Open Access Open Access  Restricted Access Subscription or Fee Access

Detection of Selfish Nodes in Wireless Mesh Networks using Hierarchial Clustering

T. Jaya, Merlin Sheeba, R. Dharanya, M.A. Athiqueahmed


Wireless mesh networks (WMNs) have emerged as a key technology for next-generation wireless networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerous applications. In multi-hop wireless mesh networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles and/or applications’ bandwidth demands. These failures cause severe performance degradation in WMNs or require expensive, manual network management for their real-time recovery. This paper presents an Autonomous network Reconfiguration System(ARS) that enables a multi-radio WMN to autonomously recover from local link failures to preserve network performance. ARS also improves channel efficiency by more than 90% over the other recovery methods.


Hierarchalclustering, Selfish node

Full Text:



I.F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: a survey,” Computer Networks, Vol 47, No 4, March 2005, pp. 445- 487.

A.A. Franklin and C. S.R Murthy, “An introduction to wireless mesh networks,” in Security in Wireless MeshNetworks,” Y. Zhang, J. Zheng, and H. Hu, Eds. CRCPress, 2007, pp. 3-44.

L. Santhanam, B. Xie, and D.P. Agrawal, “Selfishness in mesh networks: wired multihop MANETs,” IEEE WirelessComm. Magazine, Vol 15, No 4, August 2008, pp. 16-23.

S. Marti, T.J. Giuli, K. Lai, and M. Baker, ”Mitigating routing misbehavior in mobile ad hoc networks,” in

Proceedings of MobiCom 2000, pp. 255-265.

S. Buchegger and J.-Y. L. Boudec, “Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in dynamic ad-hoc networks,” In Proc. ofMobiHoc, 2002, pp. 226-236.

R. Mahajan, M. Rodrig, D. Wetherall, and John Zahorjan , “Sustaining cooperation in multihop wireless networks,” in Proc. of NSDI 2005, Vol 2, pp. 231-244.

G. Vigna, S. Gwalani, K. Srinivasan, E.M. Belding-Royer, and R.A. Kemmerer, “An intrusion detection tool for AODV-based ad hoc wireless networks,” in Proc ofAnnual Comp. Sec. Appl. Conf (ACSAC) 2004, pp. 16-27.

A. Pirzada and C. McDonald, “Establishing trust in pure ad hoc networks,” in Proceedings of the 27thAustralianConference on Computer Science, 2004, pp. 181-199.

M. Conti, E. Gregori, and G. Maselli, “Reliable and efficient forwarding in MANETs,” Ad Hoc NetworksJournal, Vol 4, No 3, 2006, pp. 398-415.

L. Santhanam et al, “Distributed self-policing architecture for fostering node cooperation in wireless mesh networks,” in Proc. of PWC 2006, Vol 4217, pp. 147-158.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.