On Eliminating the Exposed Terminal Problem Using Signature Detection

Junmei Yao, Tao Xiong, Jin Zhang, Wei Lou

Research output: Journal article publicationJournal articleAcademic researchpeer-review

17 Citations (Scopus)


Wireless networks are propelled to improve the network throughput effectively to face the challenge of sustaining the rapid growth of data traffic and the high density of wireless nodes. Exposed terminals are a main source in wireless networks that degrades the network throughput performance through excessively avoiding interferences and forbidding concurrencies. To combat the exposed terminal problem and exploit the concurrent transmissions in wireless networks, we present the design of Interference Resistant Multiple Access (IRMA) in this paper, which can achieve higher throughput compared to the 802.11 standard. By observing that nodes in current protocols waste transmission opportunities in two different scenarios, IRMA exploits the concurrency in two aspects. IRMA proposes a signature detection method in the physical layer to combat control frames' collisions, thus exploits the concurrency at the transmitter side. IRMA also designs a new NAV update scheme in the MAC layer to differentiate the interference ranges of different transmission links, thus exploits the concurrency of all non-interfering links. Experimental results based on USRP2 demonstrate the feasibility of the signature detection method, and simulations based on ns-2 show that IRMA outperforms the 802.11 standard and other protocols significantly.
Original languageEnglish
Article number7273921
Pages (from-to)2034-2047
Number of pages14
JournalIEEE Transactions on Mobile Computing
Issue number8
Publication statusPublished - 1 Aug 2016


  • cross layer design
  • exposed terminals
  • signal correlation
  • Wireless networks

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'On Eliminating the Exposed Terminal Problem Using Signature Detection'. Together they form a unique fingerprint.

Cite this