Loading...
Search for: personal-communication-systems
0.006 seconds

    Throughput modeling of distributed reservation protocol

    , Article IEEE Transactions on Mobile Computing ; Volume 15, Issue 2 , 2016 , Pages 503-515 ; 15361233 (ISSN) Ajorloo, H ; Manzuri Shalmani, M. T ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    To evaluate the performance of distributed mediumaccess control (MAC) layer of emerging ultra wideband (UWB) and 60-GHz millimeter wave (mmWave) wireless personal area networks (WPANs) based on distributed reservation protocol (DRP) of ECMA-368 and ECMA-387 standards, we provide an analytical model for the probability distribution of steady state throughput as a function of the network dimensions size, number of devices, antenna beamwidth, transmission range, bit error rate (BER), antenna disturbance rate (ADR), aggregation length, payload size, and incoming frame rate. Using this model, the optimal payload size is computed as an example of optimization problem.We also propose a formula for... 

    A lightweight signcryption scheme for defense against fragment duplication attack in the 6LoWPAN networks

    , Article Peer-to-Peer Networking and Applications ; 2018 , Pages 1-18 ; 19366442 (ISSN) Nikravan, M ; Movaghar, A ; Hosseinzadeh, M ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    The Internet of Things (IoT) presents a new paradigm of the future Internet that intends to provide interactive communication between various processing objects via heterogeneous networks. The IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) is an IPv6 adaptation sub-layer and provides the requirements of IP connectivity between resource-constrained devices in lossy, low power networks. Since the size of a packet in the IPv6 is larger than the size of a frame in the IEEE 802.15.4, the 6LoWPAN adaptation layer performs packet fragmentation. In this paper, first, the 6LoWPAN fragmentation mechanism in terms of security issues is analyzed and then, fragment duplication attack which... 

    Breaking anonymity of some recent lightweight RFID authentication protocols

    , Article Wireless Networks ; Volume 25, Issue 3 , 2018 , Pages 1-18 ; 10220038 (ISSN) Baghery, K ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks... 

    Breaking anonymity of some recent lightweight RFID authentication protocols

    , Article Wireless Networks ; Volume 25, Issue 3 , 2019 , Pages 1235-1252 ; 10220038 (ISSN) Baghery, K ; Abdolmaleki, B ; Khazaei, S ; Aref, M. R ; Sharif University of Technology
    Springer New York LLC  2019
    Abstract
    Due to their impressive advantages, Radio Frequency IDentification (RFID) systems are ubiquitously found in various novel applications. These applications are usually in need of quick and accurate authentication or identification. In many cases, it has been shown that if such systems are not properly designed, an adversary can cause security and privacy concerns for end-users. In order to deal with these concerns, impressive endeavors have been made which have resulted in various RFID authentications being proposed. In this study, we analyze three lightweight RFID authentication protocols proposed in Wireless Personal Communications (2014), Computers & Security (2015) and Wireless Networks...