Sciweavers

125 search results - page 11 / 25
» Security Protocol for IEEE 802.11 Wireless Local Area Networ...
Sort
View
WWIC
2009
Springer
191views Communications» more  WWIC 2009»
14 years 2 months ago
Hop-to-Hop Reliability in IP-Based Wireless Sensor Networks - A Cross-Layer Approach
Abstract. To interconnect a wireless sensor network (WSN) to the Internet, we propose to use TCP/IP as the standard protocol for all network entities. We present a cross layer desi...
Gerald Wagenknecht, Markus Anwander, Torsten Braun
ACIIDS
2009
IEEE
108views Database» more  ACIIDS 2009»
14 years 2 months ago
Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks
Abstract—Wireless sensor networks(WSNs) have been regarded as an incarnation of Ad Hoc Networks for a specific application. Since a WSN consists of potentially hundreds of low c...
Zhongwei Zhang, Hong Zhou, Jason Gao
TMC
2008
112views more  TMC 2008»
13 years 7 months ago
Throughput Analysis and Measurements in IEEE 802.11 WLANs with TCP and UDP Traffic Flows
There is a vast literature on the throughput analysis of the IEEE 802.11 media access control (MAC) protocol. However, very little has been done on investigating the interplay betw...
Raffaele Bruno, Marco Conti, Enrico Gregori
ICC
2009
IEEE
129views Communications» more  ICC 2009»
14 years 2 months ago
Random Access Protocols for WLANs Based on Mechanism Design
— In wireless local area networks (WLANs), quality of service (QoS) can be provided by mapping applications with different requirements (e.g., delay and throughput) into one of t...
Man Hon Cheung, Amir Hamed Mohsenian Rad, Vincent ...
ICCSA
2010
Springer
14 years 2 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim