Journal articles on the topic 'Computer networks – Access control'

To see the other types of publications on this topic, follow the link: Computer networks – Access control.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer networks – Access control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Russell, D. "Access Control Techniques and Their Impact on User Accessibility in Computer Networks." SIJ Transactions on Computer Networks & Communication Engineering 7, no. 5 (October 31, 2019): 16–19. http://dx.doi.org/10.9756/sijcnce/v7i5/07051014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Slabyshev, Mykhailo O., and Anatolij G. Berdnikov. "Model of control access process in wireless computer network." 47, no. 47 (September 28, 2020): 72–79. http://dx.doi.org/10.26565/2304-6201-2020-47-06.

Full text
Abstract:
The problem of ensuring the minimum delivery time of information with prevention of collisions is a pressing problem in ACS TP, since collisions often occur during transmission or the delay time of information is not optimal. This problem is solved by the use of wireless computer networks and methods of information transmission with collision prevention, which affect the delay time of information transmission. The developed model of the access control process in wireless computer networks solves the problem of effective information transfer with collision prevention. The purpose of using this model is to reduce the delay in information transmission. ACS TP often needs modernization as technical innovations are becoming available. At the same time, the quality of production should not fluctuate. The most important element of modernization is the use of wireless technologies that save money and time, compared to the deployment of wired networks. The aim of the work is to develop the model of control access process in a wireless computer network with collision prevention. The process of forming delay slots for information transfer has been researched. The object of the study is a wireless computer network in the ACS TP. The subject of the study is a model of control access process in a wireless computer network with collision prevention. The research objectives are to create requirements for the model, to propose a structure, to create a model, to conduct tests and evaluate the obtained results. The model of access control process in a wireless computer network designed to transmit information with prevention of collisions in a wireless computer network has been developed.
APA, Harvard, Vancouver, ISO, and other styles
3

Karger, Paul A. "Authentication and discretionary access control in computer networks." Computers & Security 5, no. 4 (December 1986): 314–24. http://dx.doi.org/10.1016/0167-4048(86)90052-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Karger, Paul A. "Authentication and discretionary access control in computer networks." Computer Networks and ISDN Systems 10, no. 1 (August 1985): 27–37. http://dx.doi.org/10.1016/0169-7552(85)90036-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Dae-Young, Dae-sik Ko, and Seokhoon Kim. "Network Access Control for Location-Based Mobile Services in Heterogeneous Wireless Networks." Mobile Information Systems 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/6195024.

Full text
Abstract:
Recent advances in information communication technology and software have enabled mobile terminals to employ various capabilities as a smartphone. They adopt multiple interfaces for wireless communication and run as a portable computer. Mobile services are also transferred from voice to data. Mobile terminals can access Internet for data services anytime anywhere. By using location-based information, improved mobile services are enabled in heterogeneous networks. In the mobile service environment, it is required that mobile terminals should efficiently use wireless network resources. In addition, because video stream becomes a major service among the data services of mobile terminals in heterogeneous networks, the necessity of the efficient network access control for heterogeneous wireless networks is raised as an important topic. That is, quality of services of the location-based video stream is determined by the network access control. Therefore, this paper proposes a novel network access control in the heterogeneous wireless networks. The proposed method estimates the network status with Naïve Bayesian Classifier and performs network access control according to the estimated network status. Thus, it improves data transmission efficiency to satisfy the quality of services. The efficiency of the proposed method is validated through the extensive computer simulation.
APA, Harvard, Vancouver, ISO, and other styles
6

Nour, Boubakr, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, and Hassine Moungla. "Access Control Mechanisms in Named Data Networks." ACM Computing Surveys 54, no. 3 (June 2021): 1–35. http://dx.doi.org/10.1145/3442150.

Full text
Abstract:
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC . Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.
APA, Harvard, Vancouver, ISO, and other styles
7

Alicea, Michael, and Izzat Alsmadi. "Misconfiguration in Firewalls and Network Access Controls: Literature Review." Future Internet 13, no. 11 (November 8, 2021): 283. http://dx.doi.org/10.3390/fi13110283.

