Wireless access protocols currently deployed in MANET use distributed contention resolution mechanisms for sharing the wireless channel. In this environment, selfish hosts that fail to adhere to the MAC protocol may obtain an unfair share of the channel bandwidth at the expense of performance degradation of well-behaved hosts. We present a novel access method, Predictable Random Backoff (PRB), that is capable of mitigating the misbehavior of selfish hosts; particularly, hosts that deliberately do not respect the random deferment of the transmission of their packets [4]. PRB is based on minor modifications of the IEEE 802.11 Binary Exponential Backoff (BEB) and forces each node to generate a predictable backoff interval. Hosts that do not fo...
Both hidden terminals, intrinsic in a multi-hop wireless network, and unfairness, due to location-de...
Due to hidden terminals and a dynamic topology, contention among stations in an ad-hoc network is no...
Abstract — This paper analyzes and designs medium access control (MAC) protocols for wireless ad-hoc...
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolu...
Selfish behavior at the MAC layer can have devastating side effects on the performance of wireless n...
It is known that 802.11 is not resilient to selfish behavior and denial of service (DoS) attacks tar...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
One of the latest protocols developed for the Internet of Things networks is IEEE 802.11ah, proposed...
The 802.11e standard enables user configuration of several MAC parameters, making WLANs vulnerable ...
Abstract—CSMA/CA, the contention mechanism of the IEEE 802.11 DCF medium access protocol, has recent...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
Abstract—Recently, tuning the clear channel assessment (CCA) threshold in conjunction with power con...
In wireless communication environments, backoff is traditionally based on the IEEE binary exponentia...
A well known defect of the standard exponential back-off algorithm used in IEEE 802.11 is its short-...
Abstract: The Medium Access Control (MAC) protocol is the main element which determines the system t...
Both hidden terminals, intrinsic in a multi-hop wireless network, and unfairness, due to location-de...
Due to hidden terminals and a dynamic topology, contention among stations in an ad-hoc network is no...
Abstract — This paper analyzes and designs medium access control (MAC) protocols for wireless ad-hoc...
Wireless Medium Access Control (MAC) protocols such as IEEE 802.11 use distributed contention resolu...
Selfish behavior at the MAC layer can have devastating side effects on the performance of wireless n...
It is known that 802.11 is not resilient to selfish behavior and denial of service (DoS) attacks tar...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
One of the latest protocols developed for the Internet of Things networks is IEEE 802.11ah, proposed...
The 802.11e standard enables user configuration of several MAC parameters, making WLANs vulnerable ...
Abstract—CSMA/CA, the contention mechanism of the IEEE 802.11 DCF medium access protocol, has recent...
Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performan...
Abstract—Recently, tuning the clear channel assessment (CCA) threshold in conjunction with power con...
In wireless communication environments, backoff is traditionally based on the IEEE binary exponentia...
A well known defect of the standard exponential back-off algorithm used in IEEE 802.11 is its short-...
Abstract: The Medium Access Control (MAC) protocol is the main element which determines the system t...
Both hidden terminals, intrinsic in a multi-hop wireless network, and unfairness, due to location-de...
Due to hidden terminals and a dynamic topology, contention among stations in an ad-hoc network is no...
Abstract — This paper analyzes and designs medium access control (MAC) protocols for wireless ad-hoc...