{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:35:25Z","timestamp":1762004125085},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2009,1,23]],"date-time":"2009-01-23T00:00:00Z","timestamp":1232668800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s12243-008-0084-8","type":"journal-article","created":{"date-parts":[[2009,1,22]],"date-time":"2009-01-22T14:18:56Z","timestamp":1232633936000},"page":"401-413","source":"Crossref","is-referenced-by-count":7,"title":["A robust security scheme for wireless mesh enterprise networks"],"prefix":"10.1007","volume":"64","author":[{"given":"Md. Abdul","family":"Hamid","sequence":"first","affiliation":[]},{"given":"M.","family":"Abdullah-Al-Wadud","sequence":"additional","affiliation":[]},{"given":"Choong Seon","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Oksam","family":"Chae","sequence":"additional","affiliation":[]},{"given":"Sungwon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,1,23]]},"reference":[{"issue":"4","key":"84_CR1","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/j.comnet.2004.12.001","volume":"47","author":"IF Akyildiz","year":"2005","unstructured":"Akyildiz IF, Wang X, Wang W (2005) Wireless mesh networks: a survey. Comput Networks 47(4):445\u2013487","journal-title":"Comput Networks"},{"key":"84_CR2","doi-asserted-by":"crossref","unstructured":"Yang L, Zerfos P, Sadot E (2005) Architecture taxonomy for control and provisioning of wireless access points (capwap). IETF RFC 4118","DOI":"10.17487\/rfc4118"},{"key":"84_CR3","doi-asserted-by":"crossref","unstructured":"Alam SMN, Haas ZJ (2006) Coverage and connectivity in three-dimensional networks. In: MOBICOM, Los Angeles, 23\u201329 September 2006, pp 346\u2013357","DOI":"10.1145\/1161089.1161128"},{"issue":"2","key":"84_CR4","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MWC.2006.1632480","volume":"13","author":"N Ben Salem","year":"2006","unstructured":"Ben\u00a0Salem N, Hubaux JP (2006) Securing wireless mesh networks. IEEE Wirel Commun 13(2):50\u201355","journal-title":"IEEE Wirel Commun"},{"key":"84_CR5","volume-title":"Wireless LAN medium access control (MAC) and physical layer (PHY) specifications","author":"LAN\/MAN Standards Committee, ANSI\/IEEE Std 802.11","year":"1999","unstructured":"LAN\/MAN Standards Committee, ANSI\/IEEE Std 802.11 (1999) Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE Computer Society, Los Alamitos"},{"key":"84_CR6","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/1080793.1080801","volume-title":"WiSe \u201905: proceedings of the 4th ACM workshop on wireless security","author":"S Radosavac","year":"2005","unstructured":"Radosavac S, Baras JS, Koutsopoulos I (2005) A framework for mac protocol misbehavior detection in wireless networks. In: WiSe \u201905: proceedings of the 4th ACM workshop on wireless security. ACM, New York, pp 33\u201342"},{"key":"84_CR7","doi-asserted-by":"crossref","unstructured":"Cagalj M, Ganeriwal S, Aad I, Hubaux JP (2005) On selfish behavior in CSMA\/CA networks. In: INFOCOM, Miami, 13\u201317 March 2005, pp 2513\u20132524","DOI":"10.1109\/INFCOM.2005.1498536"},{"key":"84_CR8","doi-asserted-by":"crossref","unstructured":"Hamid M, Islam M, Hong CS (2008) Developing security solutions for wireless mesh enterprise networks. In: IEEE wireless communications and networking conference, 2008 (WCNC \u201908), Las Vegas, 31 March\u20133 April 2008, pp 2549\u20132554","DOI":"10.1109\/WCNC.2008.448"},{"issue":"10","key":"84_CR9","doi-asserted-by":"crossref","first-page":"1916","DOI":"10.1109\/JSAC.2006.877223","volume":"24","author":"Y Zhang","year":"2006","unstructured":"Zhang Y, Fang Y (2006) Arsa: an attack-resilient security architecture for multihop wireless mesh networks. IEEE J Sel Areas Commun 24(10):1916\u20131928","journal-title":"IEEE J Sel Areas