Full text
Abstract:
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control roles added to the firewall that will control network traffic. In this paper, we evaluated recent research trends and open challenges related to firewalls and access controls in general and misconfiguration problems in particular. With the recent advances in next-generation (NG) firewalls, firewall roles can be auto-generated based on networks and threats. Nonetheless, and due to the large number of roles in any medium to large networks, roles’ misconfiguration may occur for several reasons and will impact the performance of the firewall and overall network and protection efficiency.
APA, Harvard, Vancouver, ISO, and other styles
8

Habib, Ibrahim W., and Tarek N. Saadawi. "Access flow control algorithms in broadband networks." Computer Communications 15, no. 5 (June 1992): 326–32. http://dx.doi.org/10.1016/0140-3664(92)90093-t.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ali, Muneeb, Umar Saif, Adam Dunkels, Thiemo Voigt, Kay Römer, Koen Langendoen, Joseph Polastre, and Zartash Afzal Uzmi. "Medium access control issues in sensor networks." ACM SIGCOMM Computer Communication Review 36, no. 2 (April 28, 2006): 33–36. http://dx.doi.org/10.1145/1129582.1129592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Harikrishnan, Harshini, Aarjish Sarkar, Shams Al Ajrawi, Albena Mihovska, and Christopher Paolini. "Medium Access Control Protocols for Brain Computer Interface Applications." International Journal of Interdisciplinary Telecommunications and Networking 13, no. 2 (April 2021): 24–41. http://dx.doi.org/10.4018/ijitn.2021040103.

Full text
Abstract:
Noteworthy advancements have occurred in the field of brain computer interfaces (BCI) in the last decade. The transmission of the collected signals to the corresponding organ through a wireless link is still in a nascent stage. This paper investigates the feasibility of having multiple UHF-RFID transmitters inside the skull which communicate to the receiver outside. The purpose of this paper is to design a wireless communication channel and enhance the communication using a MAC protocol. The existing MAC protocols were analyzed to be used in a BCI application. Though the combination of existing protocols seems like a possibility to use in a BCI system, the complexity of such a protocol is high. This drawback is overcome by proposing a novel MAC protocol. The performance of the proposed MAC algorithm is related with the widely used Q algorithm for anti-collision in the RFID tags. Parameters like delay and collisions are analyzed in detail which are essential to build a consistent, energy efficient, and a low power BCI system.
APA, Harvard, Vancouver, ISO, and other styles
11

Shan, Fangfang, Hui Li, Fenghua Li, Yunchuan Guo, and Ben Niu. "HAC: Hybrid Access Control for Online Social Networks." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/7384194.

Full text
Abstract:
The rapid development of communication and network technologies including mobile networks and GPS presents new characteristics of OSNs. These new characteristics pose extra requirements on the access control schemes of OSNs, which cannot be satisfied by relationship-based access control currently. In this paper, we propose a hybrid access control model (HAC) which leverages attributes and relationships to control access to resources. A new policy specification language is developed to define policies considering the relationships and attributes of users. A path checking algorithm is proposed to figure out whether paths between two users can fit in with the hybrid policy. We develop a prototype system and demonstrate the feasibility of the proposed model.
APA, Harvard, Vancouver, ISO, and other styles
12

Uhl, Tadeusz, and Bruno Müller-Clostermann. "Performance analysis of a new network access flow control method in computer communication networks." European Transactions on Telecommunications 1, no. 3 (May 1990): 247–55. http://dx.doi.org/10.1002/ett.4460010304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Yixuan, Jingsha He, Bin Zhao, Zhiqing Huang, and Ruohong Liu. "Towards more pro-active access control in computer systems and networks." Computers & Security 49 (March 2015): 132–46. http://dx.doi.org/10.1016/j.cose.2014.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Tong, Liyun, Yang Liu, Yuanyuan Li, Jianquan Lu, Zhen Wang, and Fuad E. Alsaadi. "Robust Control Invariance of Probabilistic Boolean Control Networks via Event-Triggered Control." IEEE Access 6 (2018): 37767–74. http://dx.doi.org/10.1109/access.2018.2828128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Opaska, Walter P. "Access Control Systems for Personal Computers." EDPACS 14, no. 2 (August 1986): 6–8. http://dx.doi.org/10.1080/07366988609450362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Malomsoky, Szabolcs, Sándor Rácz, and Szilveszter Nádas. "Connection admission control in UMTS radio access networks." Computer Communications 26, no. 17 (November 2003): 2011–23. http://dx.doi.org/10.1016/s0140-3664(03)00165-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Jiang, Lurong, Qiaoyu Xu, Hangyi Pan, Yanyun Dai, and Jijun Tong. "Virus Propagation in Wireless Sensor Networks with Media Access Control Mechanism." Security and Communication Networks 2020 (November 20, 2020): 1–11. http://dx.doi.org/10.1155/2020/6513920.

