2016
DOI: 10.1007/s12243-016-0522-y
|View full text |Cite
|
Sign up to set email alerts
|

Implementation and performance evaluation of IEEE 802.15.4 unslotted CSMA/CA protocol on Contiki OS

Abstract: In the wireless sensor networks domain, one of the most used standards is IEEE 802.15.4. This standard has been made available on many low power operating systems such as TinyOS and Contiki OS. It is crucial for the implementation to be compliant with the specifications of the standard. In the case of Contiki OS, the provided version of the main medium access algorithm, unslotted Carrier Sensing Multiple Access with Collision Avoidance (CSMA/CA), presents many flaws. In this paper, we discuss the implementatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 16 publications
0
2
0
1
Order By: Relevance
“…文献 [117] 将重点放在互连的联合仿真平台, 在广域保护安全的情况下验证异常检测的性能, 作 者利用多个实验室平台模拟电力系统的不同部分, 并实施完整性攻击, 从而分析如何将丢包率最小化, 文献 [118] 使用 Purdue 参考模型 [119] 对爱达荷安全仿真平台 [86] 进行建模, 并发动 ARP 中毒攻击, 文献 [120] [131,132] 、SensorSim [133] , 这些工 具已经遇到了在精确建模和模拟动态电力系统时复杂性增加的困难. 涉及电力系统模拟器扩展的工具 有 TrueTime [134,135] 、Prowler [136] 、VisualSense [137] . 这些工具面临的主要挑战是精确建模网络的能力, 以模拟智能电网的通信网络.…”
Section: 完整性仿真平台unclassified
“…文献 [117] 将重点放在互连的联合仿真平台, 在广域保护安全的情况下验证异常检测的性能, 作 者利用多个实验室平台模拟电力系统的不同部分, 并实施完整性攻击, 从而分析如何将丢包率最小化, 文献 [118] 使用 Purdue 参考模型 [119] 对爱达荷安全仿真平台 [86] 进行建模, 并发动 ARP 中毒攻击, 文献 [120] [131,132] 、SensorSim [133] , 这些工 具已经遇到了在精确建模和模拟动态电力系统时复杂性增加的困难. 涉及电力系统模拟器扩展的工具 有 TrueTime [134,135] 、Prowler [136] 、VisualSense [137] . 这些工具面临的主要挑战是精确建模网络的能力, 以模拟智能电网的通信网络.…”
Section: 完整性仿真平台unclassified
“…Then, the link layer waits to receive an acknowledge (ACK) packet. Hence, a timer is set to a predefined interval (e.g., 192 µs [91]). If during this interval the ACK is successfully received, the node…”
Section: Medium Access Control and Radio Duty Cyclingmentioning
confidence: 99%
“…where BE is the back-off exponent, i.e., the number of allowed transmission attempts of the packet [91].…”
Section: Techniquesmentioning
confidence: 99%