Cooperation in open, decentralized, and heterogeneous computer networks

Community Networks (CN) are naturally open and decentralized structures, that grow organically with the addition of heterogeneous network devices, contributed and configured as needed by their participants. The continuous growth in popularity and dissemination of CNs in recent years has raised the perception of a mature and sustainable model for the provisioning of networking services. However, because such infrastructures include uncontrolled entities with non delimited responsibilities, every single network entity does indeed represent a potential single-point of failure that can stop the entire network from working, and that no other entity can prevent or even circumvent. Given the open and decentralized nature of CNs, that brings together individuals and organizations with different and even conflicting economic, political, and technical interests, the achievement of no more than basic consensus on the correctness of all network nodes is challenging. In such environment, the lack of self-determination for CN participants in terms of control and security of routing can be regarded as an obstacle for growth or even as a risk of collapse. To address this problem we first consider deployments of existing Wireless CN and we analyze their technology, characteristics, and performance. We perform an experimental evaluation of a production 802.11an Wireless CN, and compare to studies of other Wireless CN deployments in the literature. We compare experimentally obtained throughput traces with path-capacity calculations based on well-known conflict graph models. We observe that in the majority of cases the path chosen by the employed BMX6 routing protocol corresponds with the best identified path in our model. We analyze monitoring and interaction shortcomings of CNs and address these with Network Characterization Tool (NCT), a novel tool that allows users to assess network state and performance, and improve their quality of experience by individually modifying the routing parameters of their devices. We also evaluate performance outcomes when different routing policies are in use. Routing protocols provide self-management mechanisms that allow the continuous operation of a Community Mesh Network (CMN). We focus on three widely used proactive mesh routing protocols and their implementations: BMX6, OLSR, and Babel. We describe the core idea behind these protocols and study the implications of these in terms of scalability, performance, and stability by exposing them to typical but challenging network topologies and scenarios. Our results show the relative merits, costs, and limitations of the three protocols. Built upon the studied characteristics of typical CN deployments, their requirements on open and decentralized cooperation, and the potential controversy on the trustiness of particular components of a network infrastructure, we propose and evaluate SEMTOR, a novel routing-protocol that can satisfy these demands. SEMTOR allows the verifiable and undeniable definition and distributed application of individually trusted topologies for routing traffic towards each node. One unique advantage of SEMTOR is that it does not require a global consensus on the trustiness of any node and thus preserves cooperation among nodes with even oppositional defined trust specification. This gives each node admin the freedom to individually define the subset, and the resulting sub-topology, from the whole set of participating nodes that he considers sufficiently trustworthy to meet their security, data-delivery objectives and concerns. The proposed mechanisms have been realized as a usable and open-source implementation called BMX7, as successor of BMX6. We have evaluated its scalability, contributed robustness, and security. These results show that the usage of SEMTOR for securing trusted routing topologies is feasible, even when executed on real and very cheap (10 Euro, Linux SoC) routers as commonly used in Community Mesh Networks.

[1]  M. Hauge,et al.  Multi-Topology routing for QoS support in the CoNSIS convoy MANET , 2012, 2012 Military Communications and Information Systems Conference (MCC).

[2]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[3]  Leandro Navarro-Moldes,et al.  Tight bounds for sketches in traffic validation , 2017, 2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC).

[4]  Panagiotis Papadimitratos,et al.  Toward a Taxonomy and Attacker Model for Secure Routing Protocols , 2017, CCRV.

[5]  A. Zakrzewska,et al.  Performance Study of Routing Protocols for Wireless Mesh Networks , 2008, 2008 19th International Conference on Systems Engineering.

[6]  Bart Braem,et al.  A questionnaire based examination of community networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[7]  J. J. Garcia-Luna-Aceves,et al.  Securing distance-vector routing protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.

[8]  Mukesh Singhal,et al.  Secure routing in mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[9]  Prasant Mohapatra,et al.  QuRiNet: A wide-area wireless mesh testbed for research and experimental evaluations , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).

[10]  Suman Banerjee,et al.  A measurement study of a commercial-grade urban wifi mesh , 2008, IMC '08.

