Distributed intrusion detection system in a multi-layer network architecture of smart grids

Y Zhang, L Wang, W Sun, RC Green II… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
The advent of the smart grid promises to usher in an era that will bring intelligence,
efficiency, and optimality to the power grid. Most of these changes will occur as an Internet …

Architecture, issues and challenges of wireless mesh network

SY Shahdad, A Sabahath… - … on Communication and …, 2016 - ieeexplore.ieee.org
Wireless Mesh Network has the ability to provide broadband access dynamically to anyone
anywhere in the world by setting up nodes in the network. It provides the wide scale …

[PDF][PDF] Black-hole and wormhole attack in routing protocol AODV in MANET

AA Bhosle, TP Thosar, S Mehatre - International Journal of Computer …, 2012 - Citeseer
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically
via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or …

Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid

Y Zhang, L Wang, W Sun, RC Green… - 2011 IEEE Power and …, 2011 - ieeexplore.ieee.org
The advent of the smart grid promises to usher in an era that will bring intelligence,
efficiency, and optimality to the power grid. Most of these changes will occur as an Internet …

Wormhole-free routing and DoS attack defense in wireless mesh networks

G Akilarasu, SM Shalinie - Wireless Networks, 2017 - Springer
Owing to the growth in several applications, Wireless Mesh Networks (WMN) is emerging as
a vital technology for future wireless networks. Wormhole attack is one of the major security …

[PDF][PDF] A survey on wireless mesh networks, routing metrics and protocols

SD Odabası, AH Zaım - International Journal of Electronics …, 2010 - dergipark.org.tr
Today, Internet has become an indispensable part of our daily lives. It has a growing user
community in many fields from banking transactions to online entertainment. It will be very …

On securing HWMP using IBC

J Ben-Othman, YIS Benitez - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
In this paper, we propose a security mechanisms for the Hybrid-Wireless-Mesh Protocol
(HWMP). Our mechanisms is based on the Identity Based Crytography. The motivation …

An Interference-Aware Channel Assignment Scheme for Wireless Mesh Networks.

D Yiltas-Kaplan… - Adhoc & Sensor …, 2016 - search.ebscohost.com
Mesh network will become an additional access technology instead of being a renewed
technology in the next generation networks which are called Fourth Generation. The most …

[PDF][PDF] Securing WMN Using Hybrid Honeypot System

P Rawat, S Goel, M Agarwal, R Singh - International Journal of …, 2012 - academia.edu
ABSTRACT Wireless Mesh Network (WMN) has been a field of active research in the recent
years. Lot of research has focused various routing mechanism but very little effort has been …

[PDF][PDF] An Efficient Key Management Scheme with Key Agreement to Mitigate Malicious Attacks for Wireless Mesh Network

VH Kalmani, SSK Alias, RM Jogadand… - International Journal of …, 2012 - academia.edu
In the recent times the IT industry has been witnessing rapid development in wireless
communication technologies such as 3 G, 4 G, etc. Wireless Mesh Network is one such …