Academic literature on the topic 'Wireless networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wireless networks"

1

THATIPAMULA RAJU, THATIPAMULA RAJU, and D. DEEPIKA RANI D. DEEPIKA RANI. "Achieving Network Level Privacy in Wireless Sensor Networks." International Journal of Scientific Research 2, no. 8 (June 1, 2012): 183–87. http://dx.doi.org/10.15373/22778179/aug2013/61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gurnule, Pranjali V. "Wireless Jamming Networks." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 1931–35. http://dx.doi.org/10.31142/ijtsrd14455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Navya, B., and M. Ankitha. "Wireless Sensor Networks." International Journal of Research Publication and Reviews 5, no. 3 (March 9, 2024): 3875–77. http://dx.doi.org/10.55248/gengpi.5.0324.0767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks." Webology 19, no. 1 (January 20, 2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.

Full text
Abstract:
One of the most important types that used to transfer data between nodes without using wires is a “wireless communication network”, where the transmission of data is censored remotely by using electromagnetic waves such as radio waves that usually implemented in the physical layer of the network. Continuous improvements in wireless network technology have reduced the security and speed differences between types of networks (wired and wireless), but in turn, increased security threats to wirelessly transmitted data. Wireless networks are weak in terms of "privacy protection" because anyone who is within the coverage area of a wireless network can attempt to break into that network. Hacking incidents have been reported frequently in places with shared free networks, and it has been observed that the places of open distributed networks of the Internet are most at risk of complete penetration of your phone or PC data. To solve this problem, several programs have been developed that provide protection for wireless networks that differ in terms of security. Some of them did not provide sufficient protection for wireless networks, such as Wired Equivalent Privacy (WEP), and others made progress in preventing intrusions compared to their predecessors, such as Wi-Fi Protected Access (WPA).
APA, Harvard, Vancouver, ISO, and other styles
5

Mishra, Saurabh, Prof Rakesh Ranjan, Dr Sonika Singh, and Dr Gagan Singh. "Performance Analysis of MIMO Heterogeneous Wireless Sensor Networks." International Journal of Innovative Technology and Exploring Engineering 12, no. 12 (November 30, 2023): 25–31. http://dx.doi.org/10.35940/ijitee.l9742.11121223.

Full text
Abstract:
Wireless Sensor Networks (WSN) are widely used in remote applications related to defence and healthcare. A network with nodes having different capabilities like sensing, various computational capabilities, power-efficient communication, and a varied sensing range is called a heterogeneous wireless sensor network. Heterogeneous wireless sensor networks using MIMO wireless channels are more useful for energy-efficient multi-channel communication. MIMO applications in wireless sensor networks have the potential to enhance throughput, reduce End-to-End Delay, improve packet delivery ratios, and conserve energy in wireless sensor networks. Its implementation needs to be carefully considered in light of the specific deployment conditions and resource constraints of the network, considering proper antenna design, synchronisation mechanisms, and energy-efficient algorithms. This paper presents a comparative performance analysis of MIMO wireless sensor networks and traditional wireless sensor networks without MIMO for various Quality of Service parameters like Packet Delivery Ratio, End to End Delay, Throughput and Residual energy. The research work shows that the application of MIMO in Wireless Sensor Networks enables sensor nodes to collaborate effectively, leading to improved reliability and coverage, and also increases the network's lifetime by conserving energy in resource-constrained sensor nodes through the preservation of Residual Energy.
APA, Harvard, Vancouver, ISO, and other styles
6

Krishna, K. Hari, Y. Suresh Babu, and Tapas Kumar. "Wireless Network Topological Routing in Wireless Sensor Networks." Procedia Computer Science 79 (2016): 817–26. http://dx.doi.org/10.1016/j.procs.2016.03.111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Xinheng. "Wireless mesh networks." Journal of Telemedicine and Telecare 14, no. 8 (December 2008): 401–3. http://dx.doi.org/10.1258/jtt.2008.008003.

