Security Review of B-MAC Communication Protocol

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TAB-MAC: Assisted beamforming MAC protocol for Terahertz communication networks

Terahertz (THz) communication is envisioned as one of the key technologies to satisfy the increasing demand for higher-speed wireless communication networks. The very high path loss at THz frequencies and the power limitations of THz transceivers limit the communication distance in THz networks. Beamforming directional antennas are needed simultaneously in transmission and in reception to commu...

متن کامل

Analysis of a mobile communication security protocol

Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle design flaws. Formal verification techniques provide rigid and thorough means to evaluate security protocols. This paper demonstrates the process of formal verification by applying a logic to a security protocol intended ...

متن کامل

Performance analysis of a MAC protocol for vehicular multimedia communication

Medium access control (MAC) protocols, responsible for sharing the channel among users, are receiving more attention especially in vehicular networks due to the highly dynamic nature of the environment in which they operate. Typically MAC protocols were designed for one traffic class such as voice, video or data as all of them have different characteristics. In this paper, we introduce a modifi...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

A MAC layer protocol for Wireless Communication in Embedded Systems

The design of wireless embedded systems for real-time applications requires a careful management of timing and energy requirements. This paper describes a wireless communication protocol that can guarantee both message deadlines and system lifetime by properly allocating the network bandwidth to each node. The protocol allows multi-hop wireless communication under different network topologies. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Digital Policy and Management

سال: 2013

ISSN: 1738-1916

DOI: 10.14400/jdpm.2013.11.12.447