[11]  Prasant Mohapatra,et al.  Comparing simulation tools and experimental testbeds for wireless mesh networks , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[12]  Bernhard Plattner,et al.  Routing Metrics for Wireless Mesh Networks , 2009, Guide to Wireless Mesh Networks.

[13]  Zoltán Horváth,et al.  Motivations, Design and Business Models of Wireless Community Networks , 2008, Mob. Networks Appl..

[14]  Boon-Chong Seet,et al.  The Handbook of Ad Hoc Wireless Networks , 2002 .

[15]  Christoph Fuchs,et al.  OLSRv2 for Community Networks: Using Directional Airtime Metric with external radios , 2015, Comput. Networks.

[16]  Manpreet Singh,et al.  Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[17]  David L. Johnson,et al.  Simple pragmatic approach to mesh routing using BATMAN , 2008 .

[18]  George C. Polyzos,et al.  Wireless community networks: an alternative approach for nomadic broadband network access , 2011, IEEE Communications Magazine.

[19]  Leandro Navarro-Moldes,et al.  A technological overview of the guifi.net community network , 2015, Comput. Networks.

[20]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[21]  Geoffrey M. Voelker,et al.  Usage Patterns in an Urban WiFi Network , 2010, IEEE/ACM Transactions on Networking.

[22]  Leandro Navarro-Moldes,et al.  WiBed, a platform for commodity wireless testbeds , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[23]  Leandro Navarro-Moldes,et al.  A case for research with and on community networks , 2013, CCRV.

[24]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[25]  Lili Qiu,et al.  Impact of Interference on Multi-Hop Wireless Network Performance , 2003, MobiCom '03.

[26]  Eleonora Borgia,et al.  Experimental evaluation of ad hoc routing protocols , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[27]  Stefan Savage,et al.  Detecting and Isolating Malicious Routers , 2006, IEEE Transactions on Dependable and Secure Computing.

[28]  Zygmunt J. Haas,et al.  Securing the Internet routing infrastructure , 2002, IEEE Commun. Mag..

[29]  Sung-Ju Lee,et al.  Realizing high performance multi-radio 802.11n wireless networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[30]  Fatos Xhafa,et al.  Mobility Effects on the Performance of Mobile Ad hoc Networks , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.

[31]  Leonard Barolli,et al.  Experimental Results of a MANET Testbed in Indoor Stairs Environment , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.

[32]  Edward W. Knightly,et al.  Assessment of urban-scale wireless networks with a small number of measurements , 2008, MobiCom '08.

[33]  Nadeem Javaid,et al.  Evaluating impact of mobility on wireless routing protocols , 2011, 2011 IEEE Symposium on Wireless Technology and Applications (ISWTA).

[34]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[35]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.

[36]  Richard G. Ogier,et al.  Mobile Ad Hoc Network (MANET) Extension of OSPF Using Connected Dominating Set (CDS) Flooding , 2009, RFC.

[37]  Qian Feng,et al.  A Performance Comparison of the Ad Hoc Network Protocols , 2009, 2009 Second International Workshop on Computer Science and Engineering.

[38]  Stefan Savage,et al.  Detecting Malicious Packet Losses , 2009, IEEE Transactions on Parallel and Distributed Systems.

[39]  Leandro Navarro-Moldes,et al.  Receiver-driven routing for community mesh networks , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[40]  Leïla Azouz Saïdane,et al.  Experimental performance analysis of routing metrics in Wireless Mesh Networks , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[41]  Mike Hibler,et al.  An integrated experimental environment for distributed systems and networks , 2002, OSDI '02.

[42]  Denis Ovsienko Babel Hashed Message Authentication Code (HMAC) Cryptographic Authentication , 2014, RFC.

[43]  Yiwei Cao,et al.  Mobile Community Information Systems on Wireless Mesh Networks - An Opportunity for Developing Countries and Rural Areas , 2007 .

[44]  Axel Neumann,et al.  Evaluation of Dynamic Routing Protocols on Realistic Wireless Topologies , 2012 .

[45]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[46]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[47]  Nauman Mazhar,et al.  MANET routing protocols vs mobility models: A performance evaluation , 2011, 2011 Third International Conference on Ubiquitous and Future Networks (ICUFN).

