Zurück zum Zitat Couto, D.D., Aguayo, D., Bicket, J., Morris, R.: A high-throughput path metric for multi-hop wireless routing. In: ACM International Conference on Mobile Computing and Networking, pp. 134–146 (2003) Couto, D.D., Aguayo, D., Bicket, J., Morris, R.: A high-throughput path metric for multi-hop wireless routing. In: ACM International Conference on Mobile Computing and Networking, pp. 134–146 (2003)
12.
Zurück zum Zitat Dai, L., Xue, Y., Chang, B., Cao, Y., Cui, Y.: Integrating traffic estimation and routing optimization for multi-radio multi-channel wireless mesh networks. In: IEEE International Conference on Computer Communications, pp. 71–75 (2008) Dai, L., Xue, Y., Chang, B., Cao, Y., Cui, Y.: Integrating traffic estimation and routing optimization for multi-radio multi-channel wireless mesh networks. In: IEEE International Conference on Computer Communications, pp. 71–75 (2008)
13.
Zurück zum Zitat Despotovic, Z., Aberer, K.: P2P reputation management: probabilistic estimation vs. social networks. Comput. Netw. 50(4), 485–500 (2006)CrossRefMATH Despotovic, Z., Aberer, K.: P2P reputation management: probabilistic estimation vs. social networks. Comput. Netw. 50(4), 485–500 (2006)CrossRefMATH
14.
Zurück zum Zitat Draves, R., Padhye, J., Zill, B.: Routing in multi-radio, multi-hop wireless mesh networks. In: ACM International Conference on Mobile Computing and Networking, pp. 114–128 (2004) Draves, R., Padhye, J., Zill, B.: Routing in multi-radio, multi-hop wireless mesh networks. In: ACM International Conference on Mobile Computing and Networking, pp. 114–128 (2004)
15.
Zurück zum Zitat Ellison, R., Fisher, D., Linger, R., Lipson, H., Longstaff, T., Mead, N.: Survivable network systems: an emerging discipline — CMU/SEI-97-TR-013. Carnegie Mellon University, Pittsburgh, PA, Technical report, Software Engineering Institute (1997) Ellison, R., Fisher, D., Linger, R., Lipson, H., Longstaff, T., Mead, N.: Survivable network systems: an emerging discipline — CMU/SEI-97-TR-013. Carnegie Mellon University, Pittsburgh, PA, Technical report, Software Engineering Institute (1997)
16.
Zurück zum Zitat Glass, S., Portmann, M., Muthukkumarasamy, V.: Securing wireless mesh networks. IEEE Internet Comput. 12(4), 30–36 (2008)CrossRef Glass, S., Portmann, M., Muthukkumarasamy, V.: Securing wireless mesh networks. IEEE Internet Comput. 12(4), 30–36 (2008)CrossRef
17.
Zurück zum Zitat Guan, Q., Yu, R., Jiang, S., Leung, V.: Joint topology control and authentication design in mobile ad hoc networks with cooperative communications. IEEE Trans. Veh. Technol. 61(6), 2674–2685 (2012) Guan, Q., Yu, R., Jiang, S., Leung, V.: Joint topology control and authentication design in mobile ad hoc networks with cooperative communications. IEEE Trans. Veh. Technol. 61(6), 2674–2685 (2012)
18.
Zurück zum Zitat Guo, T., Cai, J., Foh, C.H., Zhang, Y.: Improving videophone transmission over multi-rate IEEE 802.11e networks. In: IEEE International Conference on Communications, pp. 3258–3262 (2008) Guo, T., Cai, J., Foh, C.H., Zhang, Y.: Improving videophone transmission over multi-rate IEEE 802.11e networks. In: IEEE International Conference on Communications, pp. 3258–3262 (2008)
19.
Zurück zum Zitat Heckerman, D., Mamdani, A., Wellman, M.P.: Real-world applications of Bayesian networks. Commun. ACM 38(3), 24–26 (1995)CrossRef Heckerman, D., Mamdani, A., Wellman, M.P.: Real-world applications of Bayesian networks. Commun. ACM 38(3), 24–26 (1995)CrossRef
20.
