Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8321
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSaini, Hemraj-
dc.date.accessioned2022-11-23T04:18:57Z-
dc.date.available2022-11-23T04:18:57Z-
dc.date.issued2014-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8321-
dc.description.abstractIn the fast growing era of the online business, Wireless Mesh Networks (WMNs) are playing a significance role to grow the economy of different countries. Therefore, it is essential to implement the efficient security measures or methods at the Wireless Mesh Gateway (GW) as it is only the place to enter the incoming traffic to the particular WMN. In the traditional solutions, the monotonically increased traffic at GW is handled by the help of “linear queue” data structure, which is not the efficient way for security analysis in the present criteria. Therefore, in the manuscript, it is replaced by another efficient data structure named “1-2 Skip List”. In addition, it has shown that detection of flooding or DoS like attacks are also easily possible by using 1-2 Skip List approach. A sufficient analysis is also provided for the proposed solution with performance analysis in the manuscripten_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectWireless mesh networken_US
dc.subjectWLANen_US
dc.subjectNetwork securityen_US
dc.title1-2 Skip List Approach for Efficient Security Checks in Wireless Mesh Networksen_US
dc.typeArticleen_US
Appears in Collections:Journal Articles

Files in This Item:
File Description SizeFormat 
1-2 Skip List Approach for Efficient Security Checks in Wireless Mesh Networks.pdf510.48 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.