[48]  Rudra Dutta,et al.  A Survey of Network Design Problems and Joint Design Approaches in Wireless Mesh Networks , 2011, IEEE Communications Surveys & Tutorials.

[49]  Terry Koziniec,et al.  An experimental comparison of routing protocols in multi hop ad hoc networks , 2010, 2010 Australasian Telecommunication Networks and Applications Conference.

[50]  Guy Juanole,et al.  Evaluating Routing Protocols for the Wireless Mesh Backbone , 2007, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007).

[51]  Florin Rusu,et al.  Statistical analysis of sketch estimators , 2007, SIGMOD '07.

[52]  Maria Bina,et al.  Wireless Community Networks: A Case of Modern Collective Action , 2007 .

[53]  Jitendra Padhye,et al.  Routing in multi-radio, multi-hop wireless mesh networks , 2004, MobiCom '04.

[54]  Leandro Navarro-Moldes,et al.  KDet: Coordinated Detection of Forwarding Faults in Wireless Community Networks , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[55]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[56]  Murali S. Kodialam,et al.  Characterizing the capacity region in multi-radio multi-channel wireless mesh networks , 2005, MobiCom '05.

[57]  Sajal K. Das,et al.  Security Issues in Wireless Mesh Networks , 2008 .

[58]  Bharat K. Bhargava,et al.  On security study of two distance vector routing protocols for mobile ad hoc networks , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[59]  M. K. Soni,et al.  A Comparative Study for Secure Routing in MANET , 2010 .

[60]  Robert Tappan Morris,et al.  a high-throughput path metric for multi-hop wireless routing , 2005, Wirel. Networks.

[61]  Leandro Navarro-Moldes,et al.  An evaluation of BMX6 for community wireless networks , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[62]  Giovanni Camponovo,et al.  WLAN communities and Internet access sharing: a regulatory overview , 2005, International Conference on Mobile Business (ICMB'05).

[63]  Manel Guerrero Zapata Key management and delayed verification for Ad hoc networks , 2006, J. High Speed Networks.

[64]  Piotr Szczechowiak,et al.  Architecture of a Self Configuration Framework for 802.11-based multi-radio Mesh Networks , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[65]  Abhay Roy,et al.  Multi-Topology (MT) Routing in OSPF , 2007, RFC.

[66]  K. Iqbal,et al.  Performance evaluation of multiple routing protocols using multiple mobility models for mobile ad hoc networks , 2008, 2008 IEEE International Multitopic Conference.

[67]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[68]  Wade Trappe,et al.  A Comparative Study of AODV and OLSR on the ORBIT Testbed , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[69]  Xin Zhang,et al.  Secure and Scalable Fault Localization under Dynamic Traffic Patterns , 2012, 2012 IEEE Symposium on Security and Privacy.

[70]  Ralf Steinmetz,et al.  A security framework for wireless mesh networks , 2011, Wirel. Commun. Mob. Comput..

[71]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[72]  Leandro Navarro-Moldes,et al.  Advances in wireless community networks with the community-lab testbed , 2016, IEEE Communications Magazine.

[73]  Juliusz Chroboczek,et al.  The Babel Routing Protocol , 2021, RFC.

[74]  A. Zakaria,et al.  Performance evaluation of routing protocols in wireless mesh network , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).

[75]  Ahmed Helmy,et al.  IMPORTANT: a framework to systematically analyze the Impact of Mobility on Performance of Routing Protocols for Adhoc Networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[76]  Nathan S. Evans Methods for secure decentralized routing in open networks , 2011 .

[77]  Miquel Oliver,et al.  Wireless Commons against the digital divide , 2010, 2010 IEEE International Symposium on Technology and Society.

[78]  German Castignani,et al.  An evaluation of IEEE 802.11 community networks deployments , 2011, The International Conference on Information Networking 2011 (ICOIN2011).

[79]  Elizabeth M. Belding-Royer,et al.  Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[80]  Leandro Navarro-Moldes,et al.  Community-lab: Architecture of a community networking testbed for the future internet , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[81]  Leandro Navarro-Moldes,et al.  Evaluation of mesh routing protocols for wireless community networks , 2015, Comput. Networks.

