Passive and Active Hidden Terminal Detection in 802.11-based Ad Hoc Networks
نویسندگان
چکیده
To preventively detect hidden terminals in a node’s vicinity, two detection mechanisms, referred to as passive detection and active detection, are proposed and compared in this poster. Simulations based on IEEE 802.11-based ad hoc networks are carried out to evaluate the proposed schemes.
منابع مشابه
Hidden Terminal Detection in 802.11-based WirelessAd Hoc Networks - 802.11k
The hidden terminal problem is a well-known phenomenon in wireless networks. Mechanisms to eliminate the effect of hidden terminals have been proposed and standardized. These mechanisms are usually used, however, without being aware of the existence of any hidden terminals. Hidden terminal detection, on the other hand, provides such awareness, which is useful when deciding whether or when these...
متن کاملA Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks
Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. Although RTS/CTS transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...
متن کاملDelay Analysis of IEEE 802.11 Ad Hoc Networks in Finite Load Conditions under the Hidden Terminal Problem
The paper presents an analytical model for the estimation of media access delay for IEEE 802.11 ad hoc networks in finite load conditions under the hidden terminal problem. The simulation results show that the analytical estimated media access delay metric is fairly accurate.
متن کاملOn the Hidden Terminal Jamming Problem in IEEE 802.11 Mobile Ad Hoc Networks
This paper addresses recent experimental measurements from an IEEE 802.11 ad hoc network testbed, which indicate a strong signal strength dependence in the ability of a hidden terminal to gain access to the radio channel. We present analytical results investigating the ‘hidden terminal jamming’ ability of the IEEE 802.11 DSSS physical layer. Results indicate that in a hidden terminal topology, ...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کامل