17 Hits in 6.9 sec

Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots

Chaminda Alocious, Hannan Xiao, Bruce Christianson, James Malcolm
2015 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing  
Our research investigates MAC layer node misbehaviours in the context of a Public Wireless Hotspot. REC-TR-MAC has been implemented by porting the legacy code-base to the latest ns2.  ...  Finally, this paper describes future improvements for detecting and preventing MAC layer misbehaviours in Wi-Fi networks.  ...  INTRODUCTION Public wireless Hotspot uses Wi-Fi technology and acts as an internet Access Point (AP) in public locations.  ... 
doi:10.1109/cit/iucc/dasc/picom.2015.276 dblp:conf/IEEEcit/AlociousXCM15 fatcat:i2iy2ae7yrfzlkvfrjlwsxybxy

Resilient misbehaviour detection MAC protocol (MD-MAC) for distributed wireless networks

Chaminda Alocious, Hannan Xiao, Bruce Christianson
2016 2016 IEEE Wireless Communications and Networking Conference  
This research proposes a Misbehaviour Detection MAC protocol (MD-MAC) to address the problematic scenarios of MAC layer misbehaviours, which takes a novel approach to detect misbehaviours in Mobile Adhoc  ...  The MD-MAC protocol has been implemented and evaluated in ns2, simulation results suggest that the protocol is able to detect misbehaving wireless nodes in a distributed network environment.  ...  Also, in [5] [6] [7] has conducted an evaluation for greedy receiver misbehaviour in IEEE 802.11 Hotspots, they have identified a range of greedy receiver misbehaviours, and quantify their damage using  ... 
doi:10.1109/wcnc.2016.7564841 dblp:conf/wcnc/AlociousXC16 fatcat:qfnwmh56gvgfvkywrmezi6jruy

A cloud service for trust management in cognitive radio networks

Shameek Bhattacharjee, Dan C. Marinescu
2014 International Journal of Cloud Computing  
His work spans several areas: scheduling and workflow management in large-scale distributed systems and cloud computing; parallel algorithms and performance evaluation of parallel and distributed systems  ...  He has published more than 220 papers in these areas, in refereed journals and conference proceedings as well as several books:  ...  Public access is supported in London using wireless mesh networks.  ... 
doi:10.1504/ijcc.2014.066785 fatcat:xffcviv6lbcm7eiepdx62dee2m

Sessions-based misbehaviour detection framework for wireless mobile AD HOC networks

T Fahad
responsibility. 2.6 MAC Layer Misbehaviour Issues in MANET 2.6.1 Misbehaving in Channel Access Since there is no central authority in MANET, Wireless Medium Access Control (MAC) protocols [Jurdak  ...  Then we move down one step to the MAC layer and discuss its security issues in MANET, which includes misbehaviour issues in the channel access.  ... 
doi:10.24377/ljmu.t.00005882 fatcat:7h6vqvy4nrhmldxi7bqzr2br5u

Heuristic Algorithm for Efficient Data Retrieval Scheduling in the Multichannel Wireless Broadcast Environments

A. Porselvi, S.Brindha Devi
2015 International Journal of Computer Applications Technology and Research  
Wireless data broadcast is an efficient way of disseminating data to users in the mobile computing environments.  ...  It outputs the public parameters PK and a master key MK.  ...  Cross-layer jamming detection and mitigation in wireless broadcast networks.  ... 
doi:10.7753/ijcatr0405.1001 fatcat:7xpnnpep5vd7hcrmcjr4fvpnq4

D2.1 Use Cases, Technical And Business Requirements

Carlos Parada, Francisco Fontes, Isabel Borges, Omer Gurewitz, Philip Eardley, Okung Ntofon, Andy Reid, Giuseppe Bianchi, Nicola Blefari Melazzi, Pierpaolo Loreti, Claudio Pisa, Stefano Salsano (+24 others)
2018 Zenodo  
The report includes a comprehensive set of 23 use cases, covering themes such as wireless access, mobile edge computing and on-the-fly monitoring.  ...  The intended readership for this document is quite general – other researchers into future networks, IT and their convergence; business leaders who will decide what use cases should be invested in; and  ...  Public private partnership Public sector should be involved in the definition of the procedures and policies to be used for emergency communications, as well as in the financing of the additional infrastructure  ... 
doi:10.5281/zenodo.1219356 fatcat:4cayudykg5g77bahiwksv5q26y

Collective Adaptive Systems: Qualitative and Quantitative Modelling and Analysis (Dagstuhl Seminar 14512)

Jane Hillston, Jeremy Pitt, Martin Wirsing, Franco Zambonelli, Marc Herbstritt
2015 Dagstuhl Reports  
parts, where different layers interact and influence each other in intricate and sometimes unforeseen ways.  ...  (ii) Verification of collective adaptive systems. (iii) Humans-in-the-loop in collective adaptive systems.  ...  The problem can become even more interesting when the cellular infrastructure is complemented with alternative wireless access technologies such as WiFi hotspots [30] .  ... 
doi:10.4230/dagrep.4.12.68 dblp:journals/dagstuhl-reports/HillstonPWZ14 fatcat:65ubygwg6zht3pdl4mgynl2knq

