The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security always comes with a price in terms of performance degradation, which should be carefully quantified. This is especially the case for wireless ad hoc networks (WANETs), which offer communications over a shared wireless channel without any preexisting infrastructure. Forming end-to-end secure paths in such WANETs is more challenging than in conventional networks due to the lack of central authorities,...
We consider the problem of identifying insider-based attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequency hopping patterns and any protocols used in the wireless network. We propose a novel technique, called "alibi'', to identify the insider-based jammers in multi-channel wireless networks. Alibi is a form of defense whereby a...
The following topics are dealt with: wireless communications; wireless networks; networks convergence; social mobility; mobile technology; wireless technology; protocols; mobile network deployment; cognitive vehicular networks; cooperative networks; security; spectrum allocation; radio interfaces; traffic and congestion control; QoS; and resource management.
Users of public Wi-Fi networks risk being tricked into connecting to `evil twin' access points set up by attackers to launch man-in-the-middle attacks. We present a system which employs post hoc validation of an anonymous Diffie-Hellman key exchange undertaken as part of an 802.1X/EAP-TTLS network association process. Our system utilises an additional secure auxilliary channel to run a modified version...
Secure wireless communications typically rely on secret keys, which are hard to establish in a mobile setting without a key management infrastructure. In this paper, we propose a channel hopping protocol that lets two stations agree on a secret key over an open wireless channel and without use of any pre-existing key. It is secure against an adversary with typical consumer radio hardware that only...
The fast growth of wireless networking has made data security an essential issue. Encryption mechanisms relying on a static key structure, such as WEP (802.11) and TKIP (802.1x), are vulnerable to key cracking via the capture of wireless packets. Although new standards have been developed to fill this gap, a stable security protocol has been lacking. In this paper, we present a lightweight and solid...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.