Crossing-free many-to-one boundary labeling with hyperleaders
CC Lin - 2010 IEEE Pacific Visualization Symposium …, 2010 - ieeexplore.ieee.org
In boundary labeling, each point site is uniquely connected to a label placed on the
boundary of an enclosing rectangle by a leader, which may be a rectilinear or straight line …
boundary of an enclosing rectangle by a leader, which may be a rectilinear or straight line …
ASF: an attack simulation framework for wireless sensor networks
Wireless Sensor Networks are vulnerable to quite a good deal of logical and physical
security attacks. However, providing security countermeasures for every possible attack is …
security attacks. However, providing security countermeasures for every possible attack is …
A solution to the GTS-based selective jamming attack on IEEE 802.15. 4 networks
Abstract The IEEE 802.15. 4 standard allows devices to access the medium not only in
contention mode but also in a contention-free way, in order to support quality of service …
contention mode but also in a contention-free way, in order to support quality of service …
A dynamic game with adaptive strategies for IEEE 802.15. 4 and IoT
The problem of selfishness and misbehaviour in wireless networks is well known, as are the
associated solutions that have been proposed for it in IEEE 802.11 Wireless Local Area …
associated solutions that have been proposed for it in IEEE 802.11 Wireless Local Area …
[PDF][PDF] Performance Evaluation of Zigbee Routing Protocol under Various Conditions using OPNET Modeler
Zigbee, which has the standard IEEE 802.15. 4. It is advisable method to build wireless
personal area network (WPAN) which demands a low power consumption that can be …
personal area network (WPAN) which demands a low power consumption that can be …
Design and Implementation of a Web-based Home Energy Management System for Demand Response Applications
MM Rahman - 2013 - vtechworks.lib.vt.edu
The objective of this work is to design and implement an architectural framework for a web-
based demand management system that allows an electric utility to reduce system peak …
based demand management system that allows an electric utility to reduce system peak …
Amendments to the IEEE 802.15. 4 Protocol
This chapter presents specific amendments to the IEEE 802.15. 4, so that some of the open
issues that have been previously identified. In particular, a new implicit GTS allocation …
issues that have been previously identified. In particular, a new implicit GTS allocation …
IEEE 802.15. 4 security sublayer for OMNET++
G Glissa, A Meddeb - 2017 13th International Wireless …, 2017 - ieeexplore.ieee.org
Most network simulators do not support security features. In this paper, we introduce a new
security module for OMNET++ that implements the IEEE 802.15. 4 security suite. This …
security module for OMNET++ that implements the IEEE 802.15. 4 security suite. This …
[PDF][PDF] Practical techniques for ack authentication in ieee 802.15. 4 networks
EK Ryu, KY Yoo - Applied Mathematics & Information …, 2015 - naturalspublishing.com
A secure acknowledgement (ACK) mechanism is essential to ensure reliable data transfer in
wireless communication networks. However, because efficiency is the highest priority for …
wireless communication networks. However, because efficiency is the highest priority for …
A Security Framework for Wireless Sensor Networks
W Tiberti - 2020 - tesidottorato.depositolegale.it
Abstract Wireless Sensor Networks (WSN) are networks composed of small, wireless,
battery-powered and sensor-equipped nodes, called motes. Thank to their characteristics …
battery-powered and sensor-equipped nodes, called motes. Thank to their characteristics …