Security Review of B-MAC Communication Protocol
نویسندگان
چکیده
منابع مشابه
TAB-MAC: Assisted beamforming MAC protocol for Terahertz communication networks
Terahertz (THz) communication is envisioned as one of the key technologies to satisfy the increasing demand for higher-speed wireless communication networks. The very high path loss at THz frequencies and the power limitations of THz transceivers limit the communication distance in THz networks. Beamforming directional antennas are needed simultaneously in transmission and in reception to commu...
متن کاملAnalysis of a mobile communication security protocol
Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle design flaws. Formal verification techniques provide rigid and thorough means to evaluate security protocols. This paper demonstrates the process of formal verification by applying a logic to a security protocol intended ...
متن کاملPerformance analysis of a MAC protocol for vehicular multimedia communication
Medium access control (MAC) protocols, responsible for sharing the channel among users, are receiving more attention especially in vehicular networks due to the highly dynamic nature of the environment in which they operate. Typically MAC protocols were designed for one traffic class such as voice, video or data as all of them have different characteristics. In this paper, we introduce a modifi...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملA MAC layer protocol for Wireless Communication in Embedded Systems
The design of wireless embedded systems for real-time applications requires a careful management of timing and energy requirements. This paper describes a wireless communication protocol that can guarantee both message deadlines and system lifetime by properly allocating the network bandwidth to each node. The protocol allows multi-hop wireless communication under different network topologies. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Digital Policy and Management
سال: 2013
ISSN: 1738-1916
DOI: 10.14400/jdpm.2013.11.12.447