Zurück zum Zitat Heegaard, P., Trivedi, K.: Network survivability modeling. Comput. Netw. 53, 1215–1234 (2009)CrossRefMATH Heegaard, P., Trivedi, K.: Network survivability modeling. Comput. Netw. 53, 1215–1234 (2009)CrossRefMATH
21.
Zurück zum Zitat Incel, O., Dulman, S., Jansen, P., Mullender, S.: Multi-channel interference measurements for wireless sensor networks. In: IEEE Conference on Local, Computer Networks, pp. 694–701 (2006) Incel, O., Dulman, S., Jansen, P., Mullender, S.: Multi-channel interference measurements for wireless sensor networks. In: IEEE Conference on Local, Computer Networks, pp. 694–701 (2006)
22.
Zurück zum Zitat Jardosh, A., Ramachandran, K., Almeroth, K., Belding-Royer, E.: Understanding congestion in IEEE 802.11b wireless networks. In: Internet Measurement Conference, pp. 279–292 (2005) Jardosh, A., Ramachandran, K., Almeroth, K., Belding-Royer, E.: Understanding congestion in IEEE 802.11b wireless networks. In: Internet Measurement Conference, pp. 279–292 (2005)
23.
Zurück zum Zitat Jeffreys, H.: Theory of Probability, 3rd edn. Clarendon, Oxford (1983)MATH Jeffreys, H.: Theory of Probability, 3rd edn. Clarendon, Oxford (1983)MATH
24.
Zurück zum Zitat Jeng, A.A.K., Jan, R.H., Li, C.Y., Chen, C.: Release-time-based multi-channel mac protocol for wireless mesh networks. Comput. Commun. 55(3), 2176–2195 (2012) Jeng, A.A.K., Jan, R.H., Li, C.Y., Chen, C.: Release-time-based multi-channel mac protocol for wireless mesh networks. Comput. Commun. 55(3), 2176–2195 (2012)
25.
Zurück zum Zitat Khan, S., Alrajeh, N., Loo, K.K.: Secure route selection in wireless mesh networks. Comput. Netw. 56(2), 491–503 (2012)CrossRef Khan, S., Alrajeh, N., Loo, K.K.: Secure route selection in wireless mesh networks. Comput. Netw. 56(2), 491–503 (2012)CrossRef
26.
Zurück zum Zitat Li, F., Bucciol, P., Vandoni, L., Fragoulis, N., Zanoli, S., Leschiutta, L., Lzaro, O.: Broadband internet access via multi-hop wireless mesh networks: design, protocol and experiments. Wirel. Pers. Commun. 58(4), 807–829 (2011)CrossRef Li, F., Bucciol, P., Vandoni, L., Fragoulis, N., Zanoli, S., Leschiutta, L., Lzaro, O.: Broadband internet access via multi-hop wireless mesh networks: design, protocol and experiments. Wirel. Pers. Commun. 58(4), 807–829 (2011)CrossRef
27.
Zurück zum Zitat Lin, X., Rasool, S.: Distributed and provably efficient algorithms for joint channel-assignment, scheduling, and routing in multichannel ad hoc wireless networks. IEEE/ACM Trans. Netw. 17(6), 1874–1887 (2009)CrossRef Lin, X., Rasool, S.: Distributed and provably efficient algorithms for joint channel-assignment, scheduling, and routing in multichannel ad hoc wireless networks. IEEE/ACM Trans. Netw. 17(6), 1874–1887 (2009)CrossRef
28.
Zurück zum Zitat Liu, P., Tao, Z., Lin, Z., Erkip, E., Panwar, S.: Cooperative wireless communications: a cross-layer approach. IEEE Wirel. Commun. 13(4), 84–92 (2006)CrossRef Liu, P., Tao, Z., Lin, Z., Erkip, E., Panwar, S.: Cooperative wireless communications: a cross-layer approach. IEEE Wirel. Commun. 13(4), 84–92 (2006)CrossRef
29.
