Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks
ACM SIGMOBILE Mobile Computing and Communications Review
IEEE/ACM Transactions on Networking (TON)
A Framework for Interoperability of Heterogeneous Devices in Ubiquitous Home
AFIN '10 Proceedings of the 2010 Second International Conference on Advances in Future Internet
AINA '11 Proceedings of the 2011 IEEE International Conference on Advanced Information Networking and Applications
A QoS-aware residential gateway with bandwidth management
IEEE Transactions on Consumer Electronics
A multi-interface gateway architecture for home automation networks
IEEE Transactions on Consumer Electronics
A novel QoS architecture for multi-service provisioning in multi-residential gateways
IEEE Transactions on Consumer Electronics
A home automation proposal built on the Ginga digital TV middleware and the OSGi framework
IEEE Transactions on Consumer Electronics
Novel defense mechanism against data flooding attacks in wireless ad hoc networks
IEEE Transactions on Consumer Electronics
An efficient data gathering routing protocol in sensor networks using the integrated gateway node
IEEE Transactions on Consumer Electronics
IEEE Communications Magazine
Hi-index | 0.00 |
In this paper, we propose an efficient and accurate traffic management scheme by using multi-channel sniffer and analyzer tool for wireless networks. It is very important to manage data traffic in wireless network. Our methods include a channel resource optimization scheme by using centralized channel assignment algorithms and an intrusion detection scheme using traffic prediction algorithms. For performance evaluation of our mechanism, we use the wireless data measured from a real wireless test networks. Simulation result shows that the scheme could manage the multi-channel status of the networks and present the analysis result to network manager for the network resource configuration. The security manager could detect the intrusion attack to improve the whole performance of the system, and the intrusion detection ratio is acceptable to enhance the security efficiently.