Full text
Abstract:
Wireless telemedicine using GSM and GPRS technologies can only provide low bandwidth connections, which makes it difficult to transmit images and video. Satellite or 3G wireless transmission provides greater bandwidth, but the running costs are high. Wireless networks (WLANs) appear promising, since they can supply high bandwidth at low cost. However, the WLAN technology has limitations, such as coverage. A new wireless networking technology named the wireless mesh network (WMN) overcomes some of the limitations of the WLAN. A WMN combines the characteristics of both a WLAN and ad hoc networks, thus forming an intelligent, large scale and broadband wireless network. These features are attractive for telemedicine and telecare because of the ability to provide data, voice and video communications over a large area. One successful wireless telemedicine project which uses wireless mesh technology is the Emergency Room Link (ER-LINK) in Tucson, Arizona, USA. There are three key characteristics of a WMN: self-organization, including self-management and self-healing; dynamic changes in network topology; and scalability. What we may now see is a shift from mobile communication and satellite systems for wireless telemedicine to the use of wireless networks based on mesh technology, since the latter are very attractive in terms of cost, reliability and speed.
APA, Harvard, Vancouver, ISO, and other styles
8

Habibi, Payman, Goran Hassanifard, Abdulbaghi Ghaderzadeh, and Arez Nosratpour. "Offering a Demand-Based Charging Method Using the GBO Algorithm and Fuzzy Logic in the WRSN for Wireless Power Transfer by UAV." Journal of Sensors 2023 (May 2, 2023): 1–19. http://dx.doi.org/10.1155/2023/6326423.

Full text
Abstract:
An extremely high number of geographically dispersed, energy-limited sensor nodes make up wireless sensor networks. One of the critical difficulties with these networks is their network lifetime. Wirelessly charging the sensors continuously is one technique to lengthen the network’s lifespan. In order to compensate for the sensor nodes’ energy through a wireless medium, a mobile charger (MC) is employed in wireless sensor networks (WRSN). Designing a charging scheme that best extends the network’s lifetime in such a situation is difficult. In this paper, a demand-based charging method using unmanned aerial vehicles (UAVs) is provided for wireless rechargeable sensor networks. In this regard, first, sensors are grouped according to their geographic position using the K-means clustering technique. Then, with the aid of a fuzzy logic system, these clusters are ranked in order of priority based on the parameters of the average percentage of battery life left in the sensor nodes’ batteries, the number of sensors, and critical sensors that must be charged, and the distance between each cluster’s center and the MC charging station. It then displays the positions of the UAV to choose the crucial sensor nodes using a routing algorithm based on the shortest and most vital path in each cluster. Notably, the gradient-based optimization (GBO) algorithm has been applied in this work for intracluster routing. A case study for a wireless rechargeable sensor network has been carried out in MATLAB to assess the performance of the suggested design. The outcomes of the simulation show that the suggested technique was successful in extending the network’s lifetime. Based on the simulation results, compared to the genetic algorithm, the proposed algorithm has been able to reduce total energy consumption, total distance during the tour, and total travel delay by 26%, 17.2%, and 25.4%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
9

Ma, De Xin, Jian Ma, Peng Min Xu, Cai Xia Song, and Ying Pang. "Solar-Powered Wireless Sensor Network’s Energy Gathering Technology." Applied Mechanics and Materials 477-478 (December 2013): 396–99. http://dx.doi.org/10.4028/www.scientific.net/amm.477-478.396.

Full text
Abstract:
We analyze the solar-powered wireless sensor network's energy gathering techniques, aiming to prolong the lifetime of wireless sensor network. We summarize wireless sensor network node's energy autonomy system, its characteristics in detail and new technology adopts, provides some suggestions and new ideas in the design and research of solar-powered wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
10

Saluja, Arleen, Pruthikrai Mahatanankoon, and Tibor Gyires. "Users' Perceptions of Wireless Networks Usage." International Journal of Interdisciplinary Telecommunications and Networking 2, no. 2 (April 2010): 67–78. http://dx.doi.org/10.4018/jitn.2010040105.

Full text
Abstract:
Wireless networks provide the most convenient way to access the Internet. This paper determines how the preliminary and advanced knowledge of wireless networks affect users’ perception and usage. Based on their knowledge, users develop certain emotional responses, which could affect their wireless network usage. This study identifies the effect of these emotional responses on users’ degree of use of wireless networks. Using data collected from 143 respondents, regression analyses reveal that wireless network usage is affected less by advanced wireless network knowledge and more by preliminary knowledge. The findings also show that the degree of usage depends on users’ ability to understand basic wireless network functionality and security. To motivate wireless usage, developers and designers of future wireless technologies do not need to overwhelm users with technical detail.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Wireless networks"

1

Gaddam, Nishanth. "Network coding in wireless networks." [Ames, Iowa : Iowa State University], 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1468982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jiang, Shu. "Efficient network camouflaging in wireless networks." Texas A&M University, 2005. http://hdl.handle.net/1969.1/3067.

