Performance of IEEE 802.11 under jamming
We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that
covers both channel-oblivious and channel-aware jamming. We consider two channel …
covers both channel-oblivious and channel-aware jamming. We consider two channel …
Dependability in wireless networks: Can we rely on WiFi?
MD Aime, G Calandriello, A Lioy - IEEE Security & Privacy, 2007 - ieeexplore.ieee.org
WiFi-short for" wireless fidelity"-is the commercial name for the 802.11 products that have
flooded the corporate wireless local area network (WLAN) market and are becoming rapidly …
flooded the corporate wireless local area network (WLAN) market and are becoming rapidly …
[PDF][PDF] Circumventing sinkholes and wormholes in wireless sensor networks
Sensor networks are formed with the help of a large number of wireless nodes, generally
with limited energy, computation and transmission powers. Each node helps every other …
with limited energy, computation and transmission powers. Each node helps every other …
A unified interference-collision analysis for power-aware adhoc networks
In this paper we address the issue of controlling transmission power in power-aware ad hoc
networks. Previous work that minimizes the transmission power does not consider both the …
networks. Previous work that minimizes the transmission power does not consider both the …
Distributed sender scheduling for multimedia transmission in wireless mobile peer-to-peer networks
Multi-source multimedia transmission is a popular architecture in wireless mobile peer-to-
peer (P2P) networks. Most of previous work on wireless mobile P2P networks concentrates …
peer (P2P) networks. Most of previous work on wireless mobile P2P networks concentrates …
Simulation of capture behaviour in IEEE 802.11 radio modems
We investigate the performance of common capture models in terms of the fairness
properties they reflect across contenting hidden connections. We propose a new capture …
properties they reflect across contenting hidden connections. We propose a new capture …
[PDF][PDF] Performance enhancement of TFRC in wireless ad hoc networks
The TCP-Friendly Rate Control (TFRC) is a rate-based transport protocol designed for
streaming multimedia applications to provide smooth, low delay and TCP-Friendly packet …
streaming multimedia applications to provide smooth, low delay and TCP-Friendly packet …
[PDF][PDF] Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks.
Mobile ad-hoc wireless networks are established in improvised environments through the
mutual cooperation of its participating nodes. These nodes often operate in a physically …
mutual cooperation of its participating nodes. These nodes often operate in a physically …
Performance modeling and analysis of a class of ARQ protocols in multi-hop wireless networks
T Issariyakul, E Hossain - IEEE transactions on wireless …, 2006 - ieeexplore.ieee.org
This paper models and analyzes the performances of a class of ARQ (automatic repeat
request) protocols in a multi-hop wireless data network. The performance metric here is the …
request) protocols in a multi-hop wireless data network. The performance metric here is the …
[PDF][PDF] Modelling of capture behaviour in IEEE 802.11 radio modems
In this paper we investigate the performance of common capture models in terms of the
fairness properties they reflect across contenting hidden connections. We propose a new …
fairness properties they reflect across contenting hidden connections. We propose a new …