Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
Repository logo
  • Communities & Collections
  • Browse UWCScholar
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Mauwa, H."

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Security of a Mesh Potato Network in Ad Hoc Mode
    (Telkom, 2013) Mauwa, H.; Tucker, William David
    Wireless Mesh Networks can provide low cost and reliable community-owned connectivity in developing rural areas. A rural community can use mesh networks to access a wide range of modern information and communication technologies, and as such, protection of these networks from malicious behavior is very important. While there has been work into securing mesh networks, almost none of it has been applied within the Village Telco, or mesh potato, arena. It is against this background that this paper advocates the investigation of security weaknesses of and solutions for mesh potato networks by intervening with a particular security set-up of the mesh potatoes used in the deployment of a rural community wireless mesh network in Mankosi Community located in the Eastern Cape Province in South Africa. These devices currently have no protection in ad hoc mode. This work in progress paper describes how we plan to provide and test security for this mesh.

DSpace software copyright © 2002-2025 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback