23rd Biennial Symposium on Communications, 2006
DOI: 10.1109/bsc.2006.1644620
|View full text |Cite
|
Sign up to set email alerts
|

Hidden Problems with the Hidden Node Problem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 60 publications
(26 citation statements)
references
References 3 publications
0
26
0
Order By: Relevance
“…The RTS-CTS mechanism is used to avoid the hidden node's problem [7]. The basic idea of the RTS-CTS mechanism consists in transmitting the RTS packet from the sender to the receiver node.…”
Section: A the Rts-cts Handshake Mechanismmentioning
confidence: 99%
See 1 more Smart Citation
“…The RTS-CTS mechanism is used to avoid the hidden node's problem [7]. The basic idea of the RTS-CTS mechanism consists in transmitting the RTS packet from the sender to the receiver node.…”
Section: A the Rts-cts Handshake Mechanismmentioning
confidence: 99%
“…In this case, the jammer can be detected by the IDS and reduces the effect of its attack. The random RTS validation is proposed by Ashikur [7] to alleviate the impact of this attack. If the attacker chooses the false RTS attack, it needs to spoof the source address in the RTS packet sent by the victim node's address, in order to escape the punishment reaction of the IDS.…”
Section: Security Analysismentioning
confidence: 99%
“…Node B is within the transmission range of nodes A and C, whereas node C is located outside the transmission range of node A. In a situation like this, node C cannot detect transmission from node A and consequently it can indirectly interfere with node B's reception of A's transmission [19].…”
Section: Hidden Nodesmentioning
confidence: 99%
“…Whereas the carrier sense of node A can be perceived, it cannot be used to receive transmitted packets [19]. To solve the hidden-node problem, several methods or techniques can be implemented.…”
Section: Hidden Nodesmentioning
confidence: 99%
“…This poor performance is shown in the results published by Borgo et al [1] and Jayasuriya et al [2]. Additional literature detailing the impact of problem nodes include: [3], [4], [5]. Several analytical models have been developed to examine the performance of the IEEE 802.11 MAC, and to evaluate the impact of varying the PCST.…”
Section: Introductionmentioning
confidence: 99%