Implementation and comparison of M2M protocols for Internet of Things

P Thota, Y Kim - 2016 4th Intl Conf on Applied Computing and …, 2016 - ieeexplore.ieee.org
The backbone of Internet of Things (IoT) is the communication protocols which seamlessly
integrate thousands of nodes and enable a light weight data transfer process. This research …

[HTML][HTML] A security analysis of the 802.11 s wireless mesh network routing protocol and its secure routing protocols

WK Tan, SG Lee, JH Lam, SM Yoo - Sensors, 2013 - mdpi.com
Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate
sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless …

Security framework for hybrid wireless mesh protocol in wireless mesh networks

M Avula - 2014 - louis.uah.edu
Abstract Wireless Mesh Networks (WMNs) are emerging as a promising and convenient next-
generation wireless network technology. A typical WMN consists of wireless mesh routers …

A new method to secure RA-OLSR using IBE

J Ben-Othman, YIS Benitez - 2012 IEEE Global …, 2012 - ieeexplore.ieee.org
In this paper, we propose a security schema for the Radio Aware Optimized Link State
Routing (RA-OLSR) protocol. We consider the security vulnerabilities for RA-OLSR and …

Performance evaluation of security mechanisms in RAOLSR protocol for wireless mesh networks

YIS Benitez, J Ben-Othman… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
In this paper, we have proposed the IBE-RAOLSR and ECDSA-RAOLSR protocols for
WMNs (Wireless Mesh Networks), which contributes to security routing protocols. We have …

Performance comparison between IBE‐HWMP and ECDSA‐HWMP

YI Saavedra Benitez, J Ben‐othman… - Security and …, 2013 - Wiley Online Library
Wireless mesh networks (WMNs) are one of the key technologies that will dominate wireless
networking in the few years. The main characteristics of WMNs permit network connectivity …

Applicability of crypto-based security approaches in tactical wireless multi-hop networks

N Aschenbruck, E Gerhards-Padilla… - 37th Annual IEEE …, 2012 - ieeexplore.ieee.org
Security is one of the core challenges especially for wireless multi-hop networks in public
safety scenarios. Sensitive data is transmitted via insecure links. Furthermore, there may be …