Return to Article Details Analysis of Secure Wireless Mesh Networks