Attacking and securing beacon-enabled 802.15.4 networks
Abstract
References
- Attacking and securing beacon-enabled 802.15.4 networks
Recommendations
A mathematical model for performance of IEEE 802.15.4 beacon-enabled mode
IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World WirelesslyIn this paper a Personal Area Network (PAN) composed of multiple nodes, which transmit data to the PAN coordinator through the beacon-enabled mode of the IEEE 802.15.4 Medium Access Control (MAC) protocol, is considered. Upon reception of the beacon ...
An Energy Consumption Analysis of Beacon Enabled Slotted CSMA/CA IEEE 802.15.4
WAINA '14: Proceedings of the 2014 28th International Conference on Advanced Information Networking and Applications WorkshopsDue to low power consumption and low duty cycle, IEEE 802.15.4 standard is widely used for Low Rate Wireless Personal Area Networks (LR - WPANs). It works in Beacon Enabled (BEn) and Non Beacon Enabled (NBEn) mode. In BEn mode, it has Contention Access ...
Adaptive GTS allocation in IEEE 802.15.4 for real-time wireless sensor networks
The IEEE 802.15.4 standard is able to achieve low-power transmissions in low-rate and short-distance Wireless Personal Area Networks (WPANs). It supports a Guaranteed Time Slots (GTSs) allocation mechanism for time-critical and delay-sensitive data ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in