This paper presents ZigZag, an 802.11 receiver design that combats hidden terminals. ZigZag's core contribution is a new form of interference cancellation that exploits asynchrony across successive collisions. Specifically, 802.11 retransmissions, in the case of hidden terminals, cause successive collisions. These collisions have different interference-free stretches at their start, which ZigZag exploits to bootstrap its decoding. ZigZag makes no changes to the 802.11 MAC and introduces no overhead when there are no collisions. But, when senders collide, ZigZag attains the same throughput as if the colliding packets were a priori scheduled in separate time slots. We build a prototype of ZigZag in GNU Radio. In a testbed of 14 USRP nodes, Zi...
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehavin...
We specify and analyze two variants of floor acquisition multiple access protocols for single-channe...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
This paper presents ZigZag, an 802.11 receiver that combats hidden terminals. ZigZag exploits 802.11...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
Abstract—Business and entertainment increasingly depend on WLANs, as they provide flexibility of loc...
Most of today’s wireless communication devices operate on unlicensed bands with uncoordinated spectr...
© 2015 IEEE. This paper focuses on the Medium Access Control (MAC) layer design for an inevitable Hi...
We study the impact of RF interference on 802.11 networks, both from devices such as Zigbee and cord...
In the last decade, 802.11 wireless devices data-rates have increased by three orders of magnitude, ...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
The uplink data rate region for interfering transmissions in wireless networks has been characterise...
[[abstract]]Resolving hidden terminal problem is one of the major responsibilities in designing MAC ...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
Abstract — The limited number of orthogonal channels and autonomous installations of hotspots and ho...
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehavin...
We specify and analyze two variants of floor acquisition multiple access protocols for single-channe...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
This paper presents ZigZag, an 802.11 receiver that combats hidden terminals. ZigZag exploits 802.11...
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer S...
Abstract—Business and entertainment increasingly depend on WLANs, as they provide flexibility of loc...
Most of today’s wireless communication devices operate on unlicensed bands with uncoordinated spectr...
© 2015 IEEE. This paper focuses on the Medium Access Control (MAC) layer design for an inevitable Hi...
We study the impact of RF interference on 802.11 networks, both from devices such as Zigbee and cord...
In the last decade, 802.11 wireless devices data-rates have increased by three orders of magnitude, ...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...
The uplink data rate region for interfering transmissions in wireless networks has been characterise...
[[abstract]]Resolving hidden terminal problem is one of the major responsibilities in designing MAC ...
The IEEE 802.11 protocol inherently provides the same long- term throughput to all the clients assoc...
Abstract — The limited number of orthogonal channels and autonomous installations of hotspots and ho...
The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehavin...
We specify and analyze two variants of floor acquisition multiple access protocols for single-channe...
The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associ...