The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new MAC (Medium Access Control) spoofing detection algorithm in IEEE 802.11 networks. The proposed algorithm utilizes PLCP (Physical Layer Convergence Protocol) header of IEEE 802.11 frames to differentiate an attacker station from a genuine station. PLCP header of IEEE 802.11 frames maybe change for each frame. It depends on transmission rate adaptation algorithm which is designed...
Limited bandwidth remains a pressing issue for wireless sensor networks (WSNs) due to the half-duplex property of the sensor radio and the broadcast nature of wireless medium. Designing multi-channel MAC protocol attracts the interest of many researchers as a cost effective solution to meet the higher bandwidth demand for the limited bandwidth in WSN. In this paper, we present a scheduled-based multi-channel...
Analytical studies of Medium Access Control (MAC) layer protocols can be used to improve the performance of multi-hop Wireless Sensor Networks (WSNs) in the presence of hidden stations. The selected MAC layer protocol should conform to the distributed nature of the WSNs. The IEEE 802.11 MAC layer with Distributed Coordination Function (DCF) is well suited to WSNs. Analytical studies of IEEE 802.11...
The paper studies bandwidth distribution among a set of rational multihomed wireless terminals (WTs). Based on network feedback information (NFI), each WT selects an available wireless network so as to self-optimize a utility derived from received bandwidth. Using game-theoretic tools we show how to disincentivize “aggressive” MAC configuration and quantify the role of the speed of NFI generation...
According to multimedia service distribution such as High-Definition Television (HDTV), Internet Protocol Television (IPTV) and Voice Over Internet Protocol (VoIP), the networks are required to guarantee Quality of Service (QoS) and real-time performance. Power Line Communication Technology is used for data transfer as well as the transfer of electric power. However, power line communication has some...
Distributed Coordination Function (DCF) of IEEE 802.11 WLANs prohibits concurrent transmissions to avoid packet collisions or interferences. This conservative transmission mechanism of DCF makes it hard to fully utilize the wireless capacity in terms of spatial reuse. Recent measurement studies demonstrate that a packet can survive the collision and can be decoded successfully by the receiver depending...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.