Results 81 to 90 of about 296,628 (229)

Cyber–Physical–Social Security of High‐DER‐Penetrated Smart Grids: Threats, Countermeasures, and Challenges

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
With the trend of large‐scale renewable distributed energy sources (DERs) penetrating into the smart grids (SGs), the SGs entail heavy reliance on information and communication technologies (ICT) and increasing impact of social behaviors on system operation and management. The SGs can be viewed as cyber–physical–social systems (CPSSs).
Qiuyu Lu   +4 more
wiley   +1 more source

Performance Analysis of Industrial WLAN Based on EDCA Scheme Defined in IEEE802.11e

open access: yesTikrit Journal of Engineering Sciences, 2013
In the last few years wireless local area network (WLAN) technology and products have grown unusually. This growth has encouraged many researchers to employ WLAN technology in different application Areas.
Enaam F. Khuder
doaj   +1 more source

Performance Analysis of Synchronous Multi-Radio Multi-Link MAC Protocols in IEEE 802.11be Extremely High Throughput WLANs

open access: yesApplied Sciences, 2020
The representative media access control (MAC) mechanism of IEEE 802.11 is a distributed coordination function (DCF), which operates based on carrier-sense multiple access with collision avoidance (CSMA/CA) with binary exponential backoff.
Taewon Song, Taeyoon Kim
doaj   +1 more source

Radio Frequency Fingerprinting for WiFi Authentication Based on Detrended Fluctuation Analysis

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Traditional physical‐layer authentication (PLA) approaches primarily rely on a limited set of hardware features, which restricts their robustness and accuracy in dynamic wireless environments. This paper proposes a novel PLA enhancement framework based on nonlinear signal analysis, introducing detrended fluctuation analysis (DFA) as a distinctive ...
Shuguang Wang   +6 more
wiley   +1 more source

Contention- and Interference-Aware Flow-Based Routing in Wireless Mesh Networks: Design and Evaluation of a Novel Routing Metric

open access: yesEURASIP Journal on Wireless Communications and Networking, 2010
As the popularity of IEEE 802.11-based Wireless Mesh Networks (WMNs) grows, end users of these environments demand better performance and quality of service (QoS).
Catalan-Cid Miguel   +3 more
doaj  

Energy Efficient Adaptive Bit‐Mapping Based Collision‐Free MAC Protocol for VANETs

open access: yesIET Intelligent Transport Systems, Volume 19, Issue 1, January/December 2025.
In the present work, an energy‐efficient medium access control (MAC) protocol is proposed for the adaptive data traffic condition in VANET. The proposed protocol optimizes communication efficiency and energy conservation through a holistic approach that considers the dynamic nature of both the vehicles' energy resources and their data buffering ...
Manoj Tolani   +2 more
wiley   +1 more source

Evaluación de la conectividad IPV6 en la banda de 2,4 Ghz

open access: yesMaskana, 2015
Nowadays, there are many wireless technologies that work in the 2.4GHz ISM band. This is extremely true for data networks in the local and personal area, which are called WLAN and WPAN, respectively.
Carlos Roberto Egas Acosta   +1 more
doaj  

Open-source implementation of an ad-hoc IEEE802.11a/g/p software-defined radio on low-power and low-cost general purpose processors [PDF]

open access: yesRadioengineering, 2017
This work proposes a low-cost and low-power software-defined radio open-source platform with IEEE 802.11 a/g/p wireless communication capability. A state-of-the-art version of the IEEE 802.11 a/g/p software for GNU Radio (a free and open-source software ...
S. Ciccia, G. Giordanengo, G. Vecchi
doaj  

Ack Spoofing Attack in IEEE 802.11 Infrastructure WLANs: Strategies, Detection and Mitigation

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
This paper provides a comprehensive analysis of the Ack spoofing attack and offers practical solutions to enhance the security of IEEE 802.11 networks. Through detailed simulations and analysis, the effectiveness of proposed attack strategies and detection and mitigation technique is demonstrated across various scenarios.
Ayat Al‐Wraikat   +2 more
wiley   +1 more source

Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels

open access: yesSensors, 2009
We study the problem of how to alleviate the exposed terminal effect in multihop wireless networks in the presence of log-normal shadowing channels.
Seung Min Hur, In Keun Son, Shiwen Mao
doaj   +1 more source

Home - About - Disclaimer - Privacy