Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Proceedings of the 9th annual international conference on Mobile computing and networking
Routing in multi-radio, multi-hop wireless mesh networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
A high-throughput path metric for multi-hop wireless routing
Wireless Networks - Special issue: Selected papers from ACM MobiCom 2003
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
On accurate measurement of link quality in multi-hop wireless mesh networks
Proceedings of the 12th annual international conference on Mobile computing and networking
Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Overhaul of ieee 802.11 modeling and simulation in ns-2
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
ICNP '06 Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes
IEEE Transactions on Mobile Computing
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Impact of denial of service attacks on ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Packet-dropping adversary identification for data plane security
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks
IEEE Transactions on Dependable and Secure Computing
Dealing with Selfishness and Moral Hazard in Noncooperative Wireless Networks
IEEE Transactions on Mobile Computing
Castor: scalable secure routing for ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Wireless Mesh Networks: Current Challenges and Future Directions of Web-In-The-Sky
IEEE Wireless Communications
An analytical approach to the study of cooperation in wireless ad hoc networks
IEEE Transactions on Wireless Communications
The IEEE 802.11s Extended Service Set Mesh Networking Standard
IEEE Communications Magazine
Attack-resistant cooperation stimulation in autonomous ad hoc networks
IEEE Journal on Selected Areas in Communications
ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks
IEEE Journal on Selected Areas in Communications
Routing Metrics and Protocols for Wireless Mesh Networks
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Wireless mesh networks (WMNs) have emerged as a flexible and low-cost network infrastructure, where heterogeneous mesh routers managed by different users collaborate to extend network coverage. This paper proposes a novel routing metric, Expected Forwarded Counter (EFW), and two further variants, to cope with the problem of selfish behavior (i.e., packet dropping) of mesh routers in a WMN. EFW combines, in a cross-layer fashion, routing-layer observations of forwarding behavior with MAC-layer measurements of wireless link quality to select the most reliable and high-performance path. We evaluate the proposed metrics both through simulations and real-life deployments on two different wireless testbeds, performing a comparative analysis with On-Demand Secure Byzantine Resilient Routing (ODSBR) Protocol and Expected Transmission Counter (ETX). The results show that our cross-layer metrics accurately capture the path reliability and considerably increase the WMN performance, even when a high percentage of network nodes misbehave.