197–213, 2003.  W. Du, J. Deng, Y. Han, S. Chen, and P. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” in Proc. 2004 IEEE INFOCOM, pp. 586–597.  C. Castelluccia and A. Spognardi, “A robust key pre-distribution protocol for multi-phase wireless sensor networks,” in Proc.
The Personal Area Network (PAN) created can operate at a distance up to 100 meters (328 feet) depending on the individual device specifications. Short-range radio waves are transmitted at 2.4 to 2.485GHz using a signal that hops at 1600 hops/sec. A users’ private data is stored and they are able to transfer data with other devices while keeping that data from being publicly available. In order to pair devices securely, there must be an authentication process, key generation, and key acceptance. Paired devices can share voice, data, music, photos, videos, and other information wirelessly (Bluetooth Technology 101: Fast Facts).
We proposed some preliminaries for our proposed schemes of Min-m... ... middle of paper ... ... Computing, Sept. 2005.  X. Qin and R. Berry, “Opportunistic splitting algorithms for wireless networks,” in Proc. 2004 INFOCOM, pp. 1662–1672.  V. Shah, N. B. Mehta, and R. Yim, “Splitting algorithms for fast relay selection: generalizations, analysis, and a unified view,” IEEE Trans.
It is well known that TCP is designed and tuned fo... ... middle of paper ... ...pecific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std. 802.11, (1997), pp: I–445.  V. Paxson, M. Sargent, M. Allman, J. Chu., Computing TCP's Retransmission Timer, (2011), RFC6298.  Dalal, P., Kothari, N., and Dasgupta, K., Improving TCP Performance over Wireless Network with Frequent Disconnections, International Journal of Computer Networks and Communication, 3(6), (2011), pp.
Wireless LANs provide all the functionality of wired LANs, without the physical constraints or the wired connection itself. Wireless LAN configurations range from simple peer-to-peer topologies to complex networks offering distribution data connectivity and roaming. Besides offering end-user mobility within a networked environment, wireless LANs enable portable networks, allowing LANs to move with the knowledge workers that use them. One of the aims of the project is to illustrate suitability of a wireless LAN for the in use today. This will allow us to gain a more fundamental insight in the possibilities and restrictions of wireless LAN.
International Journal of Wireless and Mobile Computing 5.4 (2012): 315-326. Print. Zhang, Kuan, Xiaohui Liang, Xuemin Shen, and Rongxing Lu. "Exploiting Multimedia Services In Mobile Social Networks From Security And Privacy Perspectives." IEEE Communications Magazine 52.3 (2014): 58-65.
Broadcasting operation is expected to be exe... ... middle of paper ... ...-aodv-02.txt  LANMAN Standards Committee of the IEEE Computer Society, IEEE Standard 802.11-1997, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications (November 1997).  S. Ni, Y. Tseng, Y. Chen, and J. Sheu, “The broadcast storm problem in a mobile ad hoc network,” Proc. of ACM/IEEE MOBICOM’99, pp. 151–162, Aug. 1999.  M. Impett, M. S. Corson, and V. Park, “A receiver-oriented approach to reliable broadcast ad hoc networks,” Proc.
 Y. Chen, S. Chuang, L. Yeh, and J. Huang, "A practical authentication protocol with anonymity for wireless access networks," Wireless Communications and Mobile Computing, 2010.  G. YANG, Q. HUANG, D. WONG, and X. DENG, "Universal Authentication Protocols for Anonymous Wireless Communications," IEEE Transactions on Wireless Communications, vol. 9, pp. 168-174, 2010.
References  Carla-Fabiana Chiasserini. Wireless Ad-hoc Networks, Politecnico di Torino  Shiwen Mao, Dennis Bushmitch, Sathya Naramayan, Shivendra S. Panwar. MRTP, Polytechnic university.  Thomas Plagemann, Jon Egil Andersson, Vera Goebel, Carsten Griwodz, Pal Halvorsen. Ad-hoc Info Ware: Middleware Services for Information Sharing in Ad-hoc Networks, University of Oslo.