A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
End-to-end performance and fairness in multihop wireless backhaul networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Distributed dynamic scheduling for end-to-end rate guarantees in wireless ad hoc networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
End-to-End Fair Bandwidth Allocation in Multi-Hop Wireless Ad Hoc Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Architecture and evaluation of an unplanned 802.11b mesh network
Proceedings of the 11th annual international conference on Mobile computing and networking
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
Fast handoff for seamless wireless mesh networks
Proceedings of the 4th international conference on Mobile systems, applications and services
Securing Wireless Mesh Networks
IEEE Internet Computing
Anomaly Intrusion Detection Methods for Wireless LAN
ICNC '08 Proceedings of the 2008 Fourth International Conference on Natural Computation - Volume 05
A framework for detecting selfish misbehavior in wireless mesh community networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Fair flow control in solar powered WLAN mesh networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Selfish MAC layer misbehavior detection model for the IEEE 802.11-based wireless mesh networks
APPT'07 Proceedings of the 7th international conference on Advanced parallel processing technologies
The nominal capacity of wireless mesh networks
IEEE Wireless Communications
Securing wireless mesh networks
IEEE Wireless Communications
Hi-index | 0.00 |
It is a critical issue to ensure that nodes and/or flows have fair access to the network bandwidth in wireless mesh networks (WMNs). However, current WMNs based on IEEE 802.11 exhibit severe unfairness. Several scheduling schemes have been proposed to ensure fairness in WMNs. Unfortunately, all of them implicitly trust nodes in the network, and thus are vulnerable to the misbehavior of nodes participating in scheduling. In this paper, we address the threats to fair scheduling in WMNs resulting from node misbehavior and present a generic verification framework to detect such misbehavior. Moreover, we develop two verification schemes based on this framework for distributed and centralized authentication environments, respectively. We validate our approach by extending an existing fair scheduling scheme and evaluating it through simulation. The results show that our approach improves misbehavior detection with light performance overhead.