Full text
Abstract:
Camouflaging is about making something invisible or less visible. Network camouflaging is about hiding certain traffic information (e.g. traffic pattern, traffic flow identity, etc.) from internal and external eavesdroppers such that important information cannot be deduced from it for malicious use. It is one of the most challenging security requirements to meet in computer networks. Existing camouflaging techniques such as traffic padding, MIX-net, etc., incur significant performance degradation when protected networks are wireless networks, such as sensor networks and mobile ad hoc networks. The reason is that wireless networks are typically subject to resource constraints (e.g. bandwidth, power supply) and possess some unique characteristics (e.g. broadcast, node mobility) that traditional wired networks do not possess. This necessitates developing new techniques that take account of properties of wireless networks and are able to achieve a good balance between performance and security. In this three-part dissertation we investigate techniques for providing network camouflaging services in wireless networks. In the first part, we address a specific problem in a hierarchical multi-task sensor network, i.e. hiding the links between observable traffic patterns and user interests. To solve the problem, a temporally constant traffic pattern, called cover traffic pattern, is needed. We describe two traf- fic padding schemes that implement the cover traffic pattern and provide algorithms for achieving the optimal energy efficiencies with each scheme. In the second part, we explore the design of a MIX-net based anonymity system in mobile ad hoc networks. The objective is to hide the source-destination relationship with respect to each connection. We survey existing MIX route determination algorithms that do not account for dynamic network topology changes, which may result in high packet loss rate and large packet latency. We then introduce adaptive algorithms to overcome this problem. In the third part, we explore the notion of providing anonymity support at MAC layer in wireless networks, which employs the broadcast property of wireless transmission. We design an IEEE 802.11-compliant MAC protocol that provides receiver anonymity for unicast frames and offers better reliability than pure broadcast protocol.
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, MinJi Ph D. Massachusetts Institute of Technology. "Network coding for robust wireless networks." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/71276.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student submitted PDF version of thesis.
Includes bibliographical references (p. 157-167).
Wireless networks and communications promise to allow improved access to services and information, ubiquitous connectivity, and mobility. However, current wireless networks are not well-equipped to meet the high bandwidth and strict delay requirements of future applications. Wireless networks suffer from frequent losses and low throughput. We aim to provide designs for robust wireless networks. This dissertation presents protocols and algorithms that significantly improve wireless network performance and effectively overcome interference, erasures, and attacks. The key idea behind this dissertation is in understanding that wireless networks are fundamentally different from wired networks, and recognizing that directly applying techniques from wired networks to wireless networks limits performance. The key ingredient underlying our algorithms and protocols is network coding. By recognizing the algebraic nature of information, network coding breaks the convention of routing networks, and allows mixing of information in the intermediate nodes and routers. This mixing has been shown to have numerous performance benefits, e.g. increase in throughput and robustness against losses and failures. We present three protocols and algorithms, each using network coding to harness a different characteristic of the wireless medium. We address the problem of interference, erasures, and attacks in wireless networks with the following network coded designs. -- Algebraic NC exploits strategic interference to provide a distributed, randomized code construction for multi-user wireless networks. Network coding framework simplifies the multi-user wireless network model, and allows us to describe the multi-user wireless networks in an algebraic framework. This algebraic framework provides a randomized, distributed code construction, which we show achieves capacity for multicast connections as well as a certain set of non-multicast connections. -- TCP/NC efficiently and reliably delivers data over unreliable lossy wireless networks. TCP, which was designed for reliable transmission over wired networks, often experiences severe performance degradation in wireless networks. TCP/NC combines network coding's erasure correction capabilities with TCP's congestion control mechanism and reliability. We show that TCP/NC achieves significantly higher throughput than TCP in lossy networks; therefore, TCP/NC is well suited for reliable communication in lossy wireless networks. -- Algebraic Watchdog takes advantage of the broadcast nature of wireless networks to provide a secure global self-checking network. Algebraic Watchdog allows nodes to detect malicious behaviors probabilistically, and police their neighbors locally using overheard messages. Unlike traditional detection protocols which are receiver-based, this protocol gives the senders an active role in checking the nodes downstream. We provide a trellis-based inference algorithm and protocol for detection, and analyze its performance. The main contribution of this dissertation is in providing algorithms and designs for robust wireless networks using network coding. We present how network coding can be applied to overcome the challenges of operating in wireless networks. We present both analytical and simulation results to support that network coded designs, if designed with care, can bring forth significant gains, not only in terms of throughput but also in terms of reliability, security, and robustness.
by MinJi Kim.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
4

Attar, Hani Hasan. "Cooperative Network Coding for wireless networks." Thesis, University of Strathclyde, 2011. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=16782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nerini, Matteo. "Network Slicing for IEEE 802.11 Wireless Networks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/21149/.

