The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Certified Wireless Universal Serial Bus (WUSB) is one of different varieties of Wimedia standard for distributed medium access control (MAC) protocol for ultra wide band (UWB) communications in the wireless personal area network (WPAN). To the best of our knowledge, no technical contributions exist in the open literature at present simulating WUSB and its performance. In this paper, we investigated...
Recently, wireless protocols related to BAN (Body Area Networks) are under standardization by the IEEE 802.15 (Personal Area Networks, PAN) committee, to enable interoperability of a wide range of applications in the areas of medical support, healthcare monitoring and con sumer wellness electronics. BAN requirements are closely related to PAN or WSN (wireless sensor network) technologies; however...
Due to a large address space, Internet Protocol version 6 (IPv6) uses stateless address autoconfiguration to assign network addresses to hosts. This unmanaged technique creates a static value derived from the Media Access Control (MAC) address of a network interface as the host portion, or interface identifier (IID). Static IID assignment provides third parties (whether malicious or not) with the...
Two-user Multiple Access Channel with a Wire-Tapper (MAC-WT) is considered. A general outer bound for the secrecy capacity region is given. Also, we have defined the Deterministic MAC-WT, where the channel input of each user is a deterministic function of the channel output and the channel input of the other user. For this network single-letter inner and outer bounds for the secrecy capacity region...
Since wireless sensor networks (WSNs) are vulnerable to threats and attacks due to the nature of wireless communications between sensors and fusion center (FC), it is often necessary to secure transmissions from any possible eavesdropping. In this paper, we study the eavesdropping issue when sensors are over-deployed and the channels between sensors and the ally FC are modeled as time-varying Rayleigh...
With the application of wireless sensor networks, many applications not only have ease of installation, reliable data transfer, short-range operation, and extremely low cost and reasonable battery life, whilst maintaining a simple and flexible protocol, but also should have high confidentiality. So the research of the security of the IEEE 802.15.4 is becoming very important. The IEEE 802.15.4 specification...
The IEEE 802.11 medium access control (MAC) protocol defines a contention-based distribution channel access mechanism that shares the wireless medium for mobile stations. In this paper, we present a novel back off mechanism, which divides contention window range to the different level based on the history of channel status. Instead of doubling and resetting the CW, we change the CW range by taking...
Due to Wi-Fi Alliance (WFA)'s marketing, 802.11 became a universal solution for wireless connectivity. However, still a WLAN depends on wired infrastructure that interconnects the central Access Points (APs). To become independent of backbone networks leading to cheap deployments, the traditional single-hop approach needs to be replaced by Wireless Mesh Networks (WMNs). With 802.11s an integrated...
Wireless mesh networks (WMNs) have emerged as a key technology for next-generation wireless networking, due to independency of backbone networks. However, to make a WMN be all it can be, considerable research efforts are still needed. As the available MAC and routing protocols applied to WMNs do not have enough scalability as throughput drops significantly as the number of nodes or hops increases...
IP multicast applications such as live lecture broadcasts are being increasingly used in enterprise and campus networks. In many cases, end hosts access these multicast streams using Wi-Fi networks. However, multicast over Wi-Fi suffers from several well-known problems such as low data rate, high losses and unfairness vis-a-vis other contending unicast transmissions. In this paper we present DirCast,...
It is well known that security threats, in wireless ad hoc networks, are becoming a serious problem which may lead to harmful consequences on network performance. Despite that, many routing protocols still not resilient to such threats or their countermeasures are not efficient. Moreover, the vulnerability of MAC layer protocols to some attacks exacerbates the damage caused by the threats at higher...
In this paper, we consider the standard discrete-time slotted ALOHA with a finite number of terminals with infinite size buffers. In our study, we jointly consider the stability of this system together with the physical layer security. We conduct our studies on both dominant and original systems, where in a dominant system each terminal always has a packet in its buffer unlike in the original system...
Collision leads to the development of retransmission algorithms for random access protocols. However their performance degrades in the case of malicious attacks. The need of a MAC protocol with the ability to identify threats and capability to discard these useless packet is required otherwise performance of shared medium may be degraded. We Focus Our Efforts on further improving the channel allocation...
Wireless networks are being used increasingly in industrial, health care, military and public-safety environments. In these environments security is extremely important because a successful attack against the network may pose a threat to human life. To secure such wireless networks against hostile attack requires both preventative and detective measures.In this paper we propose a novel intrusion detection...
IEEE 802.11 wireless local area networks provide the ability to build a cost efficient network infrastructure that is flexible and mobile. This technology tried to provide mechanisms by which to secure the network, however, it failed to do so. The security mechanisms evolved from wired equivalent privacy (WEP) to Wi-Fi protected access (WPA), which introduced more enhancements to both encryption and...
Due to very sensitive and crucial nature of the collected data, any wireless sensor network (WSN) has to handle efficiently securing it as well as to employ energy-aware and delay-sensitive algorithms in its all layers from application to the physical. These key topics strictly related to each other are of high importance for building and maintaining reliable and long-lasting WSN applications. However,...
IEEE 802.16 is the standard for broadband wireless access. The security sublayer is provided within IEEE 802.16 MAC layer for privacy and access control, in which the Privacy and Key Management (PKM) protocols are specified. This paper models the PKM protocols using Casper and analyzes the CSP output with FDR, which are formal analysis tools based on the model checker. Later versions of PKM protocols...
The paper analyzes the security of IEEE 802.11. Based on the discussion of IEEE 802.11 security requirement, the three security technologies-SSID (Service Set Identifier), MAC(Media Access Control), WEP(Wired Equivalent Privacy) in WLAN standard IEEE802.11 are introduced, especially the encrypting algorithm and the integrity check algorithm in WEP. The security flaws caused by RC4 algorithm, key management,...
The emerging network technologies have brought an upheaval in wireless communication. Fourth generation (4G) networks are designed for better performance by utilizing high band width and better quality of service. IEEE 802.22 is one of the 4G technologies that is in draft stage and yet not deployed. Along with its spectrum sensing and spectrum accessing issues, security concerns are also getting attention...
IP over TETRA is a solid and robust platform for secure and reliable data communications in the field of public safety and in for other PMR applications. In the paper the basic concepts of WAP application over TETRA network are presented. WAP over TETRA trial architecture is shown and an example of Web application ldquodangerous goodsrdquo is demonstrated. TETRA enhanced data services offered by TETRA...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.