Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs
暂无分享,去创建一个
[1] XiaoYang,et al. Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols , 2003 .
[2] J. Tourrilhes. Packet frame grouping: improving IP multimedia performance over CSMA/CA , 1998, ICUPC '98. IEEE 1998 International Conference on Universal Personal Communications. Conference Proceedings (Cat. No.98TH8384).
[3] Theodore Antonakopoulos,et al. CSMA/CA performance under high traffic conditions: throughput and delay analysis , 2002, Comput. Commun..
[4] Thierry Turletti,et al. Modeling and analysis of slow CW decrease IEEE 802.11 WLAN , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[5] Ieee . Wg. Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification , 2003 .
[6] David Malone,et al. Aggregation with fragment retransmission for very high-speed WLANs , 2009, TNET.
[7] Yang Xiao. Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.
[8] Frederic P. Miller,et al. Advanced Encryption Standard , 2009 .
[9] Yang Xiao,et al. Refinements on IEEE 802.11 Distributed Coordination Function Modeling Approaches , 2010, IEEE Transactions on Vehicular Technology.
[10] Qijun Gu,et al. Defence against packet injection in ad hoc networks , 2007, Int. J. Secur. Networks.
[11] Sync TGn. TGn Sync Proposal Technical Specification , 2004 .
[12] Yang Xiao,et al. Performance analysis of priority schemes for IEEE 802.11 and IEEE 802.11e wireless LANs , 2005, IEEE Transactions on Wireless Communications.
[13] Yang Xiao,et al. Building a wireless capturing tool for WiFi , 2009, Secur. Commun. Networks.
[14] Nitin H. Vaidya,et al. A wireless MAC protocol using implicit pipelining , 2006, IEEE Transactions on Mobile Computing.
[15] Sunghyun Choi,et al. EBA: an enhancement of the IEEE 802.11 DCF via distributed reservation , 2005, IEEE Transactions on Mobile Computing.
[16] Joseph B. Evans,et al. Wireless networking security: open issues in trust, management, interoperation and measurement , 2006, Int. J. Secur. Networks.
[17] Yang Xiao,et al. MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..
[18] Yang Xiao. Accountability for wireless LANs, ad hoc networks, and wireless mesh networks , 2008, IEEE Communications Magazine.
[19] Robert A. Malaney. Securing Wi-Fi networks with position verification: extended version , 2007, Int. J. Secur. Networks.
[20] Kee Chaing Chua,et al. A Capacity Analysis for the IEEE 802.11 MAC Protocol , 2001, Wirel. Networks.
[21] Hsiao-Hwa Chen,et al. IEEE 802.11n MAC frame aggregation mechanisms for next-generation high-throughput WLANs , 2008, IEEE Wireless Communications.
[22] Luigi Fratta,et al. Performance evaluation and enhancement of the CSMA/CA MAC protocol for 802.11 wireless LANs , 1996, Proceedings of PIMRC '96 - 7th International Symposium on Personal, Indoor, and Mobile Communications.
[23] Yang Xiao. IEEE 802.11 performance enhancement via concatenation and piggyback mechanisms , 2005, IEEE Transactions on Wireless Communications.
[24] Sanjay Gupta,et al. Performance modeling of asynchronous data transfer methods of IEEE 802.11 MAC protocol , 1997, Wirel. Networks.
[25] Yang Xiao,et al. Throughput and delay limits of IEEE 802.11 , 2002, IEEE Communications Letters.
[26] Raheem A. Beyah,et al. Using link RTT to passively detect unapproved wireless nodes , 2009, Int. J. Secur. Networks.
[27] Yang Xiao,et al. Optimization between AES security and performance for IEEE 802.15.3 WPAN , 2009, IEEE Transactions on Wireless Communications.
[28] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[29] Lars R. Knudsen,et al. Advanced Encryption Standard (AES) - An Update , 1999, IMACC.
[30] David Malone,et al. A new MAC scheme for very high-speed WLANs , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[31] Vasileios Karyotis,et al. A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks , 2006, Int. J. Secur. Networks.
[32] Yang Xiao,et al. Efficient MAC strategies for the IEEE 802.11n wireless LANs , 2006, Wirel. Commun. Mob. Comput..
[33] Kin K. Leung,et al. On optimizing backoff counter reservation and classifying stations for the IEEE 802.11 distributed wireless LANs , 2006, IEEE Transactions on Parallel and Distributed Systems.
[34] Yuanyuan Yang,et al. Priority-based opportunistic MAC protocol in IEEE 802.11 WLANs , 2008, Int. J. Sens. Networks.
[35] Yang Xiao. A simple and effective priority scheme for IEEE 802.11 , 2003, IEEE Communications Letters.
[36] Bo Sun,et al. Performance Analysis of Advanced Encryption Standard (AES). , 2006 .
[37] Daisuke Takahashi,et al. Retrieving knowledge from auditing log-files for computer and network forensics and accountability , 2008, Secur. Commun. Networks.
[38] Yang Xiao,et al. IEEE 802.11n: enhancements for higher throughput in wireless LANs , 2005, IEEE Wireless Communications.
[39] V. Vitsas,et al. Enhancing performance of the IEEE 802.11 distributed coordination function via packet bursting , 2004, IEEE Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004..
[40] Yi Pan,et al. Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs , 2006, Int. J. Wirel. Mob. Comput..
[41] Pin-Han Ho,et al. A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks , 2008, Int. J. Secur. Networks.
[42] Haitao Wu,et al. Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[43] Mark A. Shayman,et al. On pairwise connectivity of wireless multihop networks , 2007, Int. J. Secur. Networks.
[44] Ruhai Wang,et al. NIS05-1: Performance Analysis of Advanced Encryption Standard (AES) , 2006, IEEE Globecom 2006.
[45] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[46] Mani B. Srivastava,et al. Adaptive frame length control for improving wireless link throughput, range, and energy efficiency , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[47] Marco Conti,et al. Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit , 2000, TNET.
[48] Yang Xiao,et al. Performance analysis and enhancement for the current and future IEEE 802.11 MAC protocols , 2003, MOCO.
[49] Edward W. Knightly,et al. Opportunistic media access for multirate ad hoc networks , 2002, MobiCom '02.
[50] Chuan Heng Foh,et al. Comments on IEEE 802.11 saturation throughput analysis with freezing of backoff counters , 2005, IEEE Communications Letters.
[51] G. Bianchi,et al. IEEE 802.11-saturation throughput analysis , 1998, IEEE Communications Letters.
[52] Yang Xiao. Efficient MAC strategies for the IEEE 802.11n wireless LANs: Research Articles , 2006 .
[53] Yang Xiao,et al. Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks , 2007, Int. J. Wirel. Mob. Comput..