Full text
Abstract:
Future networks will pave the way for a myriad of applications with different requirements. In such a context, the today’s one-size-fits-all approach will not be able to efficiently address the different demands that verticals impose in terms of QoS and involved data volumes. To this end, network slicing is a new network paradigm which may provide the needed flexibility. It allows to offer multiple logical networks over a common infrastructure, tailored to the services which run on the network. In today’s Wi-Fi networks, all the users are connected to the same wireless channel, which allows service differentiation only at the traffic level. Thus, in this study, we propose a standard-compliant network slicing approach for the radio access segment of Wi-Fi, often neglected by the literature on network slicing. We present two algorithms to realize network slicing at the access level. The first assigns resources according to the requirements of the slices in a static way. On the other hand, the second, more advanced, dynamically configures the slices according to the network conditions and relevant KPIs. These techniques can be applied to the IEEE 802.11 standard and, in general, to all the protocols that use Carrier Sensing Multiple Access (CSMA) as channel access technique. The proposed algorithms were validated through extensive simulations, conducted with ns-3 network simulator and accompanied by theoretical calculations. Particular attention, often neglected in similar simulation-based works, has been paid to the electromagnetic properties of the spectrum, which play a fundamental role in radio communications. From the conducted simulations, we found that our slicing approaches largely outperform the today’s Wi-Fi access technique. They allow to reach higher goodput (i.e. a lower error probability) and lower latency, when needed. At the same time, tailored slicing saves energy to low-power devices and increases the spectrum efficiency.
APA, Harvard, Vancouver, ISO, and other styles
6

Tan, Hailun Computer Science &amp Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.

Full text
Abstract:
Network programming is one of the most important applications in Wireless Sensor Networks as It provides an efficient way to update program Images running on sensor nodes without physical access to them. Securing these updates, however, remains a challenging and important issue, given the open deployment environment of sensor nodes. Though several security schemes have been proposed to impose the authenticity and Integrity protection on network programming applications, they are either energy Inefficient as they tend to use digital signature or lacks the data confidentiality. In addition, due to the absence of secure memory management in the current sensor hardware, the attacker could inject malicious code into the program flash by exploiting buffer overflow In the memory despite the secure code dissemination. The contribution of this thesis Is to provide two software-based security protocols and one hardware-based remote attestation protocol for network programming application. Our first protocol deploys multiple one-way key chains for a multi-hop sensor network. The scheme Is shown to be lower In computational, power consumption and communication costs yet still able to secure multi??hop propagation of program images. Our second protocol utilizes an Iterative hash structure to the data packets in network programming application, ensuring the data confidentiality and authenticity. In addition, we Integrated confidentiality and DoS-attack-resistance in a multi??hop code dissemination protocol. Our final solution is a hardware-based remote attestation protocol for verification of running codes on sensor nodes. An additional piece of tamper-proof hardware, Trusted Platform Module (TPM), is imposed into the sensor nodes. It secures the sensitive information (e.g., the session key) from attackers and monitors any platform environment changes with the Internal registers. With these features of TPM, the code Injection attack could be detected and removed when the contaminated nodes are challenged in our remote attestation protocol. We implement the first two software-based protocols with Deluge as the reference network programming protocol in TinyOS, evaluate them with the extensive simulation using TOSSIM and validate the simulation results with experiments using Tmote. We implement the remote attestation protocol on Fleck, a sensor platform developed by CSIRO that Integrates an Atmel TPM chip.
APA, Harvard, Vancouver, ISO, and other styles
7

Hildebrand, Matthias. "Optimized network access in heterogeneous wireless networks." Kassel : Kassel Univ. Press, 2005. http://deposit.d-nb.de/cgi-bin/dokserv?idn=977677540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shi, Xiaomeng Ph D. Massachusetts Institute of Technology. "Energy aware network coding in wireless networks." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/78533.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 97-104).
Energy is one of the most important considerations in designing reliable low-power wireless communication networks. We focus on the problem of energy aware network coding. In particular, we investigate practical energy efficient network code design for wireless body area networks (WBAN). We first consider converge-cast in a star-shaped topology, in which a central base station (BS), or hub, manages and communicates directly with a set of nodes. We then consider a wireless-relay channel, in which a relay node assists in the transmission of data from a source to a destination. This wireless relay channel can be seen as a simplified extended star network, where nodes have relay capabilities. The objective is to investigate the use of network coding in these scenarios, with the goal of achieving reliability under low-energy and lower-power constraints. More specifically, in a star network, we propose a simple network layer protocol, study the mean energy to complete uploads of given packets from the nodes to the BS using a Markov chain model, and show through numerical examples that when reception energy is taken into account, the incorporation of network coding offers reductions in energy use. The amount of achievable gains depends on the number of nodes in the network, the degree of asymmetry in channel conditions experienced by different nodes, and the relative difference between transmitting and receiving power at the nodes. We also demonstrate the compatibility of the proposed scheme with the IEEE 802.15.6 WBAN standard by describing ways of incorporating network coding into systems compliant to the standard. For a wireless relay channel, we explore the strategic use of network coding according to both throughput and energy metrics. In the relay channel, a single source communicates to a single sink through the aid of a half-duplex relay. The fluid flow model is used to describe the case where both the source and the relay are coding, and Markov chain models are proposed to describe packet evolution if only the source or only the relay is coding. Although we do not attempt to explicitly categorize the optimal network coding strategies in the relay channel under different system parameters, we provide a framework for deciding whether and where to code, taking into account of throughput maximization and energy depletion constraints.
by Xiaomeng Shi.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
9