[82]  Jen-Wen Ding,et al.  A cross-layer design for heterogeneous routing in wireless mesh networks , 2008, Int. J. Pervasive Comput. Commun..

[83]  Leslie Lamport,et al.  Proving the Correctness of Multiprocess Programs , 1977, IEEE Transactions on Software Engineering.

[84]  Dilsun Kirli Kaynar,et al.  On Adversary Models and Compositional Security , 2011, IEEE Security & Privacy.

[85]  Panagiotis Papadimitratos,et al.  The secure routing protocol (SRP) for ad hoc networks, IETF Internet Draft , 2002 .

[86]  F. Z. Mughal,et al.  Comparative analysis of proactive, reactive and hybrid ad hoc routing protocols in Client based Wireless Mesh Network , 2010, 2010 International Conference on Information and Emerging Technologies.

[87]  Rafael Timóteo de Sousa Júnior,et al.  Trust-based security for the OLSR routing protocol , 2013, Comput. Commun..

[88]  L. Javier García-Villalba,et al.  Self-Configuration and Self-Optimization Process in Heterogeneous Wireless Networks , 2011, Sensors.

[89]  Yi Yang,et al.  Generic Threats to Routing Protocols , 2006, RFC.

[90]  Pascale Minet,et al.  Scalability of the OLSR Protocol with the Fish Eye Extension , 2007, Sixth International Conference on Networking (ICN'07).

[91]  Elizabeth M. Belding-Royer,et al.  AODV routing protocol implementation design , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[92]  Hari Balakrishnan,et al.  A measurement study of vehicular internet access using in situ Wi-Fi networks , 2006, MobiCom '06.

[93]  Ioannis G. Askoxylakis,et al.  Business opportunities and considerations on wireless mesh networks , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.

[94]  Renato Lo Cigno,et al.  A week in the life of three large Wireless Community Networks , 2015, Ad Hoc Networks.

[95]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[96]  David de Andrés,et al.  Towards benchmarking routing protocols in wireless mesh networks , 2011, Ad Hoc Networks.

[97]  Li Xiao,et al.  Channel allocation in multi-channel wireless mesh networks , 2011, Comput. Commun..

[98]  Matthias Hollick,et al.  Routing performance of Wireless Mesh Networks: A practical evaluation of BATMAN advanced , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[99]  Jiannong Cao,et al.  Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Testbed , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[100]  Jyotsna Sengupta,et al.  AODV and OLSR routing protocols for Wireless Ad-hoc and Mesh Networks , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).

[101]  Manel Guerrero Zapata Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .

[102]  Thomas H. Clausen,et al.  Optimized Link State Routing Protocol Version 2 (OLSRv2) and MANET Neighborhood Discovery Protocol (NHDP) Extension TLVs , 2014, RFC.

[103]  Leandro Navarro-Moldes,et al.  Securely-entrusted multi-topology routing for community networks , 2016, 2016 12th Annual Conference on Wireless On-demand Network Systems and Services (WONS).

[104]  Matthias Wachs,et al.  A secure and resilient communication infrastructure for decentralized networking applications , 2015 .

[105]  Philippe Jacquet,et al.  Fish eye OLSR scaling properties , 2004, Journal of Communications and Networks.

[106]  P. Kuppusamy,et al.  A study and comparison of OLSR, AODV and TORA routing protocols in ad hoc networks , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[107]  Vincenzo Mancuso,et al.  A Measurement Study of Multiplicative Overhead Effects in Wireless Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[108]  Llorenç Cerdà-Alabern,et al.  Experimental Evaluation of BMX6 Routing Metrics in a 802.11an Wireless-Community Mesh Network , 2015, 2015 3rd International Conference on Future Internet of Things and Cloud.

[109]  M. Abolhasan,et al.  Real-world performance of current proactive multi-hop mesh protocols , 2009, 2009 15th Asia-Pacific Conference on Communications.

[110]  Vishal Misra,et al.  Distributed Channel Assignment in Multi-Radio 802.11 Mesh Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[111]  Thomas Clausen,et al.  Digital Signatures for Admittance Control in the Optimized Link State Routing Protocol Version 2 , 2010 .

