Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network

@article{Alanazi2016AnalysisOD,
  title={Analysis of Denial of Service Impact on Data Routing in Mobile eHealth Wireless Mesh Network},
  author={Shaker Alanazi and Kashif Saleem and Jalal Al-Muhtadi and Abdelouahid Derhab},
  journal={Mobile Information Systems},
  year={2016},
  volume={2016},
  pages={4853924:1-4853924:19}
}
Wireless mesh networks (WMNs) are a promising technology that has emerged with the combination of several wireless networks. These wireless networks and devices communicate in amesh networkmanner, to provide edge-to-edge, easy, and cost-effective data communication. Many current and future promising applications depend on WMN and one of the most important applications is eHealthcare, where the confidential information transfers with the help of WMN. WMN devices communicate over a wireless… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-2 OF 2 CITATIONS

Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform

  • 2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN Workshops)
  • 2016
VIEW 1 EXCERPT
CITES METHODS

Survey on cybersecurity issues in wireless mesh networks based eHealthcare

  • 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)
  • 2016
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 36 REFERENCES

WRSR: wormhole-resistant secure routing for wireless mesh networks

  • EURASIP J. Wireless Comm. and Networking
  • 2013
VIEW 9 EXCERPTS
HIGHLY INFLUENTIAL

An efficient and secure routing protocol for a hybrid wireless mesh network

Z. You, Y. Wang
  • Journal of Computational Information Systems, vol. 8, no. 21, pp. 8693–8705, 2012.
  • 2012
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA

  • 2010 8th IEEE International Conference on Software Engineering and Formal Methods
  • 2010
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack

  • 2009 International Conference on Computational Intelligence and Security
  • 2009
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks

  • 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008)
  • 2008
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Security and privacy issues in wireless mesh networks: a survey

J. Sen
  • inWireless Networks and Security, Signals andCommunication Technology, pp. 189–272, Springer, Berlin, Germany, 2013.
  • 2013
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Similar Papers

Loading similar papers…