2020
DOI: 10.1007/s10270-020-00817-2
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and simulation of the IEEE 802.11e wireless protocol with hidden nodes using Colored Petri Nets

Abstract: Wireless technologies are continuously evolving, including features such as the extension to mid- and long-range communications and the support of an increasing number of devices. However, longer ranges increase the probability of suffering from hidden terminal issues. In the particular case of Wireless Local Area Networks (WLANs), the use of Quality of Service (QoS) mechanisms introduced in IEEE 802.11e compromises scalability, exacerbates the hidden node problem, and creates congestion as the number of users… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 38 publications
0
9
0
Order By: Relevance
“…After the state space is computed, a state space search can be performed through customized coding, making formal model checking possible [ 29 ]. In addition, this tool also provides functions such as monitoring and time attribute extension [ 30 ].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…After the state space is computed, a state space search can be performed through customized coding, making formal model checking possible [ 29 ]. In addition, this tool also provides functions such as monitoring and time attribute extension [ 30 ].…”
Section: Related Workmentioning
confidence: 99%
“…When the possible vulnerabilities of the protocol are found, the attack traces extracted by ProVerif and AVISPA were relatively single and, so, they cannot fully determine the possible flaws of the protocol. Scyther’s Adversary model was considered the most potent Adversary model in [ 30 ], which can extract multiple attack traces. However, compared with ProVerif, AVISPA, and other cryptographic verification tools, it is limited by a fixed algorithm and lacks support for newer cryptographic primitives (e.g., homomorphic encryption, attribute encryption, and so on), which are defined in the analysis of some security protocols.…”
Section: Related Workmentioning
confidence: 99%
“…The main advantage of this model is the consideration of parallelism of concurrent tasks and communication, as well as the exclusion of computation and communication with public resources. In [21], the authors developed a configurable CPN model for evaluating the performance and the effectiveness of the IEEE 802.11e protocol. Then, they used a CPN model to provide a comprehensive study of the effectiveness of this protocol.…”
Section: Related Workmentioning
confidence: 99%
“…Nowadays, many works are devoted to study and improve the access method to the physical environment defined by IEEE 802.11 standard. A variety of research methods are used, for example, network simulator [2]; Markov chain [3]; Colored Petri Net [4]; machine learning [5]; to provide QoS to specific flows in network traffic, such as voice [11]; video [12]; downloading large files [13]; signaling [14], and integrated traffic [15].…”
Section: Related Workmentioning
confidence: 99%
“…As the higher-priority frames now have a better chance to be transmitted, the channel utilization is reduced. Many research works [2][3][4][5][6][7][8][9][10] are aimed to improve the performance of MAC sublayer by using different methods and research approaches [2,4,5]. Moreover, most of them aims to ensure the transmission of various traffic types with different requirements, however, the impact of different ratios of various traffic types on the network performance has not yet been studied.…”
Section: Introductionmentioning
confidence: 99%