Commun"},{"key":"84_CR10","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/1180345.1180348","volume-title":"SASN \u201906: proceedings of the fourth ACM workshop on security of ad hoc and sensor networks","author":"X Wu","year":"2006","unstructured":"Wu X, Li N (2006) Achieving privacy in mesh networks. In: SASN \u201906: proceedings of the fourth ACM workshop on security of ad hoc and sensor networks. ACM, New York, pp 13\u201322"},{"key":"84_CR11","first-page":"459","volume-title":"WOWMOM \u201906: proceedings of the 2006 international symposium on world of wireless, mobile and multimedia networks","author":"T Wu","year":"2006","unstructured":"Wu T, Xue Y, Cui Y (2006) Preserving traffic privacy in wireless mesh networks. In: WOWMOM \u201906: proceedings of the 2006 international symposium on world of wireless, mobile and multimedia networks. IEEE Computer Society, Washington, DC, pp 459\u2013461"},{"issue":"6","key":"84_CR12","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1016\/j.adhoc.2007.01.002","volume":"5","author":"P Tague","year":"2007","unstructured":"Tague P, Poovendran R (2007) Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Netw 5(6):801\u2013814","journal-title":"Ad Hoc Netw"},{"key":"84_CR13","doi-asserted-by":"crossref","unstructured":"Santhanam L, Nandiraju D, Nandiraju N, Agrawal D (2007) Active cache based defense against dos attacks in wireless mesh network. In: Wireless pervasive computing, 2007. ISWPC \u201907. 2nd international symposium, San Juan, 5\u20137 February 2007","DOI":"10.1109\/ISWPC.2007.342640"},{"key":"84_CR14","first-page":"382","volume-title":"Proceedings of advanced parallel programming technologies (APPT \u201907), vol. 4847","author":"H Li","year":"2007","unstructured":"Li H, Xu M, Li Y (2007) Selfish mac layer misbehavior detection model for the ieee 802.11-based wireless mesh networks. In: Proceedings of advanced parallel programming technologies (APPT \u201907), vol. 4847. Springer, Berlin Heidelberg New York, pp 382\u2013391"},{"key":"84_CR15","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/1352533.1352548","volume-title":"WiSec \u201908: proceedings of the first ACM conference on wireless network security","author":"J Dong","year":"2008","unstructured":"Dong J, Ackermann KE, Bavar B, Nita-Rotaru C (2008) Mitigating attacks against virtual coordinate based routing in wireless sensor networks. In: WiSec \u201908: proceedings of the first ACM conference on wireless network security. ACM, New York, pp 89\u201399"},{"key":"84_CR16","volume-title":"Concepts and applications of inferential statistics","author":"R Lowry","year":"2006","unstructured":"Lowry R (2006) Concepts and applications of inferential statistics. Vassar College, Poughkeepsie"},{"issue":"3","key":"84_CR17","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1109\/TMC.2004.23","volume":"3","author":"V Ravelomanana","year":"2004","unstructured":"Ravelomanana V (2004) Extremal properties of three-dimensional sensor networks with applications. IEEE Trans Mob Comput 3(3):246\u2013257","journal-title":"IEEE Trans Mob Comput"},{"issue":"2","key":"84_CR18","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/s11276-005-5265-z","volume":"12","author":"M Bahramgiri","year":"2006","unstructured":"Bahramgiri M, Hajiaghayi M, Mirrokni VS (2006) Fault-tolerant and 3-dimensional distributed topology control algorithms in wireless multi-hop networks. Wirel Netw 12(2):179\u2013188","journal-title":"Wirel Netw"},{"key":"84_CR19","doi-asserted-by":"crossref","first-page":"33","DOI":"10.4310\/CIS.2001.v1.n1.a3","volume":"1","author":"P Gupta","year":"2001","unstructured":"Gupta P, Kumar PR (2001) Internet in the sky: the capacity of three dimensional wireless networks. Commun Inf Syst 1:33\u201349","journal-title":"Commun Inf Syst"},{"issue":"4","key":"84_CR20","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1145\/1218556.1218561","volume":"2","author":"Q