Zurück zum Zitat Lou, W., Liu, W., Zhang, Y.: Performance optimization using multipath routing in mobile ad hoc and wireless sensor networks. Comb. Optim. Commun. Netw. 18(1), 117–146 (2006)MathSciNet Lou, W., Liu, W., Zhang, Y.: Performance optimization using multipath routing in mobile ad hoc and wireless sensor networks. Comb. Optim. Commun. Netw. 18(1), 117–146 (2006)MathSciNet
30.
Zurück zum Zitat Mahmoud, M.E., Shen, X.: An integrated stimulation and punishment mechanism for thwarting packet dropping attack in multihop wireless networks. IEEE Trans. Veh. Technol. 60(8), 3947–3962 (2011)CrossRef Mahmoud, M.E., Shen, X.: An integrated stimulation and punishment mechanism for thwarting packet dropping attack in multihop wireless networks. IEEE Trans. Veh. Technol. 60(8), 3947–3962 (2011)CrossRef
31.
Zurück zum Zitat Malakooti, B., Thomas, I., K.Tanguturi, S., Gajurel, S., Kim, H., Bhasin, K.: Multiple criteria network routing with simulation results. Industrial Engineering Research Conference (2006) Malakooti, B., Thomas, I., K.Tanguturi, S., Gajurel, S., Kim, H., Bhasin, K.: Multiple criteria network routing with simulation results. Industrial Engineering Research Conference (2006)
32.
Zurück zum Zitat Mathur, S., Reznik, A., Ye, C., Mukherjee, R., Rahman, A., Shah, Y., Trappe, W., Mandayam, N.: Exploiting the physical layer for enhanced security. Wirel. Commun. 17, 63–70 (2010)CrossRef Mathur, S., Reznik, A., Ye, C., Mukherjee, R., Rahman, A., Shah, Y., Trappe, W., Mandayam, N.: Exploiting the physical layer for enhanced security. Wirel. Commun. 17, 63–70 (2010)CrossRef
33.
Zurück zum Zitat Matrawy, A., Lambadaris, L., Huang, C.: MPEG4 traffic modeling using the transform expand sample methodology. In: IEEE International Workshop on Networked Appliances, pp. 249–256 (2002) Matrawy, A., Lambadaris, L., Huang, C.: MPEG4 traffic modeling using the transform expand sample methodology. In: IEEE International Workshop on Networked Appliances, pp. 249–256 (2002)
34.
Zurück zum Zitat Nogueira, M., Silva, H., Santos, A., Pujolle, G.: A security management architecture for supporting routing services on WANETs. IEEE Trans. Netw. Serv. Manag. 9(2), 156–168 (2012)CrossRef Nogueira, M., Silva, H., Santos, A., Pujolle, G.: A security management architecture for supporting routing services on WANETs. IEEE Trans. Netw. Serv. Manag. 9(2), 156–168 (2012)CrossRef
35.
Zurück zum Zitat Nosratinia, A., Hunter, T., Hedayat, A.: Cooperative communication in wireless networks. IEEE Commun. Mag. 42(10), 74–80 (2004)CrossRef Nosratinia, A., Hunter, T., Hedayat, A.: Cooperative communication in wireless networks. IEEE Commun. Mag. 42(10), 74–80 (2004)CrossRef
36.
Zurück zum Zitat Oliveira, T., Mahadevan, S., Agrawal, D.: Handling network uncertainty in heterogeneous wireless networks. In: IEEE INFOCOM, pp. 2390–2398 (2011) Oliveira, T., Mahadevan, S., Agrawal, D.: Handling network uncertainty in heterogeneous wireless networks. In: IEEE INFOCOM, pp. 2390–2398 (2011)
37.
Zurück zum Zitat Paris, S., Nita-Rotaru, C., Martignon, F., Capone, A.: EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants. In: IEEE International Conference on Computer Communications, pp. 576–580 (2011) Paris, S., Nita-Rotaru, C., Martignon, F., Capone, A.: EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants. In: IEEE International Conference on Computer Communications, pp. 576–580 (2011)
38.
