Journal of Shanghai Jiaotong University ›› 2012, Vol. 46 ›› Issue (11): 1729-1735.
• Automation Technique, Computer Technology • Previous Articles Next Articles
ZHOU Gui-Yin, HE Chen, JIANG Ling-Ge
Received:2011-11-08
Online:2012-11-30
Published:2012-11-30
CLC Number:
ZHOU Gui-Yin, HE Chen, JIANG Ling-Ge. Single Transceiver and Network Characteristics Based MAC Protocol for Cognitive Radio Wireless Sensor Networks[J]. Journal of Shanghai Jiaotong University, 2012, 46(11): 1729-1735.
| [1] Cavalcanti D, Das S, Wang J, et al. Cognitive radio based wireless sensor networks[C]∥Proceedings of 17th International Conference on Computer Communications and Networks. US Virgin Islands: IEEE Press, 2008:16.[2] Zahmati A, Hussain S, Fernando X, et al. Cognitive wireless sensor networks: Emerging topics and recent challenges[C]∥ IEEE Torontol International Conference Science and Technology for Humanity. Toronto: IEEE Press, 2009: 593596.[3] Shui G, Shen S. A new multichannel MAC protocol combined with ondemand routing for wireless mesh networks[C]∥ International Conference on Computer Science and Software Engineering. Wuhan: IEEE Press, 2008: 10361039.[4] Su H, Zhang X. CREAMMAC: An efficient cognitive radioenabled multichannel MAC protocol for wireless networks[C]∥ International Symposium on a World of Wireless, Mobile and Multimedia Networks. Newport Beach: IEEE Press, 2008: 18.[5] Pathmasuntharam J, Das A, Gupta A. Primary channel assignment based MAC (PCAM) A multichannel MAC protocol for multihop wireless networks[C]∥ Wireless Communications and Networking Conference. Atlanta: IEEE Press, 2004: 11101115.[6] Kondareddy Y R, Agrawal P. Synchronized MAC protocol for multihop cognitive radio networks [C]∥ IEEE International Conference on Communications. Beijing: IEEE Press, 2008: 31983202.[7] Jungmin S, Vaidya H. Multichannel MAC for ad hoc networks: Handling multichannel hidden terminals using a single transceiver [C]∥ Proceedings of the 5th ACM international symposium on Mobile ad hoc Networking and Computing. Japan: ACM Press, 2004: 222233.[8]Corderio C, Challapali K, Birru D, et al. IEEE 802.22: An introduction to the first wireless standard based on cognitive radios [J]. Journal of Communications, 2006, 1(1): 3847. [9] 802.11 (Revision of IEEE Std 802.111999), Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications[S]. |
| [1] | ZHANG Yusheng, XU Yonghui, ZHOU Yuqi, DU Jiang, WEI Changan. LLM-Based Intelligent Association Between Protocol Templates and Object Models [J]. Air & Space Defense, 2025, 8(6): 94-102. |
| [2] | CHEN Yiheng, ZHANG Long, ZHAO Qingsong, YANG Lanqing, XUE Guangtao. Research on Distributed Control Technology Based on Narrowband Internet of Things [J]. Air & Space Defense, 2025, 8(2): 142-152. |
| [3] | GENG Zongsheng1 (耿宗盛), ZHAO Dongdong1,2 (赵东东), ZHOU Xingwen1 (周兴文), YAN Lei1 (闫磊), YAN Shi1,2∗ (阎石). Leader-Following Consensus of Multi-Agent Systems via Fully Distributed Event-Based Control [J]. J Shanghai Jiaotong Univ Sci, 2024, 29(4): 640-645. |
| [4] | MIRZAEE Siavash, JIANG Letian *(蒋乐天). Fast Confidentiality-Preserving Authentication for Vehicular Ad Hoc Networks [J]. Journal of Shanghai Jiao Tong University (Science), 2019, 24(1): 31-40. |
| [5] | BHASKAR Subbe Gowda1*, SATISH KUMAR Gandluru Arthur Edwin2, RAMANA REDDY Patil3. Design and Analysis of an Adaptive Handover Protocol for 4G Networks [J]. Journal of shanghai Jiaotong University (Science), 2015, 20(2): 209-217. |
| [6] | HE Jing-sha1,2 (何泾沙), XU Chen1* (徐琛), ZHANG Yi-xuan1 (张伊璇), ZHOU Shi-yi2 (周世义). A Strategy for Middleman Attack Prevention in Remote Desktop Protocol [J]. Journal of shanghai Jiaotong University (Science), 2015, 20(1): 82-85. |
| [7] | XIE Qi* (谢 琪), LIU Wen-hao (刘文浩), WANG Sheng-bao (王圣宝),HU Bin (胡 斌), DONG Na (董 娜), YU Xiu-yuan (于秀源). Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 418-424. |
| [8] | CHEN Lei,ZHU Tianlin,LIU Feng,WANG Wei. Packet Delay Estimation with Minimum Queue Waiting in Asymmetric Network [J]. Journal of Shanghai Jiaotong University, 2014, 48(10): 1394-1399. |
| [9] | ZHANG Yuanqing,LIU Quanli,WANG Wei. Design and Implementation of a Train Audio Control Unit of the Passenger Information System (PIS) Based on SIP [J]. Journal of Shanghai Jiaotong University, 2014, 48(07): 1021-1025. |
| [10] | LI Yong-Jin, DENG Rang-Yu, YAN Xiao-Bo, YI Xiao-Fei, ZHOU Hong-Wei, ZHANG Ying. Design of a 2 GHz L2 Cache for 16-core Processor [J]. Journal of Shanghai Jiaotong University, 2013, 47(01): 108-112. |
| [11] | FU Gui-Tao-1, 2 , ZHAO Tian-Lei-1, TANG Chuan-1, XING Zuo-Cheng-1. An Adaptive Token Protocol Optimized for Migratory Sharing [J]. Journal of Shanghai Jiaotong University, 2013, 47(01): 49-54. |
| [12] | . Effect of the Influence of Functional Connections in Mental Images on Design Cognition Process [J]. Journal of Shanghai Jiaotong University, 2011, 45(09): 1299-1303. |
| [13] | CHEN Ping-a, WANG Chun-Xiang-a, YANG Ming-b, WANG Bing-b. Design of an Active Safety Collision Avoidance System Based on Adaptive Warning Area [J]. Journal of Shanghai Jiaotong University, 2011, 45(07): 995-999. |
| [14] | CHEN Le,CAO Zhenfu. Approaches to Resisting LengthBased Attack [J]. Journal of Shanghai Jiaotong University, 2010, 44(07): 968-0974. |
| [15] | XU Dongxiao,JIANG Lingge,HE Chen. A Method of Mobility Fast Handover Based on Locator/ID Separation Protocol [J]. Journal of Shanghai Jiaotong University, 2010, 44(02): 156-0160. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||