Detection of Selfish Nodes in Wireless Mesh Networks using Hierarchial Clustering
Abstract
Wireless mesh networks (WMNs) have emerged as a key technology for next-generation wireless networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerous applications. In multi-hop wireless mesh networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles and/or applications’ bandwidth demands. These failures cause severe performance degradation in WMNs or require expensive, manual network management for their real-time recovery. This paper presents an Autonomous network Reconfiguration System(ARS) that enables a multi-radio WMN to autonomously recover from local link failures to preserve network performance. ARS also improves channel efficiency by more than 90% over the other recovery methods.
Keywords
Full Text:
PDFReferences
I.F. Akyildiz, X. Wang, and W. Wang, “Wireless mesh networks: a survey,” Computer Networks, Vol 47, No 4, March 2005, pp. 445- 487.
A.A. Franklin and C. S.R Murthy, “An introduction to wireless mesh networks,” in Security in Wireless MeshNetworks,” Y. Zhang, J. Zheng, and H. Hu, Eds. CRCPress, 2007, pp. 3-44.
L. Santhanam, B. Xie, and D.P. Agrawal, “Selfishness in mesh networks: wired multihop MANETs,” IEEE WirelessComm. Magazine, Vol 15, No 4, August 2008, pp. 16-23.
S. Marti, T.J. Giuli, K. Lai, and M. Baker, ”Mitigating routing misbehavior in mobile ad hoc networks,” in
Proceedings of MobiCom 2000, pp. 255-265.
S. Buchegger and J.-Y. L. Boudec, “Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in dynamic ad-hoc networks,” In Proc. ofMobiHoc, 2002, pp. 226-236.
R. Mahajan, M. Rodrig, D. Wetherall, and John Zahorjan , “Sustaining cooperation in multihop wireless networks,” in Proc. of NSDI 2005, Vol 2, pp. 231-244.
G. Vigna, S. Gwalani, K. Srinivasan, E.M. Belding-Royer, and R.A. Kemmerer, “An intrusion detection tool for AODV-based ad hoc wireless networks,” in Proc ofAnnual Comp. Sec. Appl. Conf (ACSAC) 2004, pp. 16-27.
A. Pirzada and C. McDonald, “Establishing trust in pure ad hoc networks,” in Proceedings of the 27thAustralianConference on Computer Science, 2004, pp. 181-199.
M. Conti, E. Gregori, and G. Maselli, “Reliable and efficient forwarding in MANETs,” Ad Hoc NetworksJournal, Vol 4, No 3, 2006, pp. 398-415.
L. Santhanam et al, “Distributed self-policing architecture for fostering node cooperation in wireless mesh networks,” in Proc. of PWC 2006, Vol 4217, pp. 147-158.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.