Please use this identifier to cite or link to this item:
http://idr.nitk.ac.in/jspui/handle/123456789/6747
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Reddy, K.G. | - |
dc.contributor.author | Santhi Thilagam, P. | - |
dc.date.accessioned | 2020-03-30T09:46:04Z | - |
dc.date.available | 2020-03-30T09:46:04Z | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | Advances in Intelligent and Soft Computing, 2012, Vol.167 AISC, VOL. 2, pp.927-935 | en_US |
dc.identifier.uri | https://idr.nitk.ac.in/jspui/handle/123456789/6747 | - |
dc.description.abstract | Wireless Mesh Networks (WMNs) have emerging application because of its ad-hoc features, high internet bandwidth capability, and interoperable with various networks. However, all features of WMNs vulnerable due to their inadequate security services, and most of the existing techniques protect WMNs only.from single adversary node, but these techniques are failed to protect against multiple colluding attacks, and also have same reputation value for all types of attacks. To overcome these problems for future solutions, we have done clear analytical survey on network layer attacks. Eventually, we have come up with taxonomy of network layer attack. � 2012 Springer-Verlag GmbH. | en_US |
dc.title | Taxonomy of network layer attacks in wireless mesh network | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.