Filters








106 Hits in 5.6 sec

Wireless LAN access network architecture for mobile operators

J. Ala-Laurila, J. Mikkonen, J. Rinnemaa
2001 IEEE Communications Magazine  
This article describes a new wireless LAN system architecture that combines the WLAN radio access technology with mobile operators' SIM-based subscriber management functions and roaming infrastructure.  ...  In the defined system the WLAN access is authenticated and charged using GSM SIM.  ...  Fault tolerance of the authentication server is supported using standard RADIUS proxy infrastructure, depicted in Fig. 6 .  ... 
doi:10.1109/35.965363 fatcat:hocbggioivdzlp4jyjow4qgzrq

Wireless Network Security: The Mobile Agent Approach

Olatunde Abiona, Adeniran Oluwaranti, Ayodeji Oluwatope, Surura Bello, Clement Onime, Mistura Sanni, Lawrence Kehinde
2013 International Journal of Communications, Network and System Sciences  
We have proposed the use of mobile agents to provide dependable Internet services delivery to users, this will guarantee secure authentication in wireless networks and we examine the feasibility of our  ...  solution and propose a model for wireless network security.  ...  fraudulent use of the system [1] .  ... 
doi:10.4236/ijcns.2013.610046 fatcat:6nonkx5rtjgynpmhwnm3k5iyo4

Intrusion Tolerant-based Lightweight CA Model for Wireless Mesh Networks

Ping Guo, Jin Wang, JieZhong Zhu, YaPing Cheng, Jeong-Uk Kim
2013 International Journal of Multimedia and Ubiquitous Engineering  
In a Wireless Mesh Network (WMN), we cannot assume the existence of a trusted certificate authority that is used in regular Public-Key Infrastructure (PKI) .  ...  Combined threshold mechanism and lightweight Certificate Authority idea, A lightweight and tolerate CA (LTCA) model has been put forwarded.  ...  The WMN technology can be acted as "the last mile" in military communications network, wireless metropolitan area networks, wireless sensor networks, and wireless LAN network.  ... 
doi:10.14257/ijmue.2013.8.6.03 fatcat:eg7nfm76tfgldpzwam2naggf5a

A peer-to-peer approach to wireless LAN roaming

Elias C. Efstathiou, George C. Polyzos
2003 Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03  
A P2P Wireless Network Confederation (P2PWNC) is a community of administrative domains that offer wireless Internet access to each other's registered users.  ...  Existing roaming schemes utilize central authorities or bilateral contracts to control access to resources.  ...  components on several different peer nodes, ensuring system fault-tolerance and scalability.  ... 
doi:10.1145/941326.941329 dblp:conf/wmash/EfstathiouP03 fatcat:l6jetebefndsxldqwgjfwfpx7q

A peer-to-peer approach to wireless LAN roaming

Elias C. Efstathiou, George C. Polyzos
2003 Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03  
A P2P Wireless Network Confederation (P2PWNC) is a community of administrative domains that offer wireless Internet access to each other's registered users.  ...  Existing roaming schemes utilize central authorities or bilateral contracts to control access to resources.  ...  components on several different peer nodes, ensuring system fault-tolerance and scalability.  ... 
doi:10.1145/941327.941329 fatcat:zmbyhiofdjar3avor662a2sugi

Using Multi-agent Sourcing Method for Detection and Elimination of Rogue Access Points in WLAN-802. 11

Dnyanada S.Patil, P. N. Mahalle
2013 International Journal of Computer Applications  
Conclusion & future work: With the rapid use wireless LANS it is required to secure organizational network.  ...  Along with this the mobile agents have following properties which make the system fast and fault tolerant: Detection and elimination of rogue access point WLAN: The system is a multi-agent based methodology  ... 
doi:10.5120/11746-7381 fatcat:asydkbhoxvdibl7egh4lqpmcwu

Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks

Fabio Martignon, Stefano Paris, Antonio Capone
2009 Computer Networks  
A key feature in the design of MobiSEC is its independence from the underlying wireless technology used by network nodes to form the backbone.  ...  server and obtain a temporary key that is used both to prove their credentials to neighbor nodes and to encrypt all the traffic transmitted on the wireless backbone links.  ...  Other works investigate the use of threshold cryptography to achieve high fault tolerance against network partitioning.  ... 
doi:10.1016/j.comnet.2009.04.002 fatcat:xyksslpal5hdnavvkcdftqmfoi

Wireless Mesh Networks for Public Safety and Crisis Management Applications

Marius Portmann, Asad Amir Pirzada
2008 IEEE Internet Computing  
The key features of WMNs that are relevant in this context are their inherent fault tolerance, self-healing capability, and the relatively low cost of wide area deployment.  ...  The key features of WMNs such as broadband support, fault tolerance, and a high level of interoperability provide them with a great potential as a platform for PSDR communication.  ... 
doi:10.1109/mic.2008.25 fatcat:syfazpp7lfdppkjbvzamxlmnem

