Crossing-free many-to-one boundary labeling with hyperleaders

CC Lin - 2010 IEEE Pacific Visualization Symposium …, 2010 - ieeexplore.ieee.org
In boundary labeling, each point site is uniquely connected to a label placed on the
boundary of an enclosing rectangle by a leader, which may be a rectilinear or straight line …

ASF: an attack simulation framework for wireless sensor networks

G Dini, M Tiloca - 2012 IEEE 8th International Conference on …, 2012 - ieeexplore.ieee.org
Wireless Sensor Networks are vulnerable to quite a good deal of logical and physical
security attacks. However, providing security countermeasures for every possible attack is …

A solution to the GTS-based selective jamming attack on IEEE 802.15. 4 networks

R Daidone, G Dini, M Tiloca - Wireless networks, 2014 - Springer
Abstract The IEEE 802.15. 4 standard allows devices to access the medium not only in
contention mode but also in a contention-free way, in order to support quality of service …

A dynamic game with adaptive strategies for IEEE 802.15. 4 and IoT

J Abegunde, H **ao, J Spring - 2016 IEEE Trustcom/BigDataSE …, 2016 - ieeexplore.ieee.org
The problem of selfishness and misbehaviour in wireless networks is well known, as are the
associated solutions that have been proposed for it in IEEE 802.11 Wireless Local Area …

[PDF][PDF] Performance Evaluation of Zigbee Routing Protocol under Various Conditions using OPNET Modeler

N Abdulrahman, FA Yaseen - International Journal of Computer …, 2015 - researchgate.net
Zigbee, which has the standard IEEE 802.15. 4. It is advisable method to build wireless
personal area network (WPAN) which demands a low power consumption that can be …

Design and Implementation of a Web-based Home Energy Management System for Demand Response Applications

MM Rahman - 2013 - vtechworks.lib.vt.edu
The objective of this work is to design and implement an architectural framework for a web-
based demand management system that allows an electric utility to reduce system peak …

Amendments to the IEEE 802.15. 4 Protocol

S Tennina, A Koubâa, R Daidone, M Alves… - IEEE 802.15. 4 and …, 2013 - Springer
This chapter presents specific amendments to the IEEE 802.15. 4, so that some of the open
issues that have been previously identified. In particular, a new implicit GTS allocation …

IEEE 802.15. 4 security sublayer for OMNET++

G Glissa, A Meddeb - 2017 13th International Wireless …, 2017 - ieeexplore.ieee.org
Most network simulators do not support security features. In this paper, we introduce a new
security module for OMNET++ that implements the IEEE 802.15. 4 security suite. This …

[PDF][PDF] Practical techniques for ack authentication in ieee 802.15. 4 networks

EK Ryu, KY Yoo - Applied Mathematics & Information …, 2015 - naturalspublishing.com
A secure acknowledgement (ACK) mechanism is essential to ensure reliable data transfer in
wireless communication networks. However, because efficiency is the highest priority for …

A Security Framework for Wireless Sensor Networks

W Tiberti - 2020 - tesidottorato.depositolegale.it
Abstract Wireless Sensor Networks (WSN) are networks composed of small, wireless,
battery-powered and sensor-equipped nodes, called motes. Thank to their characteristics …