A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is application/pdf
.
Filters
Wireless LAN access network architecture for mobile operators
2001
IEEE Communications Magazine
This article describes a new wireless LAN system architecture that combines the WLAN radio access technology with mobile operators' SIM-based subscriber management functions and roaming infrastructure. ...
In the defined system the WLAN access is authenticated and charged using GSM SIM. ...
Fault tolerance of the authentication server is supported using standard RADIUS proxy infrastructure, depicted in Fig. 6 . ...
doi:10.1109/35.965363
fatcat:hocbggioivdzlp4jyjow4qgzrq
Wireless Network Security: The Mobile Agent Approach
2013
International Journal of Communications, Network and System Sciences
We have proposed the use of mobile agents to provide dependable Internet services delivery to users, this will guarantee secure authentication in wireless networks and we examine the feasibility of our ...
solution and propose a model for wireless network security. ...
fraudulent use of the system [1] . ...
doi:10.4236/ijcns.2013.610046
fatcat:6nonkx5rtjgynpmhwnm3k5iyo4
Intrusion Tolerant-based Lightweight CA Model for Wireless Mesh Networks
2013
International Journal of Multimedia and Ubiquitous Engineering
In a Wireless Mesh Network (WMN), we cannot assume the existence of a trusted certificate authority that is used in regular Public-Key Infrastructure (PKI) . ...
Combined threshold mechanism and lightweight Certificate Authority idea, A lightweight and tolerate CA (LTCA) model has been put forwarded. ...
The WMN technology can be acted as "the last mile" in military communications network, wireless metropolitan area networks, wireless sensor networks, and wireless LAN network. ...
doi:10.14257/ijmue.2013.8.6.03
fatcat:eg7nfm76tfgldpzwam2naggf5a
A peer-to-peer approach to wireless LAN roaming
2003
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03
A P2P Wireless Network Confederation (P2PWNC) is a community of administrative domains that offer wireless Internet access to each other's registered users. ...
Existing roaming schemes utilize central authorities or bilateral contracts to control access to resources. ...
components on several different peer nodes, ensuring system fault-tolerance and scalability. ...
doi:10.1145/941326.941329
dblp:conf/wmash/EfstathiouP03
fatcat:l6jetebefndsxldqwgjfwfpx7q
A peer-to-peer approach to wireless LAN roaming
2003
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots - WMASH '03
A P2P Wireless Network Confederation (P2PWNC) is a community of administrative domains that offer wireless Internet access to each other's registered users. ...
Existing roaming schemes utilize central authorities or bilateral contracts to control access to resources. ...
components on several different peer nodes, ensuring system fault-tolerance and scalability. ...
doi:10.1145/941327.941329
fatcat:zmbyhiofdjar3avor662a2sugi
Using Multi-agent Sourcing Method for Detection and Elimination of Rogue Access Points in WLAN-802. 11
2013
International Journal of Computer Applications
Conclusion & future work: With the rapid use wireless LANS it is required to secure organizational network. ...
Along with this the mobile agents have following properties which make the system fast and fault tolerant:
Detection and elimination of rogue access point WLAN: The system is a multi-agent based methodology ...
doi:10.5120/11746-7381
fatcat:asydkbhoxvdibl7egh4lqpmcwu
Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
2009
Computer Networks
A key feature in the design of MobiSEC is its independence from the underlying wireless technology used by network nodes to form the backbone. ...
server and obtain a temporary key that is used both to prove their credentials to neighbor nodes and to encrypt all the traffic transmitted on the wireless backbone links. ...
Other works investigate the use of threshold cryptography to achieve high fault tolerance against network partitioning. ...
doi:10.1016/j.comnet.2009.04.002
fatcat:xyksslpal5hdnavvkcdftqmfoi
Wireless Mesh Networks for Public Safety and Crisis Management Applications
2008
IEEE Internet Computing
The key features of WMNs that are relevant in this context are their inherent fault tolerance, self-healing capability, and the relatively low cost of wide area deployment. ...
