Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2020
Range and Topology Mutation Based Wireless Agility
MTD'20: Proceedings of the 7th ACM Workshop on Moving Target DefensePages 59–67https://doi.org/10.1145/3411496.3421228Wireless is a key component in most of today's network infrastructures. Yet, it is highly susceptible to network attacks because wireless communication and infrastructure, such as Access Point(AP) and clients, can be easily discovered and targeted. ...
- research-articleOctober 2016
Prizm: A Wireless Access Point for Proxy-Based Web Lifelogging
LTA '16: Proceedings of the first Workshop on Lifelogging Tools and ApplicationsPages 19–25https://doi.org/10.1145/2983576.2983581We present Prizm, a prototype lifelogging device that comprehensively records a user's web activity. Prizm is a wireless access point deployed on a Raspberry Pi that is designed to be a substitute for the user's normal wireless access point. Prizm ...
- research-articleSeptember 2014
Undesired relatives: protection mechanisms against the evil twin attack in IEEE 802.11
Q2SWinet '14: Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networksPages 87–94https://doi.org/10.1145/2642687.2642691Commonly used identifiers for IEEE 802.11 access points (APs), such as network name (SSID), MAC (BSSID), or IP address can be trivially spoofed. Impersonating existing APs with faked ones to attract their traffic is referred to in the literature as the \...
- research-articleJune 2014
Letting the puss in boots sweat: detecting fake access points using dependency of clock skews on temperature
ASIA CCS '14: Proceedings of the 9th ACM symposium on Information, computer and communications securityPages 3–14https://doi.org/10.1145/2590296.2590333The only available IEEE 802.11 network identifiers (i.e., the network name and the MAC address) can be easily spoofed. Consequently, an attacker is able to fake a real hotspot and attract its traffic. By this means, the attacker can intercept, collect, ...
- ArticleJune 2011
A game theory-based approach to reducing interference in dense deployments of home wireless networks
ISCC '11: Proceedings of the 2011 IEEE Symposium on Computers and CommunicationsPages 976–982https://doi.org/10.1109/ISCC.2011.5983969Urban residential areas are becoming increasingly dense with more and more home networks being deployed in close proximity. The paper considers a dense urban residential area where each house/unit has its own wireless access point (AP), deployed without ...
- ArticleSeptember 2010
Self-configuration of Wireless Access Points Based on Mechanisms of Biological Development and Evolution
SASOW '10: Proceedings of the 2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems WorkshopPages 17–25https://doi.org/10.1109/SASOW.2010.9We propose a method for self-configuration of wireless access points (APs) that is inspired by mechanisms of biological development and evolution. The purpose of the proposed configuration is to simultaneously achieve power savings in the APs and ...
- articleJune 2005
CICADA: a novel scheme for improving TCP performance over wireless links: Research Articles
In this paper, by making slight modifications in protocol stack of wireless access points, the proposed CICADA scheme aims at isolating problems related to wireless section of a transmission control protocol (TCP) connection from its wired portion, ...
- articleJanuary 2003
SCO link sharing in Bluetooth voice access networks
Journal of Parallel and Distributed Computing (JPDC), Volume 63, Issue 1Pages 45–57https://doi.org/10.1016/S0743-7315(02)00035-7In this paper we consider the potential for SCO link sharing in Bluetooth-based telephony base stations. A design referred to as the Bluetooth distributed voice access protocol (DVAP) is introduced. In DVAP, Bluetooth mobiles collect connectivity ...