Please use this identifier to cite or link to this item: https://idr.nitk.ac.in/jspui/handle/123456789/6747
Full metadata record
DC FieldValueLanguage
dc.contributor.authorReddy, K.G.-
dc.contributor.authorSanthi Thilagam, P.-
dc.date.accessioned2020-03-30T09:46:04Z-
dc.date.available2020-03-30T09:46:04Z-
dc.date.issued2012-
dc.identifier.citationAdvances in Intelligent and Soft Computing, 2012, Vol.167 AISC, VOL. 2, pp.927-935en_US
dc.identifier.urihttps://idr.nitk.ac.in/jspui/handle/123456789/6747-
dc.description.abstractWireless Mesh Networks (WMNs) have emerging application because of its ad-hoc features, high internet bandwidth capability, and interoperable with various networks. However, all features of WMNs vulnerable due to their inadequate security services, and most of the existing techniques protect WMNs only.from single adversary node, but these techniques are failed to protect against multiple colluding attacks, and also have same reputation value for all types of attacks. To overcome these problems for future solutions, we have done clear analytical survey on network layer attacks. Eventually, we have come up with taxonomy of network layer attack. � 2012 Springer-Verlag GmbH.en_US
dc.titleTaxonomy of network layer attacks in wireless mesh networken_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
File Description SizeFormat 
6747.pdf397.01 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.