Performance of IEEE 802.11 under jamming

E Bayraktaroglu, C King, X Liu, G Noubir… - Mobile Networks and …, 2013 - Springer
We study the performance of the IEEE 802.11 MAC protocol under a range of jammers that
covers both channel-oblivious and channel-aware jamming. We consider two channel …

Dependability in wireless networks: Can we rely on WiFi?

MD Aime, G Calandriello, A Lioy - IEEE Security & Privacy, 2007 - ieeexplore.ieee.org
WiFi-short for" wireless fidelity"-is the commercial name for the 802.11 products that have
flooded the corporate wireless local area network (WLAN) market and are becoming rapidly …

[PDF][PDF] Circumventing sinkholes and wormholes in wireless sensor networks

AA Pirzada, C McDonald - … '05: Proceedings of International Workshop on …, 2005 - Citeseer
Sensor networks are formed with the help of a large number of wireless nodes, generally
with limited energy, computation and transmission powers. Each node helps every other …

A unified interference-collision analysis for power-aware adhoc networks

S Gobriel, R Melhem, D Mossé - IEEE INFOCOM 2004, 2004 - ieeexplore.ieee.org
In this paper we address the issue of controlling transmission power in power-aware ad hoc
networks. Previous work that minimizes the transmission power does not consider both the …

Distributed sender scheduling for multimedia transmission in wireless mobile peer-to-peer networks

P Si, FR Yu, H Ji, VCM Leung - IEEE transactions on wireless …, 2009 - ieeexplore.ieee.org
Multi-source multimedia transmission is a popular architecture in wireless mobile peer-to-
peer (P2P) networks. Most of previous work on wireless mobile P2P networks concentrates …

Simulation of capture behaviour in IEEE 802.11 radio modems

C Ware, J Chicharo, T Wysocki - IEEE 54th Vehicular …, 2001 - ieeexplore.ieee.org
We investigate the performance of common capture models in terms of the fairness
properties they reflect across contenting hidden connections. We propose a new capture …

[PDF][PDF] Performance enhancement of TFRC in wireless ad hoc networks

M Li, C Lee, E Agu, M Claypool, R Kinicki - Proceedings of the 10th …, 2004 - cs.wpi.edu
The TCP-Friendly Rate Control (TFRC) is a rate-based transport protocol designed for
streaming multimedia applications to provide smooth, low delay and TCP-Friendly packet …

[PDF][PDF] Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks.

AA Pirzada, C McDonald - Int. J. Netw. Secur., 2006 - ijns.jalaxy.com.tw
Mobile ad-hoc wireless networks are established in improvised environments through the
mutual cooperation of its participating nodes. These nodes often operate in a physically …

Performance modeling and analysis of a class of ARQ protocols in multi-hop wireless networks

T Issariyakul, E Hossain - IEEE transactions on wireless …, 2006 - ieeexplore.ieee.org
This paper models and analyzes the performances of a class of ARQ (automatic repeat
request) protocols in a multi-hop wireless data network. The performance metric here is the …

[PDF][PDF] Modelling of capture behaviour in IEEE 802.11 radio modems

C Ware, J Chicharo, T Wysocki - IEEE International Conference on …, 2001 - tango.isti.cnr.it
In this paper we investigate the performance of common capture models in terms of the
fairness properties they reflect across contenting hidden connections. We propose a new …