— Handoff process in IEEE 802.11 wireless networks must be accomplished with as little interruption as possible to maintain the required quality of service (QoS). Previous resear...
Jaeouk Ok, Pedro Morales, Andreas Darmawan, Hiroyu...
— In this paper, we address the problem of cross-layer denial of service attack in wireless data networks. We introduce SPREAD - a novel adaptive diversification approach to pro...
—Economies of scale make IEEE 802.11 an attractive technology for building wireless mesh networks (WMNs). However, the IEEE 802.11 protocol exhibits serious link-layer unfairness...
Ashish Raniwala, Pradipta De, Srikant Sharma, Rupa...
— The CSMA/CA protocols are designed under the assumption that all participant nodes would abide to the protocol rules. This is of particular importance in distributed protocols ...
— This paper presents a novel stochastic link-layer channel model for IEEE 802.11 ad hoc networks. The model characterizes the variations of the channel service process in a non-...
— In distributed wireless access networks, the short-term unfairness of IEEE 802.11 Distributed Coordination Function (DCF) has been revealed by many works. In this paper, a modi...
The ISM free-licence band is highly used by wireless technologies such IEEE 802.11, Bluetooth as well as private wireless schemes. This huge utilisation increases dramatically the ...
—Car-to-car communication (C2CC) enables cars to exchange information that can be used to, e.g., improve the drivers’ safety or comfort. Recently, WLANs based on the IEEE 802.1...
—Deployment of Wireless Mesh Networks (WMNs) is becoming increasingly popular due to the low-impact and lowcost features of wireless devices. This is especially true for WMNs bas...
—In this paper we present an algorithm that measures the round trip times of IEEE 802.11 MAC packets in order to trilaterate WLAN nodes. We show that if we use packet sequences (...