Zurück zum Zitat Perron, E., Diggavi, S., Telatar, E.: On cooperative wireless network secrecy. In: IEEE International Conference on Computer Communications, pp. 1935–1943 (2009) Perron, E., Diggavi, S., Telatar, E.: On cooperative wireless network secrecy. In: IEEE International Conference on Computer Communications, pp. 1935–1943 (2009)
39.
Zurück zum Zitat Pirzada, A., McDonald, C.: Trust establishment in pure ad-hoc networks. Wirel. Pers. Commun. 37(1–2), 139–168 (2006)CrossRef Pirzada, A., McDonald, C.: Trust establishment in pure ad-hoc networks. Wirel. Pers. Commun. 37(1–2), 139–168 (2006)CrossRef
40.
Zurück zum Zitat Royer, E., Melliar-Smithy, P., Moser, L.: An analysis of the optimum node density for ad hoc mobile networks. In: IEEE International Conference on Communications, pp. 857–861 (2001) Royer, E., Melliar-Smithy, P., Moser, L.: An analysis of the optimum node density for ad hoc mobile networks. In: IEEE International Conference on Communications, pp. 857–861 (2001)
41.
Zurück zum Zitat Saaty, T.: The Analytic Hierarchy Process. McGraw Hill, New York (1980)MATH Saaty, T.: The Analytic Hierarchy Process. McGraw Hill, New York (1980)MATH
42.
Zurück zum Zitat Seth, S., Gankotiya, A.: Denial of service attacks and detection methods in wireless mesh networks. In: International Test Conference, pp. 238–240 (2010) Seth, S., Gankotiya, A.: Denial of service attacks and detection methods in wireless mesh networks. In: International Test Conference, pp. 238–240 (2010)
43.
Zurück zum Zitat Shabdanov, S., Mitran, P., Rosenberg, C.: Cross-layer optimization using advanced physical layer techniques in wireless mesh networks. IEEE Trans. Wirel. Commun. 11(4), 1622–1631 (2012)CrossRef Shabdanov, S., Mitran, P., Rosenberg, C.: Cross-layer optimization using advanced physical layer techniques in wireless mesh networks. IEEE Trans. Wirel. Commun. 11(4), 1622–1631 (2012)CrossRef
44.
Zurück zum Zitat Shihab, E., Cai, L., Wan, F., Gulliver, A., Tin, N.: Wireless mesh networks for in-home IPTV distribution. IEEE Netw. 22(1), 52–57 (2008)CrossRef Shihab, E., Cai, L., Wan, F., Gulliver, A., Tin, N.: Wireless mesh networks for in-home IPTV distribution. IEEE Netw. 22(1), 52–57 (2008)CrossRef
45.
Zurück zum Zitat Shila, D.M., Cheng, Y., Anjali, T.: Capacity of cooperative wireless networks using multiple channels. In: IEEE International Conference on Communications, pp. 1–5 (2010) Shila, D.M., Cheng, Y., Anjali, T.: Capacity of cooperative wireless networks using multiple channels. In: IEEE International Conference on Communications, pp. 1–5 (2010)
46.
Zurück zum Zitat Silva, H., Lima, M., Filho, R., Santos, A.: A cross-layer and adaptive scheme for balancing performance and security on WMN data routing. In: IEEE Global Communications Conference, pp. 1–5 (2010) Silva, H., Lima, M., Filho, R., Santos, A.: A cross-layer and adaptive scheme for balancing performance and security on WMN data routing. In: IEEE Global Communications Conference, pp. 1–5 (2010)
47.
Zurück zum Zitat Ulukus, S., Ekrem, E.: Cooperative secrecy in wireless communications. In: Liu, R., Trappe, W. (eds.) Securing Wireless Communications at the Physical Layer, pp. 143–172. Springer, US (2010) Ulukus, S., Ekrem, E.: Cooperative secrecy in wireless communications. In: Liu, R., Trappe, W. (eds.) Securing Wireless Communications at the Physical Layer, pp. 143–172. Springer, US (2010)
48.