Rastogi, Preeti. "Assessing Wireless Network Dependability Using Neural Networks." Ohio University / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1129134364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Taiwo, Olugbenga Adekunle. "Network access selection in heterogeneous wireless networks." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/16832.

Full text
Abstract:
In heterogeneous wireless networks (HWNs), both single-homed and multi-homed terminals are supported to provide connectivity to users. A multiservice single-homed multi-mode terminal can support multiple types of services, such as voice call, file download and video streaming simultaneously on any one of the available radio access technologies (RATs) such as Wireless Local Area Network (WLAN), and Long Term Evolution (LTE). Consequently, a single-homed multi-mode terminal having multiple on-going calls may need to perform a vertical handover from one RAT to another. One of the major issues in HWNs is how to select the most suitable RAT for multiple handoff calls, and the selection of a suitable RAT for multiple-calls from a single-homed multi-mode terminal in HWNs is a group decision problem. This is because a single-homed multi-mode terminal can connect to only one RAT at a time, and therefore multiple handoff calls from the terminal have to be handed over to the same RAT. In making group decision for multiple-calls, the quality of service (QoS) requirements for individual calls needs to be considered. Thus, the RAT that most satisfies the QoS requirements of individual calls is selected as the most suitable RAT for the multiple-calls. Whereas most research efforts in HWNs have concentrated on developing vertical handoff decision schemes for a single call from a multi-mode terminal, not much has been reported in the literature on RAT-selection for multiple-calls from a single-homed multi-mode terminal in next generation wireless networks (NGWNs). In addition, not much has been done to investigate the sensitivity of RAT-selection criteria for multiple-calls in NGWNs. Therefore, this dissertation addresses these issues by focusing on following two main aspects: (1) comparative analysis of four candidate multi-criteria group decision-making (MCGDM) schemes that could be adapted for making RAT-selection decisions for multiple-calls, and (2) development of a new RAT-selection scheme named the consensus RAT-selection model. In comparative analysis of the candidate RAT-selection schemes, four MCGDM schemes namely: distance to the ideal alternative-group decision making (DIA-GDM), multiplicative exponent weighting-group decision making (MEW-GDM), simply additive weighting-group decision making (SAW-GDM), technique for order preference by similarity to Ideal solution-group decision making (TOPSIS-GDM) are considered. The performance of the multiple-calls RAT-selection schemes is evaluated using the MATLAB simulation tool. The results show that DIA-GDM and TOPSIS-GDM schemes are more suitable for multiple handoff calls than SAW-GDM and MEW-GDM schemes. This is because they are consistent and less-sensitive in making RAT-selection decision than the other two schemes, with regards to RAT-selection criteria (service price, data rate, security, battery power consumption and network delay) in HWNs. In addition, the newly developed RAT-selection scheme incorporates RAT-consensus level for improving RAT-selection decisions for multiple-calls. Numerical results conducted in MATLAB validate the effectiveness and performance of the newly proposed RAT-selection scheme for multiple-calls in HWNs.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Wireless networks"

1

Association for Computing Machinery. Wireless networks. Amsterdam: Baltzer Science Publishers, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dearden, James. Wireless networks. Manchester: JISC, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jahankhani, Hamid, and Ayman El Hajjar, eds. Wireless Networks. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-33631-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pahlavan, Kaveh. Wireless information networks. New York: Wiley, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Daniel, Collins, ed. 3G wireless networks. 2nd ed. New York: McGraw-Hill, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cui, Li, and Xiaolan Xie, eds. Wireless Sensor Networks. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-8174-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fitzek, Frank H. P., and Marcos D. Katz, eds. Cognitive Wireless Networks. Dordrecht: Springer Netherlands, 2007. http://dx.doi.org/10.1007/978-1-4020-5979-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Selmic, Rastko R., Vir V. Phoha, and Abdul Serwadda. Wireless Sensor Networks. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46769-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hossain, Ekram, and Kin Leung, eds. Wireless Mesh Networks. Boston, MA: Springer US, 2007. http://dx.doi.org/10.1007/978-0-387-68839-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Holtzman, Jack M., ed. Wireless Information Networks. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-1-4613-1353-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Wireless networks"