Cao","year":"2006","unstructured":"Cao Q, Abdelzaher T (2006) Scalable logical coordinates framework for routing in wireless sensor networks. ACM Trans Sen Netw 2(4):557\u2013593","journal-title":"ACM Trans Sen Netw"},{"issue":"3","key":"84_CR21","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1016\/j.adhoc.2005.01.004","volume":"3","author":"IF Akyildiz","year":"2005","unstructured":"Akyildiz IF, Pompili D, Melodia T (2005) Underwater acoustic sensor networks: research challenges. Ad Hoc Netw J (Elsevier) 3(3):257\u2013279","journal-title":"Ad Hoc Netw J (Elsevier)"},{"key":"84_CR22","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1109\/ICOIN.2001.905525","volume-title":"ICOIN \u201901: proceedings of the 15th international conference on information networking","author":"J Carle","year":"2001","unstructured":"Carle J, Myoupo JF, Sem\u00e9 D (2001) A basis for 3-D cellular networks. In: ICOIN \u201901: proceedings of the 15th international conference on information networking. IEEE Computer Society, Washington, DC, p 631"},{"key":"84_CR23","first-page":"22","volume-title":"ISPDC \u201904: proceedings of the third international symposium on parallel and distributed computing\/third international workshop on algorithms, models and tools for parallel computing on heterogeneous networks","author":"C Decayeux","year":"2004","unstructured":"Decayeux C, Seme D (2004) A new model for 3-D cellular mobile networks. In: ISPDC \u201904: proceedings of the third international symposium on parallel and distributed computing\/third international workshop on algorithms, models and tools for parallel computing on heterogeneous networks. IEEE Computer Society, Washington, DC, pp 22\u201328"},{"key":"84_CR24","unstructured":"IEEE 802.11s Task Group (2007) Draft amendment to standard for information technology telecommunications and information exchange between systems - LAN\/MAN specific requirements - Part 11: wireless medium access control (MAC) and physical layer (PHY) specifications: Amendment: ESS Mesh Networking, IEEE P802.11s\/D1.06"},{"issue":"1","key":"84_CR25","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/BF02252869","volume":"2","author":"L Gong","year":"1990","unstructured":"Gong L, Wheeler DJ (1990) A matrix key-distribution scheme. J Cryptol 2(1):51\u201359","journal-title":"J Cryptol"},{"key":"84_CR26","volume-title":"Standard for local and metropolitan area networks: port-based network access control","author":"IEEE Standard 802.1X-2004","year":"2004","unstructured":"IEEE Standard 802.1X-2004 (2004) Standard for local and metropolitan area networks: port-based network access control. IEEE, Piscataway"},{"key":"84_CR27","unstructured":"P\u0327ostel J (1981) Internet control message protocol (ICMP). RFC 792"},{"issue":"2","key":"84_CR28","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1109\/TNET.2007.892879","volume":"15","author":"SA \u00c7amtepe","year":"2007","unstructured":"\u00c7amtepe SA, Yener B (2007) Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE\/ACM Trans Netw 15(2):346\u2013358","journal-title":"IEEE\/ACM Trans Netw"},{"key":"84_CR29","unstructured":"The network simulator - ns-2 (2003). http:\/\/www.isi.edu\/nsnam\/ns\/index.html"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-008-0084-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-008-0084-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-008-0084-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T18:03:42Z","timestamp":1684865022000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-008-0084-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,1,23]]},"references-count":29,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["84"],"URL":"https:\/\/doi.org\/10.1007\/s12243-008-0084-8","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,1,23]]}}}