A Secure Key Management Model for Wireless Mesh Networks
dc.contributor.author | Gao, Li | |
dc.contributor.author | Chang, Elizabeth | |
dc.contributor.author | Parvin, Sazia | |
dc.contributor.author | Han, Song | |
dc.contributor.author | Dillon, Tharam | |
dc.contributor.editor | Wenny Rahayu | |
dc.contributor.editor | Fatos Xhafa | |
dc.contributor.editor | Mieso Denko | |
dc.date.accessioned | 2017-01-30T14:04:34Z | |
dc.date.available | 2017-01-30T14:04:34Z | |
dc.date.created | 2011-03-02T20:01:31Z | |
dc.date.issued | 2010 | |
dc.identifier.citation | Gao, Li and Chang, E. and Parvin, S. and Han, Song and Dillon, T. 2010. A Secure Key Management Model for Wireless Mesh Networks, in Rahayu, W. and Xhafa, F. and Denko, M. (ed), IEEE 24th International Conference on Advanced Information Networking and Applications (AINA 2010), Apr 20 2010, pp. 655-660. Perth, WA: IEEE. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/37583 | |
dc.identifier.doi | 10.1109/AINA.2010.110 | |
dc.description.abstract |
As Wireless Mesh Networks (WMNs) are newly emerging wireless technologies, they are designed to have huge potential for strengthening Internet deployment and access. However, they are far from muture for large-scale deployment in some applications due to the lack of the satisfactory guarantees on security. The main challenges exposed to the security of WMNs come from the facts of the shared nature of the wireless architecture and the lack of globally trusted central authorities. A well-performed security framework for WMNs will contribute to network survivability and strongly support the network growth. A low-computational and scalable key management model for WMNs is proposed in this paper which aims to guarantee well-performed key management services and protection from potential attacks. | |
dc.publisher | IEEE Computer Society | |
dc.subject | key management | |
dc.subject | security | |
dc.subject | Wireless Mesh Networks | |
dc.title | A Secure Key Management Model for Wireless Mesh Networks | |
dc.type | Conference Paper | |
dcterms.source.startPage | 655 | |
dcterms.source.endPage | 660 | |
dcterms.source.title | Proceedings of the IEEE 24th international conference on advanced information networking and applications (AINA 2010) | |
dcterms.source.series | Proceedings of the IEEE 24th international conference on advanced information networking and applications (AINA 2010) | |
dcterms.source.isbn | 9781424466955 | |
dcterms.source.conference | IEEE 24th International Conference on Advanced Information Networking and Applications (AINA 2010) | |
dcterms.source.conference-start-date | Apr 20 2010 | |
dcterms.source.conferencelocation | Perth, Australia | |
dcterms.source.place | Australia | |
curtin.note |
Copyright © 2010 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. | |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.accessStatus | Open access |