The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Local Area Networks (WLANs) based on the IEEE 802.11 standards are becoming increasingly popular in businesses, governments, educations, public and individual. However, when transmissions are broadcast over radio waves, interception and masquerading becomes trivial to anyone with a radio, and so there is a need to employ additional mechanisms to protect the communication. In this paper, we...
Recently, the problem of protecting privacy at link-layer is of great importance in wireless environments, mainly due to the fact that the wireless link layer is not protected by current technologies used in wireless networks. This leads to many potential threats to security and user privacy. Very recently, Lu et al. proposed an authentication scheme for wireless link-layer privacy which is based...
Residential Network is an inter-connection of several electrical and electronic home appliances for convenient, comfortable and daily life of home users. It is the hybrid technology of wireless, Ethernet, Bluetooth and RF to the internet via broadband connection at home with various home network services regardless of device, time and place. More and more devices will be wireless and most of them...
The integration of IP-based and cellular network has lead to increased demand on Internet applications. Wi-Fi handsets that are capable of voice over Internet protocol (VoIP) services and that can switch seamlessly between IP-based and Cellular networks are subjected to continuous security threats that prompt the need for security mechanism. In this paper a solution for a secured VoIP service in this...
With the rapid development of wireless communication, mobile users are able to manually switch their network interfaces to different types of networks. The IEEE 802.21 Draft Standard was proposed to integrate the Media Independent Handover (MIHs) between the wireless network interfaces, such as WiFi, WiMAX, 3 GPP, and 3GPP2. However, it may not hold the seamless roaming character and does not provide...
Contrast with the current WLAN (wireless local area network) security mechanism worked in data link layer. IPSec over WLAN worked in IP layer has his superiorities. But as a security mode originally used in wired network, IPSec uses IKE (Internet key exchange protocol) as default that need a large number of computation is not fit for mobile devices of WLAN. Besides, IPSec protocol does not fit mobile...
Authentication is an important aspect in network security, especially in wireless network where unauthorized user can gain access to the network without any physical access. One of the authentication protocols that have been used in wireless networks is the extensible authentication protocol (EAP). This paper discusses the simulation development and simulation results of a mechanism to select and...
The following topics are dealt with: wireless sensors; physical layer aspects; mobile location; wireless medium access control; Internet security; wireless networking; wireless security; Internet services; communication protocols; WIMAX; wireless LAN; internetwork handovers; MANET; wireless QoS; digital media and security; industrial communications; monitoring and sensor networks.
This paper proposes a fast forward medium access control protocol (FFMAC) for quality-of-service (QoS) guarantee in multihop IEEE 802.11s wireless mesh networks with multiple channels. To the best of our knowledge, the proposed protocol is the first one which considers the multihop and multichannel issues simultaneously. It provides higher priority for real-time applications, while remaining the distributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.