1

Ye, Qiang, and Wen Wu. "Network Slicing for 5G Networks and Beyond." In Wireless Networks, 17–33. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98064-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Peng, Mugen, Zhongyuan Zhao, and Yaohua Sun. "Flexible Network Management in Fog Radio Access Networks." In Wireless Networks, 85–104. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50735-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bök, Patrick-Benjamin, Andreas Noack, Marcel Müller, and Daniel Behnke. "Wireless Networks." In Computernetze und Internet of Things, 91–115. Wiesbaden: Springer Fachmedien Wiesbaden, 2020. http://dx.doi.org/10.1007/978-3-658-29409-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cowley, John. "Wireless Networks." In Communications and Networking, 187–99. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4357-4_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

El-Bendary, Mohsen A. M. "Wireless Networks." In Lecture Notes in Electrical Engineering, 43–55. Tokyo: Springer Japan, 2014. http://dx.doi.org/10.1007/978-4-431-55069-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kao, Ming-Yang. "Wireless Networks." In Encyclopedia of Algorithms, 1032. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-30162-4_482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Robertazzi, Thomas G. "Wireless Networks." In Introduction to Computer Networking, 35–60. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-53103-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Robertazzi, Thomas. "Wireless Networks." In Basics of Computer Networking, 29–43. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-2104-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sadiku, Matthew N. O., and Cajetan M. Akujuobi. "Wireless Networks." In Fundamentals of Computer Networks, 115–35. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09417-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jha, Vikas Kumar, Bishwajeet Pandey, and Ciro Rodriguez Rodriguez. "Wireless Networks." In Network Evolution and Applications, 99–119. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003302902-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wireless networks"

1

QasMarrogy, Ghassan. "Practical Analysis of IEEE 802.11ax Wireless Protocol in Wi-Fi Boosters Environments." In 3rd International Conference of Mathematics and its Applications. Salahaddin University-Erbil, 2020. http://dx.doi.org/10.31972/ticma22.04.

Full text
Abstract:
All the world now is depending on networks to share information between the users, where different data types are transferred wirelessly from network to network. Using wireless LANs are important to connect the users and share the data, these Wireless LANs have different types of obstacles that affect the data sharing or the wireless signal, such as, compatibility wireless protocol types, range coverage, walls penetration, moving devices, different routing protocols, data transferred types, weak signal, and many more. In this paper a practical analysis will be made to the latest IEEE 802.11ax wireless protocol to be compared with two types of Wi-Fi booster’s networks, Mesh and Extender Wi-Fi, while transferring 4k video size data rate, inside a room and on different rooms for wall penetration analysis, while measuring the throughput, delay, and signal strength metrics. The main importance of this paper is to give a more practical understanding and avoid the main problems of using the wireless protocol 802.11ax in different network types.
APA, Harvard, Vancouver, ISO, and other styles
2

Abaszada, Elvin. "Studies some Aspects Information Security of Wireless Communication Networks." In 2nd International Scientific-Practical Conference "Machine Building and Energy: New Concepts and Technologies". Switzerland: Trans Tech Publications Ltd, 2024. http://dx.doi.org/10.4028/p-n0hgrv.

Full text
Abstract:
The efficiency of the functioning wireless cellular networks using modern information and computer technologies is analyzed. The constituent technical components of the vector quality of functioning of a wireless network segment in the event of a threat to the security of a telecommunication system and eliminating the threat of vulnerability have been studied. Some aspects information security of wireless cellular networks are considered from the point view of the characteristics information protection system and the reliability of the communication network.
APA, Harvard, Vancouver, ISO, and other styles
3

Bhuiyan, Rashed Hossain, MD Mazharul Islam, and Haiying Huang. "Wireless Excitation and Electrical Impedance Matching of Piezoelectric Wafer Active Sensors." In ASME 2012 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/smasis2012-8210.