DSA-Mesh: a distributed security architecture for wireless mesh networks

Fabio Martignon, Stefano Paris, Antonio Capone
2011 Security and Communication Networks  
several servers) implemented using threshold cryptography, and obtain a temporary key that is used both to prove their credentials to neighbor nodes and to encrypt all the traffic transmitted on wireless  ...  A key feature in the design of DSA-Mesh is its independence from the underlying wireless technology used by network nodes to form the backbone.  ...  Other works investigate the use of threshold cryptography to achieve high fault tolerance against network partitioning.  ... 
doi:10.1002/sec.181 fatcat:mrhuji3ejnbuxobq6quzncclum

Efficient authentication for fast handover in wireless mesh networks

Celia Li, Uyen Trang Nguyen, Hoang Lan Nguyen, Nurul Huda
2013 Computers & security  
Instead, mesh access points directly authenticate mobile clients using tickets, avoiding multi-hop wireless communications in order to minimize the authentication delay.  ...  Network security Authentication Mobile devices Hand-over Hand-off Key management Privacy a b s t r a c t We propose new authentication protocols to support fast handover in IEEE 802.11-based wireless mesh  ...  This feature brings many benefits to IEEE 802.11-based mesh networks such as low installation cost, large-scale deployment, fault-tolerance, and self-management.  ... 
doi:10.1016/j.cose.2013.06.001 fatcat:t3vzvhbx6ne33h3jczefol5qsq

Security Of Mobile Agent In Ad Hoc Network Using Threshold Cryptography

S.M. Sarwarul Islam Rizvi, Zinat Sultana, Bo Sun, Md. Washiqul Islam
2010 Zenodo  
In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS.  ...  One of the main advantages of using Mobile Agent in a network is - it reduces network traffic load.  ...  It is robust and fault tolerant.  ... 
doi:10.5281/zenodo.1059882 fatcat:lkhjm2vqezcj3caeq7xcs7vpci

Wireless mesh networks: a survey

Ian F. Akyildiz, Xudong Wang, Weilin Wang
2005 Computer Networks  
Wireless mesh networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs.  ...  System architectures and applications of WMNs are described, followed by discussing the critical factors influencing protocol design.  ...  Vuran, all with Broadband and Wireless Networking Lab at Georgia Institute of Technology, for their constructive comments.  ... 
doi:10.1016/j.comnet.2004.12.001 fatcat:xsmbqrazefhonedmzn5rydw47a

Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona [chapter]

Birgitta König-Ries, Kia Makki, S.A.M. Makki, Charles E. Perkins, Niki Pissinou, Peter Reiher, Peter Scheuermann, Jari Veijalainen, Alexander Wolf, Ouri Wolfson
2002 Lecture Notes in Computer Science  
In addition to the widely used client/server paradigm, the infrastructure should provide support to the emerging peer-to-peer and agent paradigms of computing.  ...  Another way of grappling with the problem of what constitutes infrastructure for the wireless mobile environment is to think by analogy of what constitutes infrastructure for other network systems, particularly  ...  For example, there is work on different management protocols for ad hoc management (ANMP), and work on making ad hoc networks fault tolerant.  ... 
doi:10.1007/3-540-36257-6_1 fatcat:pfj5sa4ahzbv3gso3ex4ajerl4

Mobile computing and databases-a survey

D. Barbara
1999 IEEE Transactions on Knowledge and Data Engineering  
The emergence of powerful portable computers, along with advances in wireless communication technologies, has made mobile computing a reality.  ...  Fault-tolerance is achieved by Bestavros using AIDA, an elaboration on the Information Dispersal Algorithm (IDA) of Rabin [53] .  ...  As we mentioned above, even the bandwidth in the downstream direction is limited: 10 to 20 Kbits/sec. in a cellular network and up to 10 Mb/sec. in a wireless LAN. • Frequent disconnections: Mobile clients  ... 
doi:10.1109/69.755619 fatcat:rpe3sxqopfaald3lfllddzghsa

Connectivity Technologies for IoT [chapter]

Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
2019 Demystifying Internet of Things Security  
Seamless fault-tolerant communication and enhanced cybersecurity with robust network planning, configuration, and monitoring will be a necessity in the networks of the future.  ...  For example, a smart car system playing video or using GPS navigation might need 4G LTE in order to communicate with the outside world and Wi-Fi and Bluetooth to communicate with devices like phones and  ...  Even if a LAN is present, manufacturers might prefer longer-range wireless technology for its convenience and autonomy.  ... 
doi:10.1007/978-1-4842-2896-8_5 fatcat:h2qsa6ofuveqxcl2bfijrxjc3y
« Previous Showing results 1 — 15 out of 106 results