Sciweavers

267 search results - page 16 / 54
» An Enhanced MAC Architecture for Multi-hop Wireless Networks
Sort
View
GLOBECOM
2009
IEEE
15 years 3 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
MOBICOM
2006
ACM
15 years 5 months ago
A MAC protocol for ad-hoc underwater acoustic sensor networks
A medium access control (MAC) protocol is proposed that is suitable for non-synchronized ad-hoc networks, and in particular for the energy-constrained underwater acoustic networks...
Borja Peleato, Milica Stojanovic
MSWIM
2005
ACM
15 years 5 months ago
A controlled-access scheduling mechanism for QoS provisioning in IEEE 802.11e wireless LANs
Wireless Local Area Networks (WLAN) are being deployed at a rapid pace and in different environments. As a result, the demand for supporting a diverse range of applications over w...
Yaser Pourmohammadi Fallah, Hussein M. Alnuweiri
ICC
2007
IEEE
229views Communications» more  ICC 2007»
15 years 3 months ago
A Cross-Layer Design on the Basis of Multiple Packet Reception in Asynchronous Wireless Network
This paper concerns the cross-layer design between physical layer and MAC (Multiple Access Control) layer in asynchronous wireless random access network. The proposed cross-layer d...
Anxin Li, Mingshu Wang, Xiangming Li, Hidetoshi Ka...
SIGCOMM
2006
ACM
15 years 5 months ago
Analyzing the MAC-level behavior of wireless networks in the wild
We present Wit, a non-intrusive tool that builds on passive monitoring to analyze the detailed MAC-level behavior of operational wireless networks. Wit uses three processing steps...
Ratul Mahajan, Maya Rodrig, David Wetherall, John ...