Full text
Abstract:
Wireless ultrasound inspections using Piezoelectric Wafer Active Sensors (PWAS) are attractive for Structural Health Monitoring (SHM). However, the impedance mismatch between the PWAS and the wireless transponder reduces the wirelessly transmitted signal strength. Electrical Impedance Matching (EIM) circuit can be introduced to maximize the power transmission between the PWAS and the wireless transponder. This paper discusses the wireless excitation of ultrasound as well as the design, simulation, and characterization of the EIM networks for PWAS. To maximize power transmission, a two port EIM network was developed using a computerized smith chart. The equivalent circuit of the PWAS and the EIM network were then combined to establish the equivalent circuit of the matched transducer. Computer simulations were carried out to evaluate the gain, the bandwidth, and the sensitivity of the EIM networks. Two-port EIM networks were implemented for both the actuator and the sensor in an ultrasound pitch-catch inspection system. The performance of the pitch-catch systems with and without the EIM networks was compared. Detailed analysis, simulation, hardware implementation, and measurement results are presented.
APA, Harvard, Vancouver, ISO, and other styles
4

J. Grahn, Kaj, Göran Pulkkis, and Jean-Sebastien Guillard. "Security of Mobile and Wireless Networks." In 2002 Informing Science + IT Education Conference. Informing Science Institute, 2002. http://dx.doi.org/10.28945/2491.

Full text
Abstract:
This paper gives a topical overview of wireless network security aspects. Security measures taken depend on the different protocols, standards, techniques and systems available. A brief introduction to security protocols, standards and corresponding technologies is given. The essay will concentrate on 2G, 2.5G, 3G and wireless local area networks. Standards, like WAP, IEEE 802.11, HomeRF, HIPERLAN/2, IPSec and Bluetooth, are included. A local area network, MediaPoli, has been implemented to work as a testbed for new innovations, products and services. The development environment is based on this high-capacity wired/wireless broadband network. Key research areas, actual projects and offered services are discussed. All activities aim at the future information society.
APA, Harvard, Vancouver, ISO, and other styles
5

Lim, Christina, Tingting Song, and Ampalavanapillai Nirmalathas. "Signal Space Diversity Techniques for Indoor Optical Wireless Systems." In Photonic Networks and Devices. Washington, D.C.: Optica Publishing Group, 2023. http://dx.doi.org/10.1364/networks.2023.nem4b.2.

Full text
Abstract:
Line-of-sight optical wireless communication systems have emerged as a potential candidate for indoor ultra-high-speed communication. However, the link performance is subjected to physical shadowing. In this paper, we review our work on signal space diversity to improve the impact of shadowing for high-speed indoor optical wireless communication.
APA, Harvard, Vancouver, ISO, and other styles
6

Paavola, Jarkko, Tuomo Rautava, Juhani Hallio, Juha Kalliovaara, and Tero Jokela. "Use of wireless communication networks in digitalization of factory environments." In CARPE Conference 2019: Horizon Europe and beyond. Valencia: Universitat Politècnica València, 2019. http://dx.doi.org/10.4995/carpe2019.2019.10050.

Full text
Abstract:
Wireless communications are rapidly taking an important role in factory environment. The current Wi-Fi technologies struggle to meet the requirements of industrial factories, for example with regard to latency and security. The emerging 5G communication networks are the first networks expected to meet such requirements. Private networks are owned by the factories themselves. Private networks can utilize 5G technologies to tailor the networks to meet the exact demands within the factory environment and guarantee that the factories can use the whole bandwidth for their own use. This concurrently increases the data security as the data does not need to be deliveved over public networks. This paper describes the latest developments in 5G with regard to private networks and Industry 4.0, which is the name given to the digitalization, automatization and data exchange trend currently ongoing in factory environments. In this paper we describe a private cellular network we have installed inside a factory building. This network has been trialed with wireless pyrometer measurement data transmission and environmental surveillance of a measurement laboratory. This paper analyses the suitability of private networks for these use cases and discusses in general which applications would benefit the most from private wireless networks.
APA, Harvard, Vancouver, ISO, and other styles
7

Segura, Gustavo A. Nunez, Arsenia Chorti, and Cíntia Borges Margi. "IDIT-SDN: Intrusion Detection Framework for Software-defined Wireless Sensor Networks." In Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbrc_estendido.2023.817.

Full text
Abstract:
Software-Defined Networking has been used to leverage security solutions for wireless sensor networks. However, this paradigm turns networks vulnerable to distributed denial of service attacks. IDIT-SDN is a tool for Software-defined Wireless Sensor Networks devised for DoS and DDoS attacks simulation and detection. This tool provides a framework for anomaly detection and a communication protocol to share security wise information from the sensor network to the controller. We demonstrate its use by showing a cooperative DDoS attack detection and attacker identification application based on distributed (every node) and centralized (controller) anomaly detection.
APA, Harvard, Vancouver, ISO, and other styles
8

Kaur, Harminder, and Sharvan Kumar Pahuja. "MAC Protocols for Wireless Body Sensor Network." In International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.33.

