Javascript must be enabled to continue!
A Simulation Model of IEEE 802.15.4 GTS Mechanism and GTS Attacks in OMNeT++ / MiXiM + NETA
View through CrossRef
The IEEE 802.15.4 standard defines the PHY and MAC layer specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). With the proliferation of many time-critical applications with real-time delivery, low latency, and/or specific bandwidth requirements, Guaranteed Time Slots (GTS) are increasingly being used for reliable contention-free data transmission by nodes within beacon-enabled WPANs. To evaluate the performance of the 802.15.4 GTS management scheme, this paper introduces a new GTS simulation model for OMNeT++ / MiXiM. Our GTS model considers star-topology WPANs within the 2.4 GHz frequency band, and is in full conformance with the IEEE 802.15.4 – 2006 standard. To enable thorough investigation of the behaviors and impacts of different attacks against the 802.15.4 GTS mechanism, a new GTS attacks simulation model for OMNeT++ is also introduced in this paper. Our GTS attacks model is developed for OMNeT++ / NETA, and is integrated with our GTS model to provide a single inclusive OMNeT++ simulation model for both the GTS mechanism and all known-to-date attacks against it.
Canadian Center of Science and Education
Title: A Simulation Model of IEEE 802.15.4 GTS Mechanism and GTS Attacks in OMNeT++ / MiXiM + NETA
Description:
The IEEE 802.
15.
4 standard defines the PHY and MAC layer specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs).
With the proliferation of many time-critical applications with real-time delivery, low latency, and/or specific bandwidth requirements, Guaranteed Time Slots (GTS) are increasingly being used for reliable contention-free data transmission by nodes within beacon-enabled WPANs.
To evaluate the performance of the 802.
15.
4 GTS management scheme, this paper introduces a new GTS simulation model for OMNeT++ / MiXiM.
Our GTS model considers star-topology WPANs within the 2.
4 GHz frequency band, and is in full conformance with the IEEE 802.
15.
4 – 2006 standard.
To enable thorough investigation of the behaviors and impacts of different attacks against the 802.
15.
4 GTS mechanism, a new GTS attacks simulation model for OMNeT++ is also introduced in this paper.
Our GTS attacks model is developed for OMNeT++ / NETA, and is integrated with our GTS model to provide a single inclusive OMNeT++ simulation model for both the GTS mechanism and all known-to-date attacks against it.
Related Results
Depth-aware salient object segmentation
Depth-aware salient object segmentation
Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and ret...
Dynamic Scheduled Access Medium Access Control for Emerging Wearable Applications
Dynamic Scheduled Access Medium Access Control for Emerging Wearable Applications
Context and MotivationWearable technology is emerging as one of the key enablers for the internet of everything (IoE). The technology is getting mature by every day with more appli...
GREEN TOBACCO SICKNESS (GTS) IN THAI TRADITIONAL TOBACCO FARMERS RELATED TO THEIR OCCUPATIONAL EXPOSURE IN NAN PROVINCE, THAILAND
GREEN TOBACCO SICKNESS (GTS) IN THAI TRADITIONAL TOBACCO FARMERS RELATED TO THEIR OCCUPATIONAL EXPOSURE IN NAN PROVINCE, THAILAND
The aim of this study was to investigate prevalence of Green Tobacco Sickness (GTS) and occupational exposure on Thai traditional tobacco farmers in Nan Province, Thailand. To meas...
Physical Layer Implementation Analysis of IEEE 802.11be Preamble Puncturing in SU Transmission
Physical Layer Implementation Analysis of IEEE 802.11be Preamble Puncturing in SU Transmission
Abstract
Due to incumbent technologies in the 6 GHz band, including dynamic frequency selection (DFS) activities such as radar and military communications, as well as inter...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Mesh Mac Enabling Mesh Networking Over Ieee 802.15.4 Mac Layer
Mesh Mac Enabling Mesh Networking Over Ieee 802.15.4 Mac Layer
"Wireless sensor network is a network of sensor nodes that function in a cooperative manner to monitor the changes in the physical environment. Wireless sensor networks are used in...
Full Duplex for IEEE 802.11 Wireless LANs
Full Duplex for IEEE 802.11 Wireless LANs
<p>With the development of wireless LANs, they are expected to have wide applications not only in traditional home but also in industrial applications. Therefore, the next ge...
Full Duplex for IEEE 802.11 Wireless LANs
Full Duplex for IEEE 802.11 Wireless LANs
<p>With the development of wireless LANs, they are expected to have wide applications not only in traditional home but also in industrial applications. Therefore, the next ge...