[112]  Wee Lum Tan,et al.  Evaluating the performance impact of protocol parameters on ad-hoc network routing protocols , 2012, Australasian Telecommunication Networks and Applications Conference (ATNAC) 2012.

[113]  Jochen H. Schiller,et al.  Trends, Advances, and Challenges in Testbed-based Wireless Mesh Network Research , 2010, Mob. Networks Appl..

[114]  Robert M. Hinden,et al.  Unique Local IPv6 Unicast Addresses , 2005, RFC.

[115]  Leandro Navarro-Moldes,et al.  Community-Lab: Overview and invitation to the research community , 2012, 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P).

[116]  Leandro Navarro-Moldes,et al.  Guifi.net, a Crowdsourced Network Infrastructure Held in Common , 2015, Comput. Networks.

[117]  Edward W. Knightly,et al.  Measurement driven deployment of a two-tier urban mesh access network , 2006, MobiSys '06.

[118]  Leandro Navarro-Moldes,et al.  Community home gateways for P2P clouds , 2013, IEEE P2P 2013 Proceedings.

[119]  Philippe Jacquet,et al.  Comparative Study of Routing Protocols for Mobile Ad-hoc NETworks , 2002 .

[120]  Xi Fang,et al.  Channel allocation in non-cooperative multi-radio multi-channel wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[121]  Llorenç Cerdà Alabern Analysis of guifi.net's topology: extension of results , 2012 .

[122]  Biswanath Mukherjee,et al.  Detecting disruptive routers: a distributed network monitoring approach , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[123]  David Johnson,et al.  Comparison of two routing metrics in OLSR on a grid based mesh network , 2009, Ad Hoc Networks.

[124]  Tom Goff,et al.  Comparison studies of OSPF-MDR, OLSR and Composite Routing , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[125]  Anatolij Zubow,et al.  Adjacent channel interference in IEEE 802.11n , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[126]  Mohsen Guizani,et al.  A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.

[127]  Arun Venkataramani,et al.  Consensus Routing: The Internet as a Distributed System. (Best Paper) , 2008, NSDI.

[128]  Hari Balakrishnan,et al.  Measurement and analysis of real-world 802.11 mesh networks , 2010, IMC '10.

[129]  Leonardo Maccari An analysis of the Ninux wireless community network , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[130]  Klaus Moessner,et al.  Survey of Experimental Evaluation Studies for Wireless Mesh Network Deployments in Urban Areas Towards Ubiquitous Internet , 2013, IEEE Communications Surveys & Tutorials.

[131]  Roger Pueyo Centelles,et al.  Enhancing reflection and self-determination in a real-life community mesh network , 2015, Comput. Networks.

[132]  Leonard Barolli,et al.  Effects of Source and Destination Movement on MANET Performance Considering OLSR and AODV Protocols , 2010, 2010 13th International Conference on Network-Based Information Systems.

[133]  Luiz A. DaSilva,et al.  Routing, security, resource management, and monitoring in ad hoc networks: Implementation and integration , 2011, Comput. Networks.

[134]  Panagiotis Papadimitratos,et al.  How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET , 2006, 2006 3rd International Conference on Broadband Communications, Networks and Systems.

[135]  Llorenç Cerdà-Alabern,et al.  Experimental evaluation of a wireless community mesh network , 2013, MSWiM.

[136]  Llorenç Cerdà-Alabern,et al.  On the topology characterization of Guifi.net , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[137]  Kameswari Chebrolu,et al.  Long-distance 802.11b links: performance measurements and experience , 2006, MobiCom '06.

[138]  Geoffrey M. Voelker,et al.  Analysis of a mixed-use urban wifi network: when metropolitan becomes neapolitan , 2008, IMC '08.

[139]  Leandro Navarro-Moldes,et al.  Topology patterns of a community network: Guifi.net , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[140]  George M. Giaglis,et al.  Unwired Collective Action: Motivations of Wireless Community Participants , 2006, 2006 International Conference on Mobile Business.

[141]  F. Garzia Handbook of Communications Security , 2013 .

[142]  Robert Tappan Morris,et al.  Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM '04.