The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The low cost and ease of installation of Wi-Fi equipment operating in unlicensed spectrum have made dense Wi-Fi deployments a reality in most modern urban areas. With the lack of many non-overlapping frequencies to operate on, interference among neighbor Wi-Fi cells can cause significant performance degradation. Here we study the problem of topology discovery in such dense deployments, which is necessary...
In recent years, eco-friendly transportation is becoming more and more important. Unmanned vehicle has attracted many researchers' attention from both the academia and industry of, notably, US, EU and Korea. Unmanned vehicle is widely accepted in many public places due to its reliability, security, pollution-free and low-speed. Under these circumstances, inter-vehicle communications has become an...
The following topics are dealt with: wireless systems; wireless LAN; vehicular communication system; digital rights management; ad hoc and sensor networks; routing and QoS; peer-to-peer overlays; security in personalised networks; visible light communications; multimedia communication; content distribution; cellular networks; cognitive radio and wireless home networks.
ZigBee technology has become the standard of choice among other wireless technologies by providing efficient low-power connectivity while allowing for a large number of devices to be part of a single network. The security of the ZigBee communication becomes the important role. But, ZigBee cannot provide sufficient security when large sensor networks appeared. To address these limitations, we propose...
The following topics are dealt with: performance modelling; routing mechanism; distributed systems; parallel systems; service oriented architecture; communication technology; protocols; autonomic network systems; Internet computing; ad hoc networks; wireless sensor networks; privacy management; mobile networks; multimedia systems; pervasive computing; ubiquitous computing; security intrusion detection;...
The following topics are dealt with: telecommunication security; link layer; wireless sensor network; wireless LAN; multimedia communication; medium access control protocols; quality of service; mobile ad hoc network; routing protocols; cross-layer optimisation; mobility management (mobile radio); and node placement strategies.
In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verification scheme before granting a user with privileges for crucial resources access. Analysis and simulation results show that our framework...
In this paper we present a scalable architecture which involves different kind of 802.11 mobile devices in a manner which resembles to a wireless sensor network. Today, various wireless solutions exist for sensor networks applications. However there is no widely deployed standard to win over the market and the computational capabilities of such devices are still very limited. On the other hand the...
In this paper, we consider interconnected IEEE 802.15.4 beacon enabled clusters with secure and reliable sensing. Clusters are interconnected via bridges implemented on cluster coordinators. Each cluster has to contribute a constant number of packets per second to the sink. Packets are protected with the Message Authentication Code which requires a secret key shared between each node and coordinator...
In this paper, we discuss wireless reduction of quality (RoQ) attacks against the transmission control protocol (TCP). RoQ attacks can dramatically degrade the TCP performance with a less number of wireless jamming attacking packets, which makes them rather difficult to detect. We propose a RoQ attack model which exposes the possibility to launch a RoQ attack and illustrates attack conditions. A CTS...
Environment of the Next-Generation is organized by various sensors and devices. wireless body area network (WBAN) is the core technology connecting Next-Generation's compositional elements around the human to one network. Recently while many researches including healthcare services and wearable PC are actively in progress, technologies of WBAN gradually are beginning to receive the attention, and...
IEEE 802.11 set of standards grew from a highly obscured and unsecured technology to a robust and reliable solution for many of us. Broad acceptance and relatively simple implementation also made 802.11 a perfect target for possible exploitation. Recently discovered wireless driver vulnerabilities exposed a new critical threat that legitimate users community is facing. What makes this vulnerability...
Many anonymous communication solutions have been proposed to provide anonymous mobile ad hoc network (MANET) communications. However, they mainly focus on the routing layer and above to hide the end-to-end traffic patterns. The point-to-point communication relations are often considered as non-critical information in terms of anonymity, which actually exposes the traffic patterns on the PHY/MAC layer...
Current Wi-Fi network infrastructure inherently lacks reliable positional knowledge of the origin of individual network packets. As a consequence, attackers are potentially able to impersonate legitimate Wi-Fi network nodes, including both clients and access points, by generating network traffic with all the characteristics of legitimate traffic. To exclusively discriminate illegitimate nodes, we...
The following topics are dealt with: local computer networks; peer-to-peer systems; mesh and optical networks; sensor networks; energy awareness; routing; performance analysis; security; link layer; IEEE 802.11 system; design optimization; and resource management.
The following topics are dealt with: hash table based index structure; Linux; Web services; weighting replacement policy; network based authorization framework; noble path selection algorithm; support vector machines; matrix-vector multiplication; visual programming language; genetic programming; software reliability; face recognition system; VOIP communications; IEEE 802.11 based wireless LAN; mobile...
The following topics were dealt with: wireless sensor networks; MANET; WLAN; IEEE 802.11; MIMO; OFDMA; scheduling; mobility and resource management; Internet; localization; WiMax; coding; OFDM; media streaming; QoS; security; WiMob; cryptographic protocols; ad hoc networks security; broadband wireless access; wireless and mobile computing.
Wireless networks are vulnerable to sybil attacks, in which a sybil node forges multiple identifications to trick the system and conduct harmful attacks. The traditional approach to address sybil attacks is to employ cryptographic-related methods. However, conventional security approaches may not always desirable due to their infrastructural overhead. In this paper, we propose to utilize K-means cluster...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.