Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network

    Abdallah Elhigazi Abdallah1, Mosab Hamdan2, Shukor Abd Razak3, Fuad A. Ghalib3, Muzaffar Hamzah2,*, Suleman Khan4, Siddiq Ahmed Babikir Ali5, Mutaz H. H. Khairi1, Sayeed Salih6

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5607-5623, 2023, DOI:10.32604/cmc.2023.031047 - 28 December 2022

    Abstract IEEE 802.11 Wi-Fi networks are prone to many denial of service (DoS) attacks due to vulnerabilities at the media access control (MAC) layer of the 802.11 protocol. Due to the data transmission nature of the wireless local area network (WLAN) through radio waves, its communication is exposed to the possibility of being attacked by illegitimate users. Moreover, the security design of the wireless structure is vulnerable to versatile attacks. For example, the attacker can imitate genuine features, rendering classification-based methods inaccurate in differentiating between real and false messages. Although many security standards have been proposed… More >

  • Open Access

    ARTICLE

    Reinforcement Learning-Based Handover Scheme with Neighbor Beacon Frame Transmission

    Youngjun Kim1, Taekook Kim2, Hyungoo Choi1, Jinwoo Park1, Yeunwoong Kyung3,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 193-204, 2023, DOI:10.32604/iasc.2023.032784 - 29 September 2022

    Abstract Mobility support to change the connection from one access point (AP) to the next (i.e., handover) becomes one of the important issues in IEEE 802.11 wireless local area networks (WLANs). During handover, the channel scanning procedure, which aims to collect neighbor AP (NAP) information on all available channels, accounts for most of the delay time. To reduce the channel scanning procedure, a neighbor beacon frame transmission scheme (N-BTS) was proposed for a seamless handover. N-BTS can provide a seamless handover by removing the channel scanning procedure. However, N-BTS always requires operating overhead even if there More >

  • Open Access

    ARTICLE

    A Compact Quad-Band Sickle-Shaped Monopole Antenna for GSM 900/WiMax/WLAN Applications

    Sujit Goswami1,*, Sujit Kumar Mandal1, Soumen Banerjee2

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 397-410, 2022, DOI:10.32604/cmc.2022.025657 - 18 May 2022

    Abstract In this paper a novel, compact, microstrip-fed, quad-band monopole antenna is presented for the application of Global System for Mobile communication (GSM 900), Worldwide Interoperability for Microwave Access (WiMAX) and Wireless Local Area Network (WLAN). The proposed antenna comprises of a sickle-shaped structure with four circular arc strips, and a modified rectangular ground plane. The four strips of the antenna are independently responsible for the four different resonant frequencies of the operating bands and can be tuned separately to control the radiation performance. The proposed quad-band antenna is designed to resonate at 940 MHz for GSM More >

  • Open Access

    ARTICLE

    Analyzing and Enabling the Harmonious Coexistence of Heterogeneous Industrial Wireless Networks

    Bilal Khan1, Danish Shehzad1, Numan Shafi1, Ga-Young Kim2,*, Muhammad Umar Aftab1

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1671-1690, 2022, DOI:10.32604/cmc.2022.024918 - 18 May 2022

    Abstract Nowadays multiple wireless communication systems operate in industrial environments side by side. In such an environment performance of one wireless network can be degraded by the collocated hostile wireless network having higher transmission power or higher carrier sensing threshold. Unlike the previous research works which considered IEEE 802.15.4 for the Industrial Wireless communication systems (iWCS) this paper examines the coexistence of IEEE 802.11 based iWCS used for delay-stringent communication in process automation and gWLAN (general-purpose WLAN) used for non-real time communication. In this paper, we present a Markov chain-based performance model that described the transmission… More >

  • Open Access

    ARTICLE

    Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol

    Akram A. Almohammedi1,2,*, Vladimir Shepelev1, Sam Darshi3, Mohammed Balfaqih4, Fayad Ghawbar5

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3929-3943, 2022, DOI:10.32604/cmc.2022.026307 - 29 March 2022

    Abstract The widespread use of the Internet of Things (IoT) applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel. As a result, the security of the IoT has become a serious challenge in the field of information security. Steganography on the network is a critical tool for preventing the leakage of private information and enabling secure and encrypted communication. The primary purpose of steganography is to conceal sensitive information in any form of media such as audio, video, text, or photos, and securely… More >

  • Open Access

    ARTICLE

    IEEE802.11 Access Point's Service Set Identifier (SSID) for Localization and Tracking