Zurück zum Zitat Wang, Z., Chen, Y., Li, C.: CORMAN: A novel cooperative opportunistic routing scheme in mobile ad hoc networks. IEEE J. Sel. Areas Commun. 30(2), 289–296 (2012)CrossRef Wang, Z., Chen, Y., Li, C.: CORMAN: A novel cooperative opportunistic routing scheme in mobile ad hoc networks. IEEE J. Sel. Areas Commun. 30(2), 289–296 (2012)CrossRef
49.
Zurück zum Zitat Wang, Z., Crowcroft, J.: Quality-of-service routing for supporting multimedia applications. IEEE J. 0 Sel. Areas Commun. 14(7), 1228–1234 (1996) Wang, Z., Crowcroft, J.: Quality-of-service routing for supporting multimedia applications. IEEE J. 0 Sel. Areas Commun. 14(7), 1228–1234 (1996)
50.
Zurück zum Zitat Xing, K., Srinivasan, S., Rivera, J., Li, J., Cheng, X.: Attacks and countermeasures in sensor networks: a survey. In. Network Security, pp. 251–272 (2005) Xing, K., Srinivasan, S., Rivera, J., Li, J., Cheng, X.: Attacks and countermeasures in sensor networks: a survey. In. Network Security, pp. 251–272 (2005)
51.
Zurück zum Zitat Yang, S., Yeo, C.K., Lee, B.S.: Toward reliable data delivery for highly dynamic mobile ad hoc networks. IEEE Trans. Mob. Comput. 1(1), 111–124 (2012)CrossRef Yang, S., Yeo, C.K., Lee, B.S.: Toward reliable data delivery for highly dynamic mobile ad hoc networks. IEEE Trans. Mob. Comput. 1(1), 111–124 (2012)CrossRef
52.
Zurück zum Zitat Yi, P., Tong, T., Liu, N., Wu, Y., Ma, J.: Security in wireless mesh networks: challenges and solutions. In: International Conference on Information Technology: New, Generations, pp. 423–428 (2009) Yi, P., Tong, T., Liu, N., Wu, Y., Ma, J.: Security in wireless mesh networks: challenges and solutions. In: International Conference on Information Technology: New, Generations, pp. 423–428 (2009)
53.
Zurück zum Zitat Zhang, Q., Zhang, Y.Q.: Cross-layer design for QoS support in multihop wireless networks. Proc. IEEE 96(1), 64–76 (2008)CrossRef Zhang, Q., Zhang, Y.Q.: Cross-layer design for QoS support in multihop wireless networks. Proc. IEEE 96(1), 64–76 (2008)CrossRef
54.
Zurück zum Zitat Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing mobile ad hoc networks with certificateless public keys. IEEE Trans. Dependable Secur. Comput. 3(4), 386–399 (2006)CrossRef Zhang, Y., Liu, W., Lou, W., Fang, Y.: Securing mobile ad hoc networks with certificateless public keys. IEEE Trans. Dependable Secur. Comput. 3(4), 386–399 (2006)CrossRef
55.
Zurück zum Zitat Zhao, Z., Hu, H., Ahn, G.J., Wu, R.: Risk-aware mitigation for MANET routing attacks. IEEE Trans. Dependable Secur. Comput. 9(2), 250–260 (2012)CrossRef Zhao, Z., Hu, H., Ahn, G.J., Wu, R.: Risk-aware mitigation for MANET routing attacks. IEEE Trans. Dependable Secur. Comput. 9(2), 250–260 (2012)CrossRef
56.
Zurück zum Zitat Zhaoa, J., Hassaneina, H., Wub, J., Gub, G.: End-to-end QoS routing framework for differentiated services networks. Comput. Commun. 26(6), 566–578 (2003)CrossRef Zhaoa, J., Hassaneina, H., Wub, J., Gub, G.: End-to-end QoS routing framework for differentiated services networks. Comput. Commun. 26(6), 566–578 (2003)CrossRef
Metadaten
Titel
Routing management for performance and security tradeoff in wireless mesh networks
verfasst von
Helber Silva
Aldri Santos
Michele Nogueira
Publikationsdatum
01.02.2015
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 1/2015
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-014-0246-9

Weitere Artikel der Ausgabe 1/2015

International Journal of Information Security 1/2015 Zur Ausgabe