Filters








465 Hits in 6.9 sec

Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters

Travis Goodspeed, Sergey Bratus, Ricky Melgares, Ryan Speers, Sean W. Smith
2012 2012 45th Hawaii International Conference on System Sciences  
by posing multiple hardware and software obstacles to standard network attack surface exploration techniques.  ...  We hope this contribution advances the state of the art beyond the pre-exploration tipping point, and toward real security.  ...  Multi-channel monitoring a must Unlike 802.11, where discovery can be easily accomplished by monitor mode sniffing, this step can be non-trivial for other digital radio networks.  ... 
doi:10.1109/hicss.2012.115 dblp:conf/hicss/GoodspeedBMSS12 fatcat:eipzozqh7jdcdekjfw3bb3vq5a

FOR SECURE MEDICAL CARE: USES OF SENSORS & WIRELESS COMMUNICATION

Shankha Mitra Sunani, Bandana Malliick
2013 International Journal of Smart Sensor and Adhoc Network.  
The challenge is to use the concepts of sensors to detect and monitor any violations in the medical care environment.  ...  A discussion of sensors in patient rooms, clinics/wards, hospitals, and measurements of safety and security is presented.  ...  A shared key of size 40 or 64 bits in IEEE 802.11 and 128 bits in IEEE 802.11b are used to provide authentication and encryption of data.  ... 
doi:10.47893/ijssan.2013.1196 fatcat:ihx25dcjsrfn5gmq67stfh2ux4

A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks

L. Ma, A. Y. Teymorian, X. Cheng
2008 IEEE INFOCOM 2008 - The 27th Conference on Computer Communications  
of using customized equipment and/or violating the IEEE 802.11 standard; v) its open architecture allows extra features to be easily added on in the future.  ...  This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceedings. 978-1-4244-2026-1/08/$25.00  ...  An architecture for fault diagnostics in IEEE 802.11 networks is presented in [9] .  ... 
doi:10.1109/infocom.2008.178 dblp:conf/infocom/MaTC08 fatcat:6zqhqkdwfjcyvgmw5jspall6fa

A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks

L. Ma, A. Y. Teymorian, X. Cheng
2008 2008 Proceedings IEEE INFOCOM - The 27th Conference on Computer Communications  
of using customized equipment and/or violating the IEEE 802.11 standard; v) its open architecture allows extra features to be easily added on in the future.  ...  This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceedings. 978-1-4244-2026-1/08/$25.00  ...  An architecture for fault diagnostics in IEEE 802.11 networks is presented in [9] .  ... 
doi:10.1109/infocom.2007.178 fatcat:xnvzknxkqbejni2p4hyjfwnixq

Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities

Manuel Mendonca, Nuno Ferreira Neves
2007 10th IEEE High Assurance Systems Engineering Symposium (HASE'07)  
Our experiments with a Windows Mobile 5 device indicate that Wdev-Fuzzer can be quite effective in confirming known issues and discovering previously unknown problems.  ...  Wireless LANs (WLAN) are becoming ubiquitous, as more and more consumer electronic equipments start to support them.  ...  The details of a NIC hardware implementation can be wrapped by a Media Access Controller (MAC) device driver, in such a way that all NIC's for the same media (e.g., Ethernet) are accessed using a common  ... 
doi:10.1109/hase.2007.43 dblp:conf/hase/MendoncaN07 fatcat:btsij2frrffl3pc44e3idyuwfq

Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities

Manuel Mendonça, Nuno Neves
2008 2008 Seventh European Dependable Computing Conference  
Our experiments with a Windows Mobile 5 device indicate that Wdev-Fuzzer can be quite effective in confirming known issues and discovering previously unknown problems.  ...  Wireless LANs (WLAN) are becoming ubiquitous, as more and more consumer electronic equipments start to support them.  ...  The details of a NIC hardware implementation can be wrapped by a Media Access Controller (MAC) device driver, in such a way that all NIC's for the same media (e.g., Ethernet) are accessed using a common  ... 
doi:10.1109/edcc-7.2008.22 dblp:conf/edcc/MendoncaN08 fatcat:cajbw5smqbgmjba6xwjrqqajwq

The dangers of mitigating security design flaws:

N.L. Petroni, W.A. Arbaugh
2003 IEEE Security and Privacy  
The attack has modest hardware requirements: • A wireless card that can enter RF Monitor mode-a mode in which all detected 802.11 traffic from any network in the area is passed to the operating system-to  ...  Because the if_wi driver already supports RF Monitor mode, it only required a simple change to be able to send arbitrary data being passed through the wi device interface as raw data in an 802.11 packet  ... 
doi:10.1109/msecp.2003.1176993 fatcat:2p63mr3ccndhrho6ss5e4vfuae

GRaTIS: Free Bits in the Network

Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas Sicker
2015 IEEE Transactions on Mobile Computing  
Conventional signal-to-noise (SNR) based rate adaptation algorithms in wireless networks provide limited flexibility in terms of the maximum achievable data rates.  ...  We have implemented this method using a testbed of reconfigurable radio nodes and demonstrated that this method improves average throughput while maintaining similar or lower packet loss compared to the  ...  We then describe the hardware used to implement the technique in §5 and the results from our implementation in §6. §7 describes a (potential) gain analysis for GRATIS using 802.11 packet traces.  ... 
doi:10.1109/tmc.2013.24 fatcat:4kmymtl5wraz3eyh4xa2ya7udu

