RSSI is known to be a fickle indicator of whether a wireless link will work, for many reasons. This greatly complicates operation because it requires testing and adaptation to find the best …
Wireless transmissions are inherently vulnerable to jamming attacks. Frequency hopping (FH) and transmission rate adaptation (RA) have been separately used to mitigate jamming …
The huge adoption of 802.11 technologies has triggered a vast amount of experimentally- driven research works. These works range from performance analysis to protocol …
V Shrivastava, S Rayanchu, S Banerjee… - … USENIX Symposium on …, 2011 - usenix.org
Trends in enterprise WLAN usage and deployment point to the need for tools that can capture interference in real time. A tool for interference estimation can not only enable …
Driven by the advent of sophisticated and ubiquitous applications, and the ever-growing need for information, wireless networks are without a doubt steadily evolving into profoundly …
We investigate the resiliency of IEEE802. 11 rate adaptation algorithms (RAA) against smart jamming attacks. We consider several classes of state-of-the-art RAAs that include the …
This paper presents Recitation, the first software system that uses lightweight channel state information (CSI) to accurately predict error-prone bit positions in a packet so that …
Development of energy-efficient protocols and algorithms requires in-depth understanding of the power consumption characteristics of real world devices. To this aim, energy efficiency …
Internet of Things (IoT) is a promising technology that uses wireless sensor networks to enable data collection, monitoring, and transmission from the physical devices to the …