Sciweavers

94 search results - page 14 / 19
» In defense of wireless carrier sense
Sort
View
ICC
2007
IEEE
112views Communications» more  ICC 2007»
14 years 4 months ago
A Collision-free Based Rotational Listening Strategy (RLS) for IEEE 802.15.4 WPAN
— The standard IEEE 802.15.4 medium access control (MAC) protocol is designed for low-power transmissions in low-rate and short-distance wireless personal area networks (WPANs). ...
Shiann-Tsong Sheu, Yun-Yen Shih
INFOCOM
2009
IEEE
14 years 4 months ago
Synchronized CSMA Contention: Model, Implementation and Evaluation
— A class of CSMA protocols used in a broad range of wireless applications uses synchronized contention where nodes periodically contend at intervals of fixed duration. While se...
Jing Shi, Ehsan Aryafar, Theodoros Salonidis, Edwa...
INFOCOM
2007
IEEE
14 years 4 months ago
Broadcast Flooding Revisited: Survivability and Latency
—This paper addresses the dynamics of broadcast flooding in random wireless ad hoc networks. In particular, we study the subset of nodes covered by a flood as well as timing is...
Petteri Mannersalo, Alireza Keshavarz-Haddad, Rudo...
CORR
2010
Springer
177views Education» more  CORR 2010»
13 years 6 months ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...
MOBIHOC
2005
ACM
14 years 9 months ago
The feasibility of launching and detecting jamming attacks in wireless networks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. These attacks can be easily accomplished by an adversary emitt...
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wo...