Sciweavers

366 search results - page 20 / 74
» Transmission costs, selfish nodes, and protocol design
Sort
View
APNOMS
2007
Springer
15 years 3 months ago
On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing att...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...
80
Voted
ICC
2007
IEEE
109views Communications» more  ICC 2007»
15 years 4 months ago
A Robust Kolmogorov-Smirnov Detector for Misbehavior in IEEE 802.11 DCF
— The CSMA/CA protocols are designed under the assumption that all participant nodes would abide to the protocol rules. This is of particular importance in distributed protocols ...
Alberto López Toledo, Xiaodong Wang
TCOM
2010
107views more  TCOM 2010»
14 years 8 months ago
A Simple Recruitment Scheme of Multiple Nodes for Cooperative MAC
—Physical (PHY) layer cooperation in a wireless network allows neighboring nodes to share their communication resources in order to create a virtual antenna array by means of dis...
Francesco Verde, Thanasis Korakis, Elza Erkip, Ann...
BROADNETS
2006
IEEE
15 years 3 months ago
AMCM: Adaptive Multi-Channel MAC Protocol for IEEE 802.11 Wireless Networks
This paper presents AMCM, a traffic-adaptive multichannel MAC protocol that increases the capacity of wireless network by enabling multiple concurrent transmissions on orthogonal...
Paul Tan, Mun Choon Chan
ICDCS
2003
IEEE
15 years 2 months ago
Neighbor Table Construction and Update in a Dynamic Peer-to-Peer Network
In a system proposed by Plaxton, Rajaraman and Richa (PRR), the expected cost of accessing a replicated object was proved to be asymptotically optimal for a static set of nodes an...
Huaiyu Liu, Simon S. Lam