Full text
Abstract:
In wireless sensor networks, network security against virus propagation is one of the challenges with the applications. In severe cases, the network system may become paralyzed. In order to study the process of virus propagation in wireless sensor networks with the media access control mechanism, this paper uses the susceptible-infectious-removed (SIR) model to analyze the spreading process. It provides a theoretical basis for the development of virus immune mechanisms to solve network virus attack hidden dangers. The research shows that the media access control (MAC) mechanism in the wireless sensor network can inhibit the process of virus propagation, reduce the network virus propagating speed, and decrease the scale of infected nodes. The listen/sleep duty cycle of this mechanism will affect the suppression effect of virus propagation. The smaller the listen/sleep duty cycle, the stronger the suppression effect. Energy consumption has a peak value under specific infection probability. Meanwhile, it is also found that the spreading scale of the virus in wireless sensor networks can be effectively inhibited by the MAC mechanism.
APA, Harvard, Vancouver, ISO, and other styles
18

Zhu, Yun, Jiade Li, Qiuyuan Huang, and Dapeng Wu. "Game Theoretic Approach for Network Access Control in Heterogeneous Networks." IEEE Transactions on Vehicular Technology 67, no. 10 (October 2018): 9856–66. http://dx.doi.org/10.1109/tvt.2018.2856752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Yuen, C., and P. Marbach. "Price-based rate control in random access networks." IEEE/ACM Transactions on Networking 13, no. 5 (October 2005): 1027–40. http://dx.doi.org/10.1109/tnet.2005.858448.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Sihotang, Bil Klinton, Sumarno Sumarno, and Bahrudi Efendi Damanik. "Implementasi Access Control List Pada Mikrotik dalam Mengamankan Koneksi Internet Koperasi Sumber Dana Mutiara." JURIKOM (Jurnal Riset Komputer) 7, no. 2 (April 26, 2020): 229. http://dx.doi.org/10.30865/jurikom.v7i2.2010.

Full text
Abstract:
The need for information and internet access at this time is very high. To accept it is wrong only with computer networks as a medium. In a network that requires a network that has been segmented using a Virtual Local Area Network (VLAN), the application of an Access Control List (ACL) is required to be granted access rights for each device in the network. The Access Control List (ACL) can filter the data traffic of a network by controlling whether the packets are passed or issued. A network is built using several different network devices, one of which is a router. A router is a tool that can process different data packet networks (between networks) through a process called routing. lots of companies that produce routers, mikrotik is one of the companies that produce routers. mikrotik is easy to do because it uses Winbox in Gui's view, besides that the hotspot server in it is provided with several management facilities that can be arranged according to network requirements
APA, Harvard, Vancouver, ISO, and other styles
21

Pencheva, Evelina, and Ivaylo Atanasov. "Open Access to Control on Quality of Service in Convergent Networks." International Journal of Information Technology and Web Engineering 5, no. 2 (April 2010): 53–74. http://dx.doi.org/10.4018/jitwe.2010040104.

Full text
Abstract:
This paper investigates the capabilities for open access to quality of service management in convergent networks. Based on the analysis of requirements for policy and charging control in Internet Protocol Multimedia Subsystem (IMS), functions for quality of service (QoS) management and charging that are available for third party applications are identified. The functionality of Open Service Access (OSA) and Parlay X interfaces is evaluated for support of dynamic QoS control, while an approach to development of OSA compliant application programming interfaces for QoS management in IMS networks is presented. The interface’s methods are mapped onto the messages of network control protocols such as Diameter and Session Initiation Protocol (SIP). Finally, aspects of interface implementation are discussed including behavior equivalence of state machines.
APA, Harvard, Vancouver, ISO, and other styles
22

Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.