Wireless MAC processors: Programming MAC protocols on commodity Hardware

I. Tinnirello, G. Bianchi, P. Gallo, D. Garlisi, F. Giuliano, F. Gringoli
2012 2012 Proceedings IEEE INFOCOM  
Programmable wireless platforms aim at responding to the quest for wireless access flexibility and adaptability. This paper introduces the notion of wireless MAC processors.  ...  We clearly distinguish from related work in this area as, unlike other works which rely on dedicated DSPs or programmable hardware platforms, we experimentally prove the feasibility of the wireless MAC  ...  INTRODUCTION More than 20 years have elapsed since the establishment, in 1990, of the IEEE 802.11 Wireless Local Area Network committee.  ... 
doi:10.1109/infcom.2012.6195488 dblp:conf/infocom/TinnirelloBGGGG12 fatcat:upltuko2xjbupdi3goa7vico6u

An Investigation of Security Trends in Personal Wireless Networks

Lu Liu, Thomas Stimpson, Nick Antonopoulos, Zhijun Ding, Yongzhao Zhan
2013 Wireless personal communications  
Moreover, a novel 802.11 denial-of-service device has been created to demonstrate the way in which it is possible to design a new threat based on current technologies and equipment that is freely available  ...  Previous work is used to create a timeline of encryption usage and helps to exhibit the differences between 2009 and 2012.  ...  Acknowledgment The work reported in this paper has been supported by the Sino-UK Higher Education Research  ... 
doi:10.1007/s11277-013-1386-3 fatcat:xpcuakvwp5eldgpirt6zdfujq4

Wi-Fi Networks Security and Accessing Control

Tarek S. Sobh
2013 International Journal of Computer Network and Information Security  
This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects.  ...  In addition, it provides the required user permissions to allow/block access of the files on the user of ad-hoc client.  ...  The basic idea behind War Driving is to -sniff‖ 802.11 traffics with a wireless card set in -monitormode so that it accepts all traffic on frequency irrespective of intended target.  ... 
doi:10.5815/ijcnis.2013.07.02 fatcat:6x75aoudiferhbwhdadmnr5zu4

Experimental Characterization of VoIP Traffic over IEEE 802.11 Wireless LANs [chapter]

Paolo Dini, Marc Portols-Comeras, Jaume Nin-Guerrero, Josep Mangues-Bafalluy
2011 VoIP Technologies  
The structure of the chapter is as follows. First the background on VoIP networks and IEEE 802.11 WLAN is presented.  ...  can cause a further degradation of the voice quality. www.intechopen.com VoIP Technologies 174 This chapter focuses on the transmission of VoIP traffic over IEEE 802.11 WLAN networks and it takes an experimental  ...  In the infrastructure mode, all nodes send and receive their traffic through an Access Point (AP). In section 2.3, IEEE 802.11 access protocol has been introduced.  ... 
doi:10.5772/14514 fatcat:bfunrrkqk5gujots2ppt7ago74

Attention to Wi-Fi Diversity: Resource Management in WLANs with Heterogeneous APs

Jose Saldana, Jose Ruiz-Mas, Julian Fernandez-Navajas, Jose Luis Salazar, Jean-Philippe Javaudin, Jean-Michel Bonnamy, Mael Le Dizes
2021 IEEE Access  
Many home networks integrate a small number (typically 2-4) of Wi-Fi Access Points (APs), with heterogeneous characteristics: different 802.11 variants, capabilities and security schemes.  ...  The system has been implemented in a real environment, and a battery of tests has been run using three hardware platforms of different characteristics.  ...  It is in charge of injection and capture of frames. • Internal card using ath10k driver: it is only used for sending layer-2 ACKs. The internal card is in ''monitor active'' mode.  ... 
doi:10.1109/access.2021.3049180 fatcat:7zfoqiwjxbbingcggu3zhjk64y

An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications

Thaier Hayajneh, Sana Ullah, Bassam J. Mohd, Kiran S. Balagani
2017 IEEE Systems Journal  
Index Terms-Field-programmable gate array (FPGA), IEEE 802.11i, multimedia security, wireless local area network (WLAN), WiFi protected access II (WPA2). 1932-8184 He is the author or coauthor of over  ...  At the access point, we improve the performance of network processing hardware for real-time cryptographic processing by using a specialized processor implemented with field-programmable gate array technology  ...  In [34] , it was noted that a reconfigurable hardware design is capable of evolving with algorithms and resisting new strains of attacks.  ... 
doi:10.1109/jsyst.2015.2424702 fatcat:wmcoju2c3vhc5k2gv3uw6gnrza

A transmission control scheme for media access in sensor networks

Alec Woo, David E. Culler
2001 Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom '01  
We study the problem of media access control in the novel regime of sensor networks, where unique application behavior and tight constraints in computation power, storage, energy resources, and radio technology  ...  Media access control in sensor networks must not only be energy efficient but should also allow fair bandwidth allocation to the infrastructure for all nodes in a multihop network.  ...  in collecting some of the measurements.  ... 
doi:10.1145/381677.381699 dblp:conf/mobicom/WooC01 fatcat:bcjnq2un4jdcpafnfomrtgjch4
« Previous Showing results 1 — 15 out of 465 results