DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 1 Issue 2 Date of Publication:   December 2012

Secured Identity Based Approach With Privacy Preservation For Wireless Mesh Networks

S. Ravichandran

Page(s):   54-58 ISSN:   2278-2397
DOI:   10.20894/IJCNES.103.001.002.002 Publisher:   Integrated Intelligent Research (IIR)


  1. Siddiqui, M.S. Amin, S.O. Choong Seon Hong,   "An Efficient Mechanism for Network Management in Wireless Mesh Network   ,2008
    View Artical

  2. R.Ping Yi, S.Tianhao Tong, T.Ning Liu and H.Yue Wu,   "Security in Wireless Mesh Networks: Challenges and Solutions",   6th International Conference on Information Techno   ,2009
    View Artical

  3. S. Hansman and R. Hunt,   "A Taxonomy of Network and Computer Attacks Computers and Security",   Elsevier   ,Vol.24   ,2005
    View Artical

  4. William Stallings,   "Network Security Essentials",   Third Edition, Prentice Hall   ,2006
    View Artical

  5. N. Ben Salem and J.-P. Hubaux,   "Securing Wireless Mesh Networks,",   IEEE Wireless Comm   ,Vol.13   ,2006
    View Artical

  6. M. Siddiqui and C. Hong,   "Security Issues in Wireless Mesh Networks",   Proc. IEEE Int?l Conf. Multimedia and Ubiquitous   ,2007
    View Artical

  7. B. Salem and J-P Hubaux,   "Securing Wireless Mesh Networks",   Wireless Communication   ,Vol.13   ,Issue 2   ,2006
    View Artical

  8. S. Capkun, J. Hubaux, and M. Jakobsson,   "Secure and privacy preserving communication in hybrid ad hoc networks",   Swiss Fed. Inst. Technol.,- DI-ICA, Lausanne, Swit   ,2004
    View Artical

  9. Y. Zhang, W.Liu and W.Luo,,   "Anonymous Communication in Mobile Ad Hoc Networks",   proceedings of INFOCOM   ,2005
    View Artical

  10. W. Taojun, X. Yuan and Y.Cui,,   "Preserving traffic privacy in Wireless Mesh Networks",   proc of the 2006 International Symposium on a Worl
    View Artical

  11. X. Lin, R. Lu, P.-H. Ho, X. Shen, and Z. Cao,   "Tua: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks",   IEEE Wireless Comm   ,Vol.7   ,Issue 4   ,2008
    View Artical

  12. X. Lin, X. Ling, H. Zhu, P.-H. Ho, and X. Shen,   "A Novel Localized Authentication Scheme in ieee 802.11 Based Wireless Mesh Networks",   Int?l J. Security and Networks   ,Vol.3   ,Issue 2   ,2008
    View Artical

  13. K. Ren, W. Lou, K. Kim, and R. Deng,   "A Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environm",   IEEE Trans. Vehicular Technology   ,Vol.55   ,2006
    View Artical

  14. K. Ren and W. Lou,   "Privacy-Enhanced, Attack-Resilient Access Control in Pervasive Computing Environments with Optional    ,Vol.12   ,2007
    View Artical

  15. Y. Zhang and K. Ren,   "On Address Privacy in Mobile Ad Hoc Networks",   ACM/Springer Mobile Networks and Applications (MON   ,Vol.14   ,2009
    View Artical

  16. M. Siddiqui, et.al,   "MHRP: A Secure Multi-Path Hybrid Routing Protocol for Wireless Mesh Network",   IEEE MILCOM   ,2007
    View Artical

  17. Y. Zhang and Y. Fang,   "ARSA: An attack resilient security architecture for multihop wireless mesh networks",   IEEE Journal on Selected Areas in Communication   ,Vol.24   ,2006
    View Artical

  18. G. Horn, M. Martin and C. Mitchell,   "Authentication Protocols for Mobile Network Environment Value-Added Services",   IEEE Transactions on Vehicular Technology   ,Vol.51   ,2002
    View Artical