Sciweavers

562 search results - page 69 / 113
» Controlled random access MAC for network utility maximizatio...
Sort
View
JCM
2007
191views more  JCM 2007»
13 years 7 months ago
Performance Evaluation of IEEE 802.15.4: Experimental and Simulation Results
- Wireless Local Area Networking standard (Wi-Fi) and the WPAN standard (Bluetooth and Zigbee) products utilize the same unlicensed 2.4 GHz ISM band. Co-existence between such wire...
Khaled Shuaib, Maryam Alnuaimi, Mohammed Boulmalf,...
RAID
2005
Springer
14 years 1 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
TMC
2010
179views more  TMC 2010»
13 years 6 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
COMCOM
2006
147views more  COMCOM 2006»
13 years 7 months ago
Coverage-adaptive random sensor scheduling for application-aware data gathering in wireless sensor networks
Due to the application-specific nature of wireless sensor networks, application-aware algorithm and protocol design paradigms are highly required in order to optimize the overall ...
Wook Choi, Sajal K. Das
JPDC
2011
155views more  JPDC 2011»
12 years 10 months ago
A cellular learning automata-based deployment strategy for mobile wireless sensor networks
: One important problem which may arise in designing a deployment strategy for a wireless sensor network is how to deploy a specific number of sensor nodes throughout an unknown ne...
Mehdi Esnaashari, Mohammad Reza Meybodi