A Systematic Literature Review on the Cyber Security

Dr.Yusuf Perwej, Syed Qamar Abbas, Jai Pratap Dixit, Dr. Nikhat Akhtar, Anurag Kumar Jaiswal
2021 International Journal of Scientific Research and Management  
Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data.  ...  Two decades ago, the term "cyber security" was barely recognized by the general public.  ...  online misbehaviour.  ... 
doi:10.18535/ijsrm/v9i12.ec04 fatcat:bxrsidjhpngdxgllk5cpomoyxa

A fully decentralized trust management and cooperation incentives framework for wireless user-centric networks

Carlos Ballester Lafuente, Jean-Marc Seigneur, Dimitri Konstantas
They are the main reason of my success and I will never be able to thank them enough.  ...  years doing my Ph.D. at the University of Geneva.  ...  of a portable hotspot are.  ... 
doi:10.13097/archive-ouverte/unige:72618 fatcat:647fejqupzfgxorxg5rm253tfq

HomeShaper: regulating the use of bandwidth resources in home networks

Dimosthenis Pediaditakis, Naranker Dulay, Engineering And Physical Sciences Research Council
This fact, along with the ever increasing data consumption demands, have pushed the envelope in the design of faster and better broadband Internet and wireless LAN communications.  ...  HomeShaper provides strong guarantees about the correctness of the resulting network configurations, preventing inconsistencies by means of verification.  ...  Ieee 802.11e-2005: Local and metropolitan area networks, part 11, wireless lan medium access control (mac) and physical layer (phy), specifications amendment 8, medium access control (mac) quality of service  ... 
doi:10.25560/28641 fatcat:v3u3dogukbgm3j6g77ekjzewq4

Data Analytics-backed Vehicular Crowd-sensing for GPS-less Tracking in Public Transportation [article]

Cem Kaptan, University, My, University, My
We evaluate our proposed scheme through simulations and show that the proposed framework can operate with more than 90\% accuracy in estimating the location of public buses while preserving the actual  ...  As a case study, the localization of city buses in a smart city setting is investigated by using the accelerometer and microphones of the passengers and supervised machine intelligence running in the cloud  ...  rates and anonymity of users, and (iv) secure payment in terms of confidentiality, non-repudiation of origin, robustness to traditional security attacks, and preventing over and double spending.  ... 
doi:10.20381/ruor-22219 fatcat:ty2qcvktqvcidjzy625jnz7oda

VEHICULAR 2014 Committee VEHICULAR Advisory Committee VEHICULAR 2014 Technical Program Committee

Steffen Fries, Germany Siemens, Abbas, Carl Debono, Hassan Ghasemzadeh, Johan Lukkien, Matthias Pätzold, Tapani Ristaniemi, Sriram Chellappan, Carl Debono, Hassan Ghasemzadeh, Johan Lukkien (+60 others)
2014 unpublished
We hope that VEHICULAR 2014 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the field of vehicular systems,  ...  the inaugural event considering the state-of-the-art technologies for information dissemination in vehicle-to-vehicle and vehicle-to-infrastructure and focusing on advances in vehicular systems, technologies  ...  ACKNOWLEDGMENT We thank the group of Efficient Management of Energy-GIMEL of Universidad de Antioquia, for allowing us to perform the test in the Renault LOGAN vehicle intended for academic projects.  ... 

Security Implications of Insecure DNS Usage in the Internet

Philipp Jeitner
The findings of this thesis are published in in 4 full-paper publications and 2 posters at international academic conferences.  ...  In this thesis, we perform the first comprehensive evaluation of DNS-based attacks against a wide range of internet applications, ranging from time-synchronisation via NTP over internet resource management  ...  This work has been co-funded by the German Federal Ministry of Education and Research and the Hessen State Ministry for Higher Education, Research and Arts within their joint support of the National Research  ... 
doi:10.26083/tuprints-00021523 fatcat:o4qqe6pbhncdzbharpvmjhf76i

Collective Adaptive Systems: Qualitative and Quantitative Modelling and Analysis

Jane Hillston, Jeremy Pitt, Martin Wirsing, Franco Zambonelli, Jane Hillston, Jeremy Pitt, Martin Wirsing, Franco Zambonelli, Jane Hillston, Jeremy Pitt, Martin Wirsing, Franco Zambonelli (+1 others)
Dagstuhl Reports   unpublished
parts, where different layers interact and influence each other in intricate and sometimes unforeseen ways.  ...  (ii) Verification of collective adaptive systems. (iii) Humans-in-the-loop in collective adaptive systems.  ...  The problem can become even more interesting when the cellular infrastructure is complemented with alternative wireless access technologies such as WiFi hotspots [30] .  ... 

Design and development of an access control architecture for the Internet of Things

Shantanu Pal
The high mobility of things, the potential scale of the systems in the number of things and users combined with dynamic network topology and wireless communication mediums create a challenging environment  ...  We use a hybrid approach by employing attributes, roles and capabilities for our authorization design. We apply attributes for role membership assignment and in permission evaluation.  ...  Additionally, it has been observed that 89% of the public hotspots are insecure due to the lack of a trusted network connection [160] .  ... 
doi:10.25949/19441250.v1 fatcat:tjvzjsnbrnb7tansbw4a3faeay
« Previous Showing results 1 — 15 out of 17 results