PASER: Secure and efficient routing approach for airborne mesh networks

M Sbeiti, N Goddemeier, D Behnke… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Low-altitude unmanned aerial vehicles (UAVs) combined with WLAN mesh networks
(WMNs) have facilitated the emergence of airborne network-assisted applications. In …

Mechanism for co-ordinated authentication key transition for IS-IS protocol

US Chunduri, W Lu, AC Lindem III - US Patent 8,995,667, 2015 - Google Patents
An automated key transition method is executed by a node in a network. The network
includes a set of nodes utilizing a current key identifier provided by a group key …

Secure receiver access control for IP multicast at the network level: Design and validation

B Li, JW Atwood - Computer Networks, 2016 - Elsevier
The classical service model of IP multicast is open; anyone can receive multicast data. When
using this model, it is impossible to ensure that receivers are authorized to receive the data …

RPsec: Managing routing protocol security

N Prajapati, JW Atwood - 2016 IEEE Canadian Conference on …, 2016 - ieeexplore.ieee.org
The Internet routing infrastructure is an obvious target of attack, as compromised routers can
be used to stage large scale attacks. While considerable progress has been made on …

A security framework for routing protocols

N Prajapati - 2014 - spectrum.library.concordia.ca
With the rise in internet traffic surveillance and monitoring activities, the routing infrastructure
has become an obvious target of attack as compromised routers can be used to stage large …

RFC 6606: Problem statement and requirements for IPv6 over low-power wireless personal area network (6LoWPAN) routing

E Kim, D Kaspar, C Gomez, C Bormann - 2012 - dl.acm.org
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) are formed by devices
that are compatible with the IEEE 802.15. 4 standard. However, neither the IEEE 802.15. 4 …

Enhancement of security and performance in wireless mesh networks using multi-key generation

K Parvathy, M Karthigha - 2017 International conference of …, 2017 - ieeexplore.ieee.org
A Wireless Mesh Network consists of large number of mesh nodes. The message called
Position-Aware and Secure Efficient Mesh Routing which has been sent from one node to …

Mechanism for co-ordinated authentication key transition for IS-IS protocol

US Chunduri, W Lu, AC Lindem III - US Patent 9,479,484, 2016 - Google Patents
An automated key transition method is executed by a node in a network. The network
includes a set of nodes utilizing a current key identifier. A key identifier specifies an …

Design and Validation of Automated Authentication, Key and Adjacency Management for Routing Protocols

R Bangalore Somanatha - 2012 - spectrum.library.concordia.ca
To build secure network-based systems, it is important to ensure the authenticity and
integrity of the inter-router control message exchanges. Authenticating neighbors and …

[PDF][PDF] Network Working Group M. Bhatia Internet-Draft Alcatel-Lucent Intended status: Informational D. Zhang Expires: April 21, 2013 Huawei Technologies co., LTD.

M Jethanandani - 2012 - Citeseer
Network Working Group M. Bhatia Internet-Draft Alcatel-Lucent Intended status:
Informational D. Zhang Expires: April Page 1 Network Working Group M. Bhatia Internet-Draft …