The key features of WMNs such as broadband support, fault tolerance, and a high level of interoperability provide them with a great potential as a platform for PSDR communication. ...
doi:10.1109/mic.2008.25
fatcat:syfazpp7lfdppkjbvzamxlmnem
DSA-Mesh: a distributed security architecture for wireless mesh networks
2011
Security and Communication Networks
several servers) implemented using threshold cryptography, and obtain a temporary key that is used both to prove their credentials to neighbor nodes and to encrypt all the traffic transmitted on wireless ...
A key feature in the design of DSA-Mesh is its independence from the underlying wireless technology used by network nodes to form the backbone. ...
Other works investigate the use of threshold cryptography to achieve high fault tolerance against network partitioning. ...
doi:10.1002/sec.181
fatcat:mrhuji3ejnbuxobq6quzncclum
Efficient authentication for fast handover in wireless mesh networks
2013
Computers & security
Instead, mesh access points directly authenticate mobile clients using tickets, avoiding multi-hop wireless communications in order to minimize the authentication delay. ...
Network security Authentication Mobile devices Hand-over Hand-off Key management Privacy a b s t r a c t We propose new authentication protocols to support fast handover in IEEE 802.11-based wireless mesh ...
This feature brings many benefits to IEEE 802.11-based mesh networks such as low installation cost, large-scale deployment, fault-tolerance, and self-management. ...
doi:10.1016/j.cose.2013.06.001
fatcat:t3vzvhbx6ne33h3jczefol5qsq
Security Of Mobile Agent In Ad Hoc Network Using Threshold Cryptography
2010
Zenodo
In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. ...
One of the main advantages of using Mobile Agent in a network is - it reduces network traffic load. ...
It is robust and fault tolerant. ...
doi:10.5281/zenodo.1059882
fatcat:lkhjm2vqezcj3caeq7xcs7vpci
Wireless mesh networks: a survey
2005
Computer Networks
Wireless mesh networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. ...
System architectures and applications of WMNs are described, followed by discussing the critical factors influencing protocol design. ...
Vuran, all with Broadband and Wireless Networking Lab at Georgia Institute of Technology, for their constructive comments. ...
doi:10.1016/j.comnet.2004.12.001
fatcat:xsmbqrazefhonedmzn5rydw47a
Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona
[chapter]
2002
Lecture Notes in Computer Science
In addition to the widely used client/server paradigm, the infrastructure should provide support to the emerging peer-to-peer and agent paradigms of computing. ...
Another way of grappling with the problem of what constitutes infrastructure for the wireless mobile environment is to think by analogy of what constitutes infrastructure for other network systems, particularly ...
For example, there is work on different management protocols for ad hoc management (ANMP), and work on making ad hoc networks fault tolerant. ...
doi:10.1007/3-540-36257-6_1
fatcat:pfj5sa4ahzbv3gso3ex4ajerl4
Mobile computing and databases-a survey
1999
IEEE Transactions on Knowledge and Data Engineering
The emergence of powerful portable computers, along with advances in wireless communication technologies, has made mobile computing a reality. ...
Fault-tolerance is achieved by Bestavros using AIDA, an elaboration on the Information Dispersal Algorithm (IDA) of Rabin [53] . ...
As we mentioned above, even the bandwidth in the downstream direction is limited: 10 to 20 Kbits/sec. in a cellular network and up to 10 Mb/sec. in a wireless LAN. • Frequent disconnections: Mobile clients ...
doi:10.1109/69.755619
fatcat:rpe3sxqopfaald3lfllddzghsa
Connectivity Technologies for IoT
[chapter]
2019
Demystifying Internet of Things Security
Seamless fault-tolerant communication and enhanced cybersecurity with robust network planning, configuration, and monitoring will be a necessity in the networks of the future. ...
For example, a smart car system playing video or using GPS navigation might need 4G LTE in order to communicate with the outside world and Wi-Fi and Bluetooth to communicate with devices like phones and ...
Even if a LAN is present, manufacturers might prefer longer-range wireless technology for its convenience and autonomy. ...
doi:10.1007/978-1-4842-2896-8_5
fatcat:h2qsa6ofuveqxcl2bfijrxjc3y
« Previous
Showing results 1 — 15 out of 106 results