77 Hits in 4.1 sec

Protecting wi-fi beacons from outsider forgeries

Mathy Vanhoef, Prasant Adhikari, Christina Pöpper
2020 Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks  
All Wi-Fi networks periodically broadcast beacons to announce their presence to nearby clients.  ...  We first show that an adversary can forge beacons to carry out various known as well as novel attacks.  ...  Additionally, we remark that the existing MFP protection of Wi-Fi also does not protect against insider forgeries.  ... 
doi:10.1145/3395351.3399442 dblp:conf/wisec/VanhoefAP20 fatcat:wyegey77djhjlhvsl4zoa3r3xy

Beacon-Based Fuzzy Indoor Tracking at Airports

Josué Toledo-Castro, Pino Caballero-Gil, Nayra Rodríguez-Pérez, Iván Santos-González, Candelaria Hernández-Goya
2018 Proceedings (MDPI)  
An application of Bluetooth beacons is here proposed to perform real-time tracking of the locations and movements of airport staff through different monitored airport infrastructure elements, such as rooms  ...  Besides, particular attention has been paid to the security of communication between mobile devices and the Web service, both regarding secure authentication of users and protection of confidentiality  ...  Some of them use beacon technology through Wi-Fi networks for indoor tracking.  ... 
doi:10.3390/proceedings2191255 fatcat:tuevybuukvho7e47fgxeuil5uq

Wireless LAN Security Threats & Vulnerabilities

Md. Waliullah, Diane Gan
2014 International Journal of Advanced Computer Science and Applications  
However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organization, IT staff and IT security professionals.  ...  Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support.  ...  The use of strong encryption standards protect WLANs from the worst threats. The best practice would be to enable Wi-Fi protected access WPA/WPA2 rather than WEP.  ... 
doi:10.14569/ijacsa.2014.050125 fatcat:x7jj7stoqng67lkk5jksoesxqe

A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks

L. Ma, A. Y. Teymorian, X. Cheng
2008 2008 Proceedings IEEE INFOCOM - The 27th Conference on Computer Communications  
We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity Wi-Fi networks.  ...  Index Terms-Rogue access point detection, commodity Wi-Fi networks, intrusion detection, wireless security.  ...  We develop a novel hybrid framework for protecting Wi-Fi networks from rogue APs.  ... 
doi:10.1109/infocom.2007.178 fatcat:xnvzknxkqbejni2p4hyjfwnixq

A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks

L. Ma, A. Y. Teymorian, X. Cheng
2008 IEEE INFOCOM 2008 - The 27th Conference on Computer Communications  
We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity Wi-Fi networks.  ...  Index Terms-Rogue access point detection, commodity Wi-Fi networks, intrusion detection, wireless security.  ...  We develop a novel hybrid framework for protecting Wi-Fi networks from rogue APs.  ... 
doi:10.1109/infocom.2008.178 dblp:conf/infocom/MaTC08 fatcat:6zqhqkdwfjcyvgmw5jspall6fa

A Study on Mobile Device Control Model for Critical Data Leakage Prevention in the Enterprise Business Service

Yong-Suk Kang, Yoondeok Kim, Yongtae Shin, Jong-Bae Kim
2015 International Journal of Security and Its Applications  
Corporations are strengthening access control and security through attaching sticker to a smart phone camera but it looks not enough as fundamental protection measures.  ...  Openness of the mobile terminal provides Wi-Fi and an external interface along with the traditional functions of the phone call.  ...  Facility and Access Security The original purpose of the facility and access security is security control to protect it from outside attack but now it is focused on protecting the trade secrets of intangible  ... 
doi:10.14257/ijsia.2015.9.10.34 fatcat:og4tvc6ybnfchbr6xbpafk3xza

Evaluation of Enhanced Security Solutions in 802.11-Based Networks [article]

Ifeyinwa Angela Ajah
2014 arXiv   pre-print
Wi-Fi Protected Access (WPA) Wi-Fi Protected Access is a WLAN data encryption method that uses TKIP to alleviate WEP key flaw by generating a new 128-bit per packet transmitted. [3] .  ...  It was examined in [4] how users from the general public understand and deal with privacy threats associated with Wi-Fi use.  ... 
arXiv:1409.2261v1 fatcat:oxoy63ou7rb5djwgd4sxzcj2wi

VCC-SSF: Service-Oriented Security Framework for Vehicular Cloud Computing

Won Kang, Jae Lee, Young-Sik Jeong, Jong Park
2015 Sustainability  
In addition, Wireless-Fidelity (Wi-Fi) is provided for drivers and pedestrians.  ...  The essential security requirements for VCC based services are Confidentiality, Integrity, Availability, and Privacy Protection, which we discuss in detail as follows:  ...  Table 4 shows the access control from outside the vehicle.  ... 
doi:10.3390/su7022028 fatcat:qgo232rilnaglpcijhaggv4izy