Full text
Abstract:
Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know the secret credentials) or the identity has been impersonated by someone else after the authentication’s process was completed. Continuous authentication does not require the active participation of the user. Aiming to identify the different technologies involved in continuous authentication’s implementations, evaluation methods, and its use cases, this paper presents a systematic review that synthesizes the state of the art. This review is conducted to get a picture about which data sources could allow continuous authentication, in which systems it has been successfully implemented, and which are the most adequate ways to process the data. This review also identifies the defining dimensions of continuous authentication systems.
APA, Harvard, Vancouver, ISO, and other styles
23

Zhu, Sencun, Shouhuai Xu, Sanjeev Setia, and Sushil Jajodia. "LHAP: A lightweight network access control protocol for ad hoc networks." Ad Hoc Networks 4, no. 5 (September 2006): 567–85. http://dx.doi.org/10.1016/j.adhoc.2005.06.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Goodwin, M., and K. J. McDonell. "Access control for network directory systems." ACM SIGCOMM Computer Communication Review 16, no. 3 (August 1986): 282–89. http://dx.doi.org/10.1145/1013812.18204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sivalingam, Krishna M., Kalyani Bogineni, and Patrick W. Dowd. "Pre-allocation media access control protocols for multiple access WDM photonic networks." ACM SIGCOMM Computer Communication Review 22, no. 4 (October 1992): 235–46. http://dx.doi.org/10.1145/144191.144289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Lin, Lin, Shiyong Zhu, Yang Liu, Zhen Wang, and Fuad E. Alsaadi. "Output Regulation of Boolean Control Networks With Nonuniform Sampled-Data Control." IEEE Access 7 (2019): 50691–96. http://dx.doi.org/10.1109/access.2019.2910593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Masadeh, Ala'eddin, Haythem Bany Salameh, and Ahmad Abu-El-Haija. "Design and Simulation of Spectrum Access and Power Management Protocol for Dynamic Access Networks." International Arab Journal of Information Technology 17, no. 4A (July 31, 2020): 588–97. http://dx.doi.org/10.34028/iajit/17/4a/2.

Full text
Abstract:
This work investigates the problem of managing the transmission power and assigning channels for multi-channel single-radio Cognitive Radio Ad-Hoc Networks (CRAHNs). The considered network consists of M primary users and N secondary users, where the secondary users can use the licensed channels opportunistically when they are not utilized by the primary users. The secondary users have the capability of sensing the licensed channels and determine their occupation status. They are also able to control their transmission power such that the transmitted data can be received with high quality-of-service with the lowest possible transmission power, and minimum interference among the secondary users. This also contributes in increasing the frequency spatial reuse of the licensed channels by the secondary users, when the channels are unoccupied, which increases the network throughput. This work proposes a channel assignment algorithm aims at assigning the unoccupied licensed channels among secondary users efficiently, and a transmission power control aims at tuning the transmission power used by the secondary users to maximize the network throughput. The results show an enhancement achieved by the proposed protocol when it is integrated to the considered network, which is seen through increasing the network throughput and decreasing in the access delay. In this context, the Network Simulator 2 (NS2) was used to verify our proposed protocol, which indicates a significant enhancement in network performance
APA, Harvard, Vancouver, ISO, and other styles
28

Joshi, J. B. D. "Access-control language for multidomain environments." IEEE Internet Computing 8, no. 6 (November 2004): 40–50. http://dx.doi.org/10.1109/mic.2004.53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jha, Satish, Mohammad Rashid, Vijay Bhargava, and Charles Despins. "Medium access control in distributed cognitive radio networks." IEEE Wireless Communications 18, no. 4 (August 2011): 41–51. http://dx.doi.org/10.1109/mwc.2011.5999763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Qi, Xi Cheng, Qingshan Wang, Peng Liu, and Bin Deng. "A Delay-Constrained Network Coding Algorithm Based on Power Control in Wireless Networks." IEEE Access 6 (2018): 62224–33. http://dx.doi.org/10.1109/access.2018.2873449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Haodong, and Qun Li. "Achieving distributed user access control in sensor networks." Ad Hoc Networks 10, no. 3 (May 2012): 272–83. http://dx.doi.org/10.1016/j.adhoc.2011.01.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Wang, Huaxia, Yu-Dong Yao, Xin Zhang, and Hongbin Li. "Secondary User Access Control in Cognitive Radio Networks." IEEE Journal on Selected Areas in Communications 34, no. 11 (November 2016): 2866–73. http://dx.doi.org/10.1109/jsac.2016.2615262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Gallo, Pierluigi, Katarzyna Kosek-Szott, Szymon Szott, and Ilenia Tinnirello. "CADWAN: A Control Architecture for Dense WiFi Access Networks." IEEE Communications Magazine 56, no. 1 (January 2018): 194–201. http://dx.doi.org/10.1109/mcom.2017.1601097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

DAS, ASHOK KUMAR, SANTANU CHATTERJEE, and JAMUNA KANTA SING. "A NOVEL EFFICIENT ACCESS CONTROL SCHEME FOR LARGE-SCALE DISTRIBUTED WIRELESS SENSOR NETWORKS." International Journal of Foundations of Computer Science 24, no. 05 (August 2013): 625–53. http://dx.doi.org/10.1142/s0129054113500214.

