Performance Comparison and Improvement of Wireless Network Protocols

Author(s):  
G. E. Rizos ◽  
D.C. Vasiliadis ◽  
E. Stergiou
2017 ◽  
pp. 603-614
Author(s):  
Renato Mariz de Moraes ◽  
Hamid R. Sadjadpour

Author(s):  
M. IVANCIU ◽  
M. ALEXANDRU

The evolution of small drone technology raises new challenges regarding personal privacy due to the acquisition and flight of unlicensed small drones. Many of these small drones are controlled over Wi-Fi connection making them inexpensive and easy to control. Latest discoveries in vulnerabilities of wireless network protocols give us the advantage to use cyber-attacks as a method of defense. This paper is addressing general audience on how to create a personal shield against small drones with the advantage of being nonintrusive to the other surrounding wireless networks and, at the same time, protecting your personal privacy of a rogue drone.


2003 ◽  
Vol 52 (4) ◽  
pp. 1099-1109 ◽  
Author(s):  
Ruay-Shiung Chang ◽  
Wei-Yeh Chen ◽  
Yean-Fu Wen

2012 ◽  
Vol 6 (14) ◽  
pp. 2115 ◽  
Author(s):  
M.S. Obaidat ◽  
P. Nicopolitidis ◽  
S.K. Dhurandher

2014 ◽  
Vol 989-994 ◽  
pp. 4078-4081 ◽  
Author(s):  
Dong Qiu ◽  
Yan Xiang Yang

The IEEE 802.11 and IEEE 802.15.4 are two of the most popular wireless network protocols. And it is very important to look into the differences between IEEE 802.11 MAC and IEEE 802.15.4 MAC. The main goal of this paper is to look into the hidden terminal problem of the MAC layers of 802.11 and 802.15.4 based on NS2 platform. Through a dedicated experiment, the author compares the results based on the NAM animation and throughput and then explains the reasons respectively.


Sign in / Sign up

Export Citation Format

Share Document