AnonySense: A system for anonymous opportunistic sensing

Minho Shin, Cory Cornelius, Dan Peebles, Apu Kapadia, David Kotz, Nikos Triandopoulos
2011 Pervasive and Mobile Computing  
We show the feasibility of our approach through two plausible applications: a Wi-Fi rogue access point detector and a lost-object finder.  ...  AnonySense allows applications to submit sensing tasks to be distributed across participating mobile devices, later receiving verified, yet anonymized, sensor data reports back from the field, thus providing  ...  We implemented and evaluated our system in the context of two applications, ObjectFinder and RogueFinder, and our results show that sensor data can be reliably obtained, from anonymous users, without much  ... 
doi:10.1016/j.pmcj.2010.04.001 fatcat:sc4vvwievrbmbfxz4av7uhftce

Lightweight and Secure Session-Key Establishment Scheme in Smart Home Environments

Pardeep Kumar, Andrei Gurtov, Jari Iinatti, Mika Ylianttila, Mangal Sain
2016 IEEE Sensors Journal  
It has two wireless interfaces: (i) a short-range wireless interface (e.g., 802.15.4) maintains the connection within the internal (smart) devices, and (ii) a long-range communication interface (e.g., Wi-Fi  ...  Beacon frame format [32] . Fig. 9 .  ... 
doi:10.1109/jsen.2015.2475298 fatcat:oyo27wziizcdlntarlh2zxjimu

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis

Depeng Li, Zeyar Aung, John R. Williams, Abel Sanchez
2012 2012 IEEE PES Innovative Smart Grid Technologies (ISGT)  
The proposed security scheme's performance is seriously dependent on the number of messages that the scheme processes and protects.  ...  Protective relaying data, for instance, required to be transported in real-time without loss and any latency for them with more than 4 milliseconds is not affordable.  ...  Wi-Fi alliance demonstrates higher communication capacity; nevertheless, it does not have the mesh function, yet.  ... 
doi:10.1109/isgt.2012.6175680 dblp:conf/isgt/LiAWS12 fatcat:6txizobed5dvlg2nu7dvkyrrya

Cyber Risks Prediction and Analysis in Medical Emergency Equipment for Situational Awareness

George Burke, Neetesh Saxena
2021 Sensors  
The first one detailed is Wi-Fi Protected Access (WPA) for wireless data encryption. This protocol implements much of the IEEE 802.11i standard.  ...  Wi-Fi is commonly considered less suitable for the transferal of medical data; however, Wi-Fi possesses a wider range of encryption protocols for medical device manufacturers to choose from and implement  ... 
doi:10.3390/s21165325 pmid:34450768 pmcid:PMC8398009 fatcat:zkh2aai2lngwxmwjyho7lkvire

A Security Framework for the Internet of Things in the Future Internet Architecture

Xiruo Liu, Meiyuan Zhao, Sugang Li, Feixiong Zhang, Wade Trappe
2017 Future Internet  
Our design integrates local IoT systems into the global Internet without losing usability, interoperability and security protection.  ...  Unfortunately, unlike many other wireless environments, such as cellular and Wi-Fi networks, it is difficult for IoT networks to provide confidentiality for data transmission due to the resource-constrained  ...  A Parent device, can be either within or outside this IoT network.  ... 
doi:10.3390/fi9030027 fatcat:hesc24mb6fbtheo4tfiiiphh2u

Food and drink

J P Brown
2003 British Dental Journal  
Wi-Fi will remain an important trend for added value in 2015.  ...  The need for speed in Wi-Fi connection is increasing. Free Wi-Fi is now expected in the conference and events industry and agents and bookers are looking for speedy and reliable services.  ...  One important trend in the market is that hotels are moving away from expensive, inflexible phone systems, to software-based VoIP systems.  ... 
doi:10.1038/sj.bdj.4810505 fatcat:iwdj5pzsgrgzve5chl3j42li3e


Noemie Chagnon-Lessard, Louis Gosselin, Simon Barnabe, Tunde Bello-Ochende, Sebastian Fendt, Sebastian Goers, Luiz Carlos Pereira Da Silva, Benedikt Schweiger, Richard Simmons, Annelies Vandersickel, Peng Zhang
2021 IEEE Access  
Employing a hybrid system combining Wi-Fi fingerprinting with Bluetooth beacon based trilateration improved the localization system accuracy and stability.  ...  Lim and Ahn [133] designed an architecture for a campus mobile group communication system (MGCS) by using Wi-Fi.  ...  LOUIS GOSSELIN RICHARD SIMMONS received his B.S. from Georgia Tech and M.S. and Ph.D from Purdue, all in mechanical engineering.  ... 
doi:10.1109/access.2021.3109516 fatcat:cwmcxuegnfg3xcxguwzsttzpry
« Previous Showing results 1 — 15 out of 77 results