Passive and Active Hidden Terminal Detection in 802.11-based Ad Hoc Networks

نویسندگان

  • Frank Y. Li
  • Arild Kristensen
  • Paal Engelstad
چکیده

To preventively detect hidden terminals in a node’s vicinity, two detection mechanisms, referred to as passive detection and active detection, are proposed and compared in this poster. Simulations based on IEEE 802.11-based ad hoc networks are carried out to evaluate the proposed schemes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hidden Terminal Detection in 802.11-based WirelessAd Hoc Networks - 802.11k

The hidden terminal problem is a well-known phenomenon in wireless networks. Mechanisms to eliminate the effect of hidden terminals have been proposed and standardized. These mechanisms are usually used, however, without being aware of the existence of any hidden terminals. Hidden terminal detection, on the other hand, provides such awareness, which is useful when deciding whether or when these...

متن کامل

A Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks

Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...

متن کامل

Delay Analysis of IEEE 802.11 Ad Hoc Networks in Finite Load Conditions under the Hidden Terminal Problem

The paper presents an analytical model for the estimation of media access delay for IEEE 802.11 ad hoc networks in finite load conditions under the hidden terminal problem. The simulation results show that the analytical estimated media access delay metric is fairly accurate.

متن کامل

On the Hidden Terminal Jamming Problem in IEEE 802.11 Mobile Ad Hoc Networks

This paper addresses recent experimental measurements from an IEEE 802.11 ad hoc network testbed, which indicate a strong signal strength dependence in the ability of a hidden terminal to gain access to the radio channel. We present analytical results investigating the ‘hidden terminal jamming’ ability of the IEEE 802.11 DSSS physical layer. Results indicate that in a hidden terminal topology, ...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006