    Mohammad Z. Masoud1,*, Yousef Jaradat1, Mohammad Alia2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5459-5476, 2022, DOI:10.32604/cmc.2022.023781 - 14 January 2022

    Abstract IEEE802.11, known as WiFi has proliferated in the last decade. It can be found in smartphones, laptops, smart TVs and surveillance cameras. This popularity has revealed many issues in health, data privacy and security. In this work, a WiFi measurement study has been conducted in Amman, the capital city of Jordan. An Android App has been written to harvest WiFi information of the transmitted frames of any surrounding Access points (APs). More than 240,000 APs information has been harvested in this work. The harvested data have been analyzed to find statistics of WiFi devices in… More >

  • Open Access

    ARTICLE

    Partially Overlapping Channel Assignment Using Bonded and Non-Bonded Channels in IEEE 802.11n WLAN

    Md. Selim Al Mamun1,2, Fatema Akhter1,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3161-3178, 2022, DOI:10.32604/cmc.2022.022214 - 07 December 2021

    Abstract Nowadays, wireless local area network (WLAN) has become prevalent Internet access due to its low-cost gadgets, flexible coverage and hassle-free simple wireless installation. WLAN facilitates wireless Internet services to users with mobile devices like smart phones, tablets, and laptops through deployment of multiple access points (APs) in a network field. Every AP operates on a frequency band called channel. Popular wireless standard such as IEEE 802.11n has a limited number of channels where frequency spectrum of adjacent channels overlaps partially with each other. In a crowded environment, users may experience poor Internet services due to… More >

  • Open Access

    ARTICLE

    Investigation of Techniques for VoIP Frame Aggregation Over A-MPDU 802.11n

    Qasem M. Kharma*, Abdelrahman H. Hussein, Faris M. Taweel, Mosleh M. Abualhaj, Qusai Y. Shambour

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 869-883, 2022, DOI:10.32604/iasc.2022.020415 - 22 September 2021

    Abstract The widespread and desirable features of IP and IEEE 802.11 networks have made these technologies a suitable medium for carrying voice over IP (VoIP). However, a bandwidth (BW) exploitation obstacle emerges when 802.11 networks are used to carry VoIP traffic. This BW exploitation obstacle is caused by the large 80-byte preamble size of the VoIP packet and a waiting time of 765 μs for each layer 2 VoIP frame. As a solution, IEEE 802.11n was consequently designed with a built-in layer 2 frame aggregation feature, but the adverse impact on the VoIP performance still needed More >

  • Open Access

    ARTICLE

    Performance Analysis and Throughput Enhancement of the STET Technique for WLAN IEEE 802.11ad

    M. Vanitha1,*, J. Kirubakaran2, K. Radhika2

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 571-579, 2022, DOI:10.32604/csse.2022.017663 - 09 September 2021

    Abstract The IEEE 802.11ad innovation has enabled the impact of remote devices in unauthorized 60 GHz unlicensed frequency band at Giga bits per second information transfer rate in speed concentrated 5G applications. We have presented an innovative work that deals with the upgradation of the ability of IEEE 802.11ad wireless LAN to make it suitable for wireless applications. An exact examination on the IEEE 802.11ad analysis has been carried out in this work to achieve the greatest throughput. This has pulled attraction in broad consideration for accomplishing the pinnacle transmission rate of 8 Gbit/s. IEEE 802.11ad… More >

  • Open Access

    ARTICLE

    An Efficient Medium Access Control Mechanism for Flying Ad-hoc Networks

    Muhammad Asghar Khan1,*, Fazal Noor2, Insaf Ullah3, Sajjad ur Rehman4, Shibli Nisar5, Mohaira Ahmad5

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 47-63, 2021, DOI:10.32604/csse.2021.016430 - 01 April 2021

    Abstract The Flying Ad-hoc Networks (FANETs) is characterized by the transition from a single large Unmanned Aerial Vehicle (UAV) to multiple small UAVs connected in an ad-hoc fashion. Since high mobility is the core feature of such networks, they are prone to route breaks within the links. The issue of connectivity loss can be coped with, to some extent, by making use of omnidirectional antennas. Such modification, however, curtails Quality-of-Service (QoS) requirements of networks in terms of bandwidth, media access delay, coverage and others. Alternately, directional antennas have advantages over omnidirectional antennas such as improved transmission… More >

Displaying 1-10 on page 1 of 11. Per Page