Full text
Abstract:
Wireless Body Area Networks, also known as the Wireless Body Sensor Networks, provides the monitoring of the health parameters in remote areas and where the medical facility is not available. Wireless Body Sensor Networks contains the body or placement of the sensors on body for measuring the medical and non-medical parameters. These networks share the wireless medium for the transmission of the data from one place to another. So the design of Medium Access Control is a challenging task for the WBSNs due to wireless media for less energy consumption and mobility. Various MAC protocols are designed to provide less energy consumption and improve the network lifetime. This paper presents the study of these existing MAC layer protocols based on different QoS parameters that define the network quality.
APA, Harvard, Vancouver, ISO, and other styles
9

Madhag, Aqeel, and Jongeun Choi. "Distributed Navigation Strategy of Mobile Sensor Networks With Probabilistic Wireless Communication Links." In ASME 2015 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/dscc2015-9964.

Full text
Abstract:
Mobile sensor networks have been widely used to predict spatio-temporal physical phenomena for various scientific and engineering applications. To accommodate the realistic models of mobile sensor networks, we incorporated probabilistic wireless communication links based on packet reception ratio (PRR) with distributed navigation. We then derived models of mobile sensor networks that predict Gaussian random fields from noise-corrupted observations under probabilistic wireless communication links. For the given model with probabilistic wireless communication links, we derived the prediction error variances for further sampling locations. Moreover, we designed a distributed navigation that minimizes the network cost function formulated in terms of the derived prediction error variances. Further, we have shown that the solution of distributed navigation with the probabilistic wireless communication links for mobile sensor networks are uniformly ultimately bounded with respect to that of the distributed one with the R-disk communication model. According to Monte Carlo simulation results, agent trajectories under distributed navigation with the probabilistic wireless communication links are similar to those with the R-disk communication model, which confirming the theoretical analysis.
APA, Harvard, Vancouver, ISO, and other styles
10

A., Maheswari. "Handover in 5G Heterogeneous Wireless Networks: A Comprehensive Review." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/qljv2039/ngcesi23p141.

Full text
Abstract:
Handover is a critical feature of wireless networks that allows mobile devices to seamlessly switch between access points as they move around. In 5G heterogeneous wireless networks (HetNets), handover is even more challenging due to the high density of base stations and the variety of radio access technologies (RATs) that may be used. There are a number of challenges that must be addressed in order to design efficient and reliable handover mechanisms for 5G HetNets. These challenges include: Heterogeneity of the network, Multi-RAT support, Mobility of users. Despite these challenges, there are a number of promising research directions for handover in 5G HetNets. These research directions include: Machine learning, Heterogeneous signaling, Network slicing. The research on handover in 5G HetNets is still in its early stages. However, there is a lot of promising research being done in this area. As 5G networks become more widespread, the need for efficient and reliable handover mechanisms will become even more important.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Wireless networks"

1

Kabara, Joseph, Prashant Krishnamurthy, and David Tipper. Information Assurance in Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, September 2001. http://dx.doi.org/10.21236/ada408305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Konorski, Jerzy. Information Transfer Ion Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, July 2010. http://dx.doi.org/10.21236/ada525850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chandrakasan, Anantha P. Power Aware Wireless Microsensor Networks. Fort Belvoir, VA: Defense Technical Information Center, May 2003. http://dx.doi.org/10.21236/ada415425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Frankel, S. E., B. Eydt, L. Owens, and K. A. Scarfone. Establishing wireless robust security networks :. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.sp.800-97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sivalingam, Krishna M. Energy Efficient Network Protocols for Wireless and Mobile Networks. Fort Belvoir, VA: Defense Technical Information Center, November 2001. http://dx.doi.org/10.21236/ada400626.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cooper, Jason, Manish Karir, and John S. Baras. Data Dependent Keying for Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, January 2003. http://dx.doi.org/10.21236/ada440782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, December 2005. http://dx.doi.org/10.21236/ada442751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

TORGERSON, MARK D., and BRIAN P. VAN LEEUWEN. Routing Data Authentication in Wireless Networks. Office of Scientific and Technical Information (OSTI), October 2001. http://dx.doi.org/10.2172/787792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pursley, Michael B. Adaptive Protocols for Mobile Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, July 2002. http://dx.doi.org/10.21236/ada404365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stamatiou, Kostas, John G. Proakis, and James R. Zeidler. Spatial Multiplexing in Random Wireless Networks. Fort Belvoir, VA: Defense Technical Information Center, January 2009. http://dx.doi.org/10.21236/ada515877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography