Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperDecember 2024
Emulating GFSK Modulation for Wi-Fi-to-BLE Multicast Communication
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 1635–1637https://doi.org/10.1145/3636534.3697443Cross technology communication (CTC) facilitates direct communication between heterogeneous wireless technologies in the overlapped frequencies such as the 2.4 GHz ISM band. In this poster, we propose a novel method named WBMC for direct multicast ...
- research-articleDecember 2024
Experimenting with Adaptive Bitrate Algorithms for Virtual Reality Streaming over Wi-Fi
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 1930–1937https://doi.org/10.1145/3636534.3697322Interactive Virtual Reality (VR) streaming over Wi-Fi networks encounters significant challenges due to bandwidth fluctuations caused by channel contention and user mobility. Adaptive BitRate (ABR) algorithms dynamically adjust video encoding bitrate ...
- demonstrationOctober 2024
Deakin Breathes Data
UbiComp '24: Companion of the 2024 on ACM International Joint Conference on Pervasive and Ubiquitous ComputingPages 337–341https://doi.org/10.1145/3675094.3681947Deakin Breathes Data (DBD) rethought and rethreaded radio surveillance on a university campus into a material, fibrous aesthetic. We used university-captured Wi-Fi data to present how shared knowledge threads the modern university experience. Laser cut ...
- posterJuly 2024
POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks?
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 1958–1960https://doi.org/10.1145/3634737.3659436IoT device provisioning is the process of setting up headless IoT devices with their companion mobile apps. IoT vendors and manufacturers have the flexibility of different provisioning methods, one of them being the Access Point (AP) pairing mode over Wi-...
- posterJune 2024
Guarding the Wi-Fi 4-Way Handshake against Channel-based MiTM: A Case Study on KRACK Attack
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyPages 147–149https://doi.org/10.1145/3626232.3658636In the rapidly evolving digital age, the security of wireless networks is paramount. In this paper, we present a comprehensive analysis and defense mechanism against Key Reinstallation Attacks (KRACKs) targeting the Wi-Fi Protected Access II (WPA2) ...
-
- rfcJanuary 2024
RFC 9467: Relaxed Packet Counter Verification for Babel MAC Authentication
This document relaxes the packet verification rules defined in "MAC Authentication for the Babel Routing Protocol" (RFC 8967) in order to make the protocol more robust in the presence of packet reordering. This document updates RFC 8967.
- research-articleOctober 2023
Performance Analysis of MAC Energy-saving Strategies for WLANs
MSWiM '23: Proceedings of the Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile SystemsPages 119–126https://doi.org/10.1145/3616388.3617531The IEEE 802.11 protocol has become the de facto communication technology for WLANs (Wireless Local Area Networks). While considered reliable and efficient for applications requiring high datarate, IEEE 802.11 is often disregarded for energy-sensitive ...
- research-articleOctober 2023
Blind Modulation Classification of Wi-Fi 6 and 5G signals for Spectrum Sensing
MSWiM '23: Proceedings of the Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile SystemsPages 137–145https://doi.org/10.1145/3616388.3617527Classification of modulation of Wi-Fi~6 and 5G downlink (DL) user data signals for spectrum sensing is studied. First, the orthogonal frequency division multiplexing (OFDM) symbol duration and cyclic prefix (CP) length are estimated based on the cyclic ...
- research-articleOctober 2023
Simple and Efficient Loop-Free Multipath Routing in Wireless Networks
MSWiM '23: Proceedings of the Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile SystemsPages 47–56https://doi.org/10.1145/3616388.3617521RIPPLE-WiN (Routing Information Protocol with Probing for Looplessness and Efficiency in Wireless Networks) is introduced. RIPPLE-WiN replaces the sequence numbers that are used in popular routing protocols for wireless networks like OLSR, AODV and DSDV ...
- posterOctober 2023
Poster: Accordion: Toward a Limited Contention Protocol for Wi-Fi 6 Scheduling
MobiHoc '23: Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile ComputingPages 302–303https://doi.org/10.1145/3565287.3617933Target Wake Time (TWT) is a new scheduling capability in Wi-Fi 6 that can improve network performance by reducing contention and increasing energy efficiency. In this paper, we revisit the classic Adaptive Tree Walk Protocol (ATWP) and show its ...
- research-articleSeptember 2023
Understanding the Impact of Wi-Fi Configuration on Volumetric Video Streaming Applications
EMS '23: Proceedings of the 2023 Workshop on Emerging Multimedia SystemsPages 41–47https://doi.org/10.1145/3609395.3610599Emerging multimedia applications often use a wireless LAN (Wi-Fi) infrastructure to stream content. These Wi-Fi deployments vary vastly in terms of their system configurations. In this paper, we take a step toward characterizing the Quality of ...
- research-articleJanuary 2023
Study of Spatial Reuse in IEEE 802.11ax Networks over Propagation Models
Procedia Computer Science (PROCS), Volume 220, Issue CPages 210–217https://doi.org/10.1016/j.procs.2023.03.029AbstractThe paper studies the spatial reuse in IEEE 802.11ax networks over propagation models in ns3. The propagation models used in the study include the Friis model, the Nakagami model, and the combination of the two models. The results show that not ...
- posterOctober 2022
A prototype of uplink NOMA wi-fi with successive interference cancellation: demo
MobiHoc '22: Proceedings of the Twenty-Third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile ComputingPages 291–292https://doi.org/10.1145/3492866.3561255New data transmission methods are needed for future Wi-Fi networks to increase throughput and support dense deployments. Wi-Fi networks often consist of devices of different generations, so these methods need to support backward compatibility. Uplink non-...
- demonstrationOctober 2022
RoMA: rotating MAC address for privacy protection
SIGCOMM '22: Proceedings of the SIGCOMM '22 Poster and Demo SessionsPages 31–33https://doi.org/10.1145/3546037.3546055MAC addresses can be collected by passive observers to track Wi-Fi users. While address randomization neutralizes this threat for devices not yet associated, the problem remains for devices being associated with a WLAN. In this paper, we introduce RoMA, ...
- posterJune 2022
Defending wi-fi network discovery from time correlation tracking
MobiSys '22: Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and ServicesPages 591–592https://doi.org/10.1145/3498361.3538799To prevent tracking a Wi-Fi device based on its MAC address, several operating systems have adopted MAC address randomization to conceal its factory-assigned address. This feature benefits users when their devices scan for networks, but a flaw arises ...
- research-articleMay 2022
A Time-Memory Trade-Off Attack on WPA3's SAE-PK
APKC '22: Proceedings of the 9th ACM on ASIA Public-Key Cryptography WorkshopPages 27–37https://doi.org/10.1145/3494105.3526235To increase the security of Wi-Fi hotspots, the Wi-Fi Alliance released the SAE-PK (Simultaneous Authentication of Equals - Public Key) protocol in December 2020. In this protocol, the password of the network is derived from the public key and the name ...
- research-articleMay 2022
Automatic Machine Learning for Multi-Receiver CNN Technology Classifiers
WiseML '22: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine LearningPages 39–44https://doi.org/10.1145/3522783.3529524Convolutional Neural Networks (CNNs) are one of the most studied family of deep learning models for signal classification, including modulation, technology, detection, and identification. In this work, we focus on technology classification based on raw ...
- research-articleMay 2022
On the Robustness of Wi-Fi Deauthentication Countermeasures
WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 245–256https://doi.org/10.1145/3507657.3528548With the introduction of WPA3 and Wi-Fi 6, an increased usage of Wi-Fi Management Frame Protection (MFP) is expected. Wi-Fi MFP, defined in IEEE 802.11w, protects robust management frames by providing data confidentiality, integrity, origin authenticity,...
- posterApril 2022
kTRACKER: Passively Tracking KRACK using ML Model
CODASPY '22: Proceedings of the Twelfth ACM Conference on Data and Application Security and PrivacyPages 364–366https://doi.org/10.1145/3508398.3519360Recently, a number of attacks have been demonstrated (like key reinstallation attack, called KRACK) on WPA2 protocol suite in Wi-Fi WLAN. In this paper, we design and implement a system, called kTRACKER, to passively detect anomalies in the handshake of ...
- research-articleNovember 2021
Desynchronization and MitM Attacks Against Neighbor Awareness Networking Using OpenNAN
MobiWac '21: Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless AccessPages 97–105https://doi.org/10.1145/3479241.3486689The Neighbor Awareness Networking (NAN) specification, also known as Wi-Fi Aware, offers a quick and energy efficient way of forming wireless ad-hoc networks. It includes ranging capabilities based on Fine Timing Measurements (FTM) and can sustain ...