{"title":"A Testbed Implementation of Monitoring Assisted Local Route Recovery Scheme for Wireless Mesh Networks","authors":"Dominic K. H. Heah, Z. Zaidi","doi":"10.1109/MESH.2009.29","DOIUrl":null,"url":null,"abstract":"In this paper, we present experimental results from testbed implementation of a simple monitoring assisted local route recovery scheme for wireless mesh networks (WMN). The scheme exploits the broadcast nature of wireless transmissions at special routers with added monitoring functionalities. These routers passively listen to the transmissions in the neighborhood and compare the forwarding behavior against pre-specified thresholds. If forwarded traffic exceeds the threshold, as a result of a malfunction, e.g., Denial-of-service (DoS) attack or node failure, these routers try to isolate the node causing the problem by routing the traffic around it. The performance evaluation of our scheme shows considerable improvement in data delivery rates over standard routing schemes.","PeriodicalId":115389,"journal":{"name":"2009 Second International Conference on Advances in Mesh Networks","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Second International Conference on Advances in Mesh Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MESH.2009.29","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this paper, we present experimental results from testbed implementation of a simple monitoring assisted local route recovery scheme for wireless mesh networks (WMN). The scheme exploits the broadcast nature of wireless transmissions at special routers with added monitoring functionalities. These routers passively listen to the transmissions in the neighborhood and compare the forwarding behavior against pre-specified thresholds. If forwarded traffic exceeds the threshold, as a result of a malfunction, e.g., Denial-of-service (DoS) attack or node failure, these routers try to isolate the node causing the problem by routing the traffic around it. The performance evaluation of our scheme shows considerable improvement in data delivery rates over standard routing schemes.