Full text
Abstract:
In a wireless sensor network, we often require the deployment of new nodes to extend the lifetime of the network because some sensor nodes may be lost due to power exhaustion problem or they may be also malicious nodes. In order to protect malicious nodes from joining the sensor network, access control mechanism becomes a major challenging problem in the design of sensor network protocols. Existing access control protocols designed for wireless sensor networks require either high communication overheads or they are not scalable due to involvement of the base station during authentication and key establishment processes. In this paper, we propose a new access control scheme for large-scale distributed wireless sensor networks, which not only identifies the identity of each node but it has also ability to differentiate between old nodes and new nodes. The proposed scheme does not require involvement of the base station during authentication and key establishment processes, and it can be easily implemented as a dynamic access control protocol. In addition, our scheme significantly reduces communication costs in order to authenticate neighbor nodes among each other and establish symmetric keys between neighbor nodes as compared with existing approaches. Further, our scheme is secure against different attacks and unconditionally secure against node capture attacks. The simulation results of our scheme using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool ensure that our scheme is safe.
APA, Harvard, Vancouver, ISO, and other styles
35

Uddin, Md Forkan, Catherine Rosenberg, Weihua Zhuang, Patrick Mitran, and Andre Girard. "Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks." IEEE/ACM Transactions on Networking 22, no. 1 (February 2014): 80–93. http://dx.doi.org/10.1109/tnet.2013.2243163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Mohammadani, Khalid Hussain, Kamran Ali Memon, Imran Memon, Nazish Nawaz Hussaini, and Hadiqua Fazal. "Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772092162. http://dx.doi.org/10.1177/1550147720921624.

Full text
Abstract:
Mobile ad hoc networks are the “spontaneous networks” which create a temporary network in any place and any time without using any extra fixed radio device of a full infrastructure network. Each device in this network works as a router to develop end-to-end communication connections and move independently in any direction. Mostly, mobile ad hoc networks use the IEEE 802.11b protocol with carrier-sense multiple access with collision avoidance medium access control layer protocol for sharing a common medium among the nodes simultaneously. Due to this distributed medium, the routing and medium access control layer of the mobile ad hoc network are prone to attacks. Among several attackers, blackhole attacker is the dangerous one which causes the loss of all data packets of devices in the network. Efficient medium access control protocol designs in this respect play a key role in determining channel utilization, network delay, and, more importantly, network security. In the proposed work, preamble information is used with time-division multiple access medium access control. The preamble time-division multiple access uses time synchronization for each time slot and does not assign much time to the blackhole attacker due to a fixed time slot. As a result, blackhole is not stable in all communications and such an attack is effectively defended. Simulation results show that, in the presence of the blackhole attacker, carrier-sense multiple access with collision avoidance has a high packet loss ratio and low network throughput as compared to the proposed preamble time-division multiple access.
APA, Harvard, Vancouver, ISO, and other styles
37

Alam, Md Khorshed, Azrina Abd Aziz, Suhaimi Abd Latif, and Azniza Abd Aziz. "Error-Control Truncated SVD Technique for In-Network Data Compression in Wireless Sensor Networks." IEEE Access 9 (2021): 13829–44. http://dx.doi.org/10.1109/access.2021.3051978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Troia, Sebastian, Andres Felipe Rodriguez Vanegas, Ligia Maria Moreira Zorello, and Guido Maier. "Admission Control and Virtual Network Embedding in 5G Networks: A Deep Reinforcement-Learning Approach." IEEE Access 10 (2022): 15860–75. http://dx.doi.org/10.1109/access.2022.3148703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Wang, Jianfeng, Hongqiang Zhai, Pan Li, Yuguang Fang, and Dapeng Wu. "Directional medium access control for ad hoc networks." Wireless Networks 15, no. 8 (February 12, 2008): 1059–73. http://dx.doi.org/10.1007/s11276-008-0102-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Liu, Donggang. "Efficient and distributed access control for sensor networks." Wireless Networks 16, no. 8 (March 19, 2010): 2151–67. http://dx.doi.org/10.1007/s11276-010-0249-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Cheng, Ho Ting, Hai Jiang, and Weihua Zhuang. "Distributed medium access control for wireless mesh networks." Wireless Communications and Mobile Computing 6, no. 6 (2006): 845–64. http://dx.doi.org/10.1002/wcm.445.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Leng, Supeng, Huirong Fu, Qing Wang, and Yan Zhang. "Medium access control in vehicular ad hoc networks." Wireless Communications and Mobile Computing 11, no. 7 (October 30, 2009): 796–812. http://dx.doi.org/10.1002/wcm.869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Na, Yue Zhao, Ning Hu, and Jing Teng. "Disruption-Free Load Balancing for Aerial Access Network." Wireless Communications and Mobile Computing 2021 (May 23, 2021): 1–15. http://dx.doi.org/10.1155/2021/9926619.

