Comparative Study of Hidden Node Problem and Solution Using Different Techniques and Protocols

نویسندگان

  • Viral V. Kapadia
  • Sudarshan N. Patel
  • Rutvij H. Jhaveri
چکیده

Hidden nodes in a wireless network refer to nodes that are out of range of other nodes or a collection of nodes. We will discuss a few problems introduced by the RTS/CTS mechanism of collision avoidance and focus on the virtual jamming problem, which allows a malicious node to effectively jam a large fragment of a wireless network at minimum expense of power. We have also discussed WiCCP (Wireless Central Coordinated Protocol) which is a protocol booster that also provides good solution to hidden nodes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

Hierarchal Grouping Strategy with Adaptive Power Tuning in ZigBee Wireless Sensor Networks

Designing wireless sensor networks should meet appropriate parameters such as quality of service (QoS) defined by different users. The variable physical conditions of the environment, processing and transmission power limitations and limited communication capabilities are the most important obstacles that influence QoS parameters such as throughput, delay, reliability and network lifetime. The ...

متن کامل

Comparative Efficacy of Three Control Protocols of Head Lice (Pediculus Humanus Capitis) Infesting Schoolchildren in Mashhad City, Iran

Background: Head lice infestation constitutes a serious health problem in marginalized areas where schoolchildren and their families are mostly affected. This study aimed to compare 3 lice control protocols approved by Ministry of  Health and Medical Education, based on 1% permethrin shampoo, 4% dimethicone lotion and (1:1) vinegar wet combing for the treatment of outpatients of Imam Reza Hospi...

متن کامل

A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security

Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...

متن کامل

Directional medium access control for ad hoc networks

Using directional antennas in ad hoc networks may introduce the well-known deafness problem, exacerbate the hidden terminal problem and the exposed terminal problem, add difficulty on mobile communication, and distort the operation of existing routing and TCP protocols. Although a lot of studies have been undertaken on the directional MAC protocols, most of them focus only on one or several asp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1003.4070  شماره 

صفحات  -

تاریخ انتشار 2010