A survey of beacon-enabled IEEE 802.15. 4 MAC protocols in wireless sensor networks

M Khanafer, M Guennoun… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
IEEE 802.15. 4 is the de facto standard for Wireless Sensor Networks (WSNs) that outlines
the specifications of the PHY layer and MAC sub-layer in these networks. The MAC protocol …

Wireless body area sensor networks: Survey of mac and routing protocols for patient monitoring under IEEE 802.15. 4 and IEEE 802.15. 6

MS Akbar, Z Hussain, M Sheng, R Shankaran - Sensors, 2022 - mdpi.com
Wireless body area sensor networks (WBASNs) have received growing attention from
industry and academia due to their exceptional potential for patient monitoring systems that …

Secure anonymous mutual authentication for star two-tier wireless body area networks

MH Ibrahim, S Kumari, AK Das, M Wazid… - Computer methods and …, 2016 - Elsevier
Background and objectives Mutual authentication is a very important service that must be
established between sensor nodes in wireless body area network (WBAN) to ensure the …

A comprehensive analysis of the MAC unreliability problem in IEEE 802.15. 4 wireless sensor networks

G Anastasi, M Conti… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) represent a very promising solution in the field of
wireless technologies for industrial applications. However, for a credible deployment of …

Reliability and energy-efficiency in IEEE 802.15. 4/ZigBee sensor networks: An adaptive and cross-layer approach

M Di Francesco, G Anastasi, M Conti… - IEEE Journal on …, 2011 - ieeexplore.ieee.org
A major concern in wireless sensor networks (WSNs) is energy conservation, since battery-
powered sensor nodes are expected to operate autonomously for a long time, eg, for months …

Security threats in ZigBee-enabled systems: Vulnerability evaluation, practical experiments, countermeasures, and lessons learned

N Vidgren, K Haataja, JL Patino-Andres… - 2013 46th Hawaii …, 2013 - ieeexplore.ieee.org
In this paper, two practical attacks against ZigBee security are proposed and the latter one is
also carried out in our laboratory environment. The attack scenarios are based on utilizing …

Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned

O Olawumi, K Haataja, M Asikainen… - … conference on hybrid …, 2014 - ieeexplore.ieee.org
In this paper, three practical attacks against ZigBee security are carried out in our laboratory
environment. The attack scenarios are based on utilizing several vulnerabilities found from …

Performance analysis of IEEE 802.15. 4 beacon-enabled mode

C Buratti - IEEE transactions on Vehicular Technology, 2010 - ieeexplore.ieee.org
In this paper, a mathematical model for the beacon-enabled mode of the IEEE 802.15. 4
medium-access control (MAC) protocol is provided. A personal area network (PAN) …

On enhancing technology coexistence in the IoT era: ZigBee and 802.11 case

EDN Ndih, S Cherkaoui - Ieee Access, 2016 - ieeexplore.ieee.org
ZigBee is often chosen as a technology to connect things because of characteristics, such as
network resilience, interoperability, and low power consumption. In addition, Zigbee Pro …

Industrial wireless sensor and actuator networks in industry 4.0: Exploring requirements, protocols, and challenges—A MAC survey

S Raza, M Faheem, M Guenes - International Journal of …, 2019 - Wiley Online Library
The vision to connect everyday physical objects to the Internet promises to create the
Internet of Things (IoT), which is expected to integrate the diverse technologies such as …