1. Akyildiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Computer Networks 47(4), 445–487 (2005)
2. Franklin, A.A., Murthy, C.S.R.: An introduction to wireless mesh networks. In: Zhang, Y., et al. (eds.) Security in Wireless Mesh Networks, pp. 3–44. CRC Press, USA (2007)
3. Sen, J.: Secure and privacy-preserving authentication protocols for wireless mesh networks. In: Sen, J. (ed.) Applied Cryptography and Network Security, pp. 3–34. INTECH, Croatia (2012)
4. Sen, J.: Secure routing in wireless mesh networks. In: Funabiki, N. (ed.) Wireless Mesh Networks, pp. 237–280. INTECH, Croatia (2011)
5. Wu, T., Xue, Y., Cui, Y.: Preserving traffic privacy in wireless mesh networks. In: Proceedings of the International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), Buffalo-Niagara Falls, NY, USA, pp. 459–461 (June 2006)