Full text
Abstract:
A fundamental issue of 6G networks with aerial access networks (AAN) as a core component is that user devices will send high-volume traffic via AAN to backend servers. As such, it is critical to load balance such traffic such that it will not cause network congestion or disruption and affect users’ experience in 6G networks. Motivated by the success of software-defined networking-based load balancing, this paper proposes a novel system called Tigris, to load balance high-volume AAN traffic in 6G networks. Different from existing load balancing solutions in traditional networks, Tigris tackles the fundamental disruption-resistant challenge in 6G networks for avoiding disruption of continuing flows and the control-path update challenge for limiting the throughput of updating load balancing instructions. Tigris achieves disruption-free and low-control-path-cost load balancing for AAN traffic by developing an online algorithm to compute disruption-resistant, per-flow load balancing policies and a novel bottom-up algorithm to compile the per-flow policies into a highly compact rule set, which remains disruption-resistant and has a low control-path cost. We use extensive evaluation to demonstrate the efficiency and efficacy of Tigris to achieve zero disruption of continuing AAN flows and an extremely low control-path update overhead, while existing load balancing techniques in traditional networks such as ECMP cause high load variance and disrupt almost 100% continuing AAN flows.
APA, Harvard, Vancouver, ISO, and other styles
44

Jaber, Zaid Hashim, Dheyaa Jasim Kadhim, and Ahmed Sabah Al-Araji. "Medium access control protocol design for wireless communications and networks review." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 2 (April 1, 2022): 1711. http://dx.doi.org/10.11591/ijece.v12i2.pp1711-1723.

Full text
Abstract:
<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive number of antenna elements to improve both spectral efficiency and energy efficiency. On the other hand, the second research method (PD-NOMA) allows multiple non-orthogonal signals to share the same orthogonal resources by allocating different power level for each station. PD-NOMA has a better spectral efficiency over the orthogonal multiple access methods. A review of previous works regarding the MAC design for different wireless networks is classified based on different categories. The main contribution of this research work is to show the importance of the MAC design with added optimal functionalities to improve the spectral and energy efficiencies of the wireless networks.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
45

Ma Rui, Liu Yancheng, and Wang Chuan. "An Improved Medium Access Control Protocol for Wireless Sensor Networks." International Journal of Advancements in Computing Technology 5, no. 6 (March 31, 2013): 1161–69. http://dx.doi.org/10.4156/ijact.vol5.issue6.136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Shu, Yantai, Huifang Feng, Hua Wang, and Maode Ma. "Dynamic admission control in hybrid QoS networks with WiFi access." Science in China Series F: Information Sciences 49, no. 4 (August 2006): 409–20. http://dx.doi.org/10.1007/s11432-006-2002-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Carminati, Barbara, and Elena Ferrari. "Access control and privacy in web‐based social networks." International Journal of Web Information Systems 4, no. 4 (November 21, 2008): 395–415. http://dx.doi.org/10.1108/17440080810919468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Samuel, Arjmand, Arif Ghafoor, and Elisa Bertino. "Context-Aware Adaptation of Access-Control Policies." IEEE Internet Computing 12, no. 1 (January 2008): 51–54. http://dx.doi.org/10.1109/mic.2008.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Islam, Salekul, and J. William Atwood. "Multicast receiver access control by IGMP-AC." Computer Networks 53, no. 7 (May 2009): 989–1013. http://dx.doi.org/10.1016/j.comnet.2008.12.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Shunan Ma, Jingsha He, Feng Gao, and Yuqiang Zhang. "Access Control Model based on Trust." International Journal of Digital Content Technology and its Applications 5, no. 7 (July 31, 2011): 320–25. http://dx.doi.org/10.4156/jdcta.vol5.issue7.40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography