8 Hits in 9.3 sec

WiFi can be the weakest link of round trip network latency in the wild

Changhua Pei, Youjian Zhao, Guo Chen, Ruming Tang, Yuan Meng, Minghua Ma, Ken Ling, Dan Pei
2016 IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications  
We observe that WiFi hop can be the weakest link in the round trip network latency: more than 50% (10%) of TCP packets suffer from WiFi hop latency larger than 20ms (100ms), and WiFi hop latency occupies  ...  more than 60% in more than half of the round trip network latency.  ...  We sincerely thank Kaixin Sui and Dapeng Liu for providing drawing template of decision tree. We thank Yaodong Zhang for helping check technical details in this paper.  ... 
doi:10.1109/infocom.2016.7524396 dblp:conf/infocom/PeiZCTMMLP16 fatcat:uy3toh6nxrdjrcmwnxmisxhk6m

The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection [chapter]

Adrian Dabrowski, Georg Petzl, Edgar R. Weippl
2016 Lecture Notes in Computer Science  
Our proposed solution can be readily added to existing network monitoring infrastructures and includes among other things plausibility checks of location update trails, monitoring of device-specific round  ...  The scope of this paper is the detection of attacks on the radio access network (RAN) in G (GE/RAN), G (UTRAN), and LTE networks (E-UTRAN).  ...  Acknowledgments We want to thank the whole crew of the core network security team and radio access network team at T-Mobile. They have been a great help.  ... 
doi:10.1007/978-3-319-45719-2_13 fatcat:tazpfo7cvfhplmsgjujwedbpli

Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systems [chapter]

André Sieber, Karsten Walther, Stefan Nürnberger, Jörg Nolte
2009 Lecture Notes in Computer Science  
Further energy savings for given platforms can only be achieved by downsizing the packet, e.g. by means of in-network processing or data compression.  ...  A common node in a WSN is usually equipped with a microcontroller and a radio transceiver. A challenge in large networks is to keep the firmware of the nodes up to date.  ...  This add-on allows a user to analyze the link quality between several meshed Wifi nodes. This can be used to build up a stable working backbone network.  ... 
doi:10.1007/978-3-642-02118-3_2 fatcat:prjsfyqcojcnpcetw7vfnvqwpy

Proceedings of the Seminar Innovative Internet Technologies and Mobile Communications (IITM), Summer Semester 2020

Georg Carle, Stephan Günther, Benedikt Jaeger, Chair Of Network Architectures
For this semester the arwards where given to Bernhard Vorhofer with the paper Extending ZMap: Round-Trip Time Measurement via ICMP and TCP and Simon Bachmeier with the paper Network Simulation with OMNet  ...  In the context of the seminar, each student individually works on a relevant topic in the domain of computer networks supervised by one or more advisors.  ...  In our research, we found two viable methods of measuring round-trip time using TCP.  ... 
doi:10.2313/net-2020-11-1 fatcat:7og3fpqf5zfpfldmtsp57bbcg4

Security And Privacy For Ubiquitous Mobile Devices

Edmund Novak
Our third approach specifically, presents a unique attack, which has not been seen"in the wild", in an effort to keep ahead of malicious efforts.  ...  It is estimated that in the United States approximately two thirds of adults own a smartphone, and that for many, these devices are their primary method of accessing the Internet [99] .  ...  As the message length grows larger, the round trip time and packet receiving time increases.  ... 
doi:10.21220/s2ks3d fatcat:can6ukokd5cx5j4hr55mek6mn4

Measuring and Implementing Internet Backbone Security [article]

Matthias Wählisch, Universitätsbibliothek Der FU Berlin, Universitätsbibliothek Der FU Berlin
In this thesis, we start from the observation that the Internet is a critical infrastructure, which needs severe protection.  ...  We contribute tools, methodologies, and measurement results to improve the current state of art as well as operational practice.  ...  Acknowledgments Successful research is linked to passion that is shared with the community. It is not based on working in the ivory tower but on open-minded discussions with friends and colleagues who  ... 
doi:10.17169/refubium-15515 fatcat:xnnrr5rmrffbvmugq7qapdrsqe

Human Activity Recognition in Smart Environments (Dagstuhl Seminar 12492) Organizational Processes for Supporting Sustainable Security (Dagstuhl Seminar 12501) Securing Critical Infrastructures from Targeted Attacks (Dagstuhl Seminar 12502) Divide and Conquer: the Quest for Compositional Design and Analysis (Dagstuhl Seminar 12511) Representation, Analysis and Visualization of Moving Objects (Dagstuhl Seminar 12512)

Susanne Biundo-Stephan, Hans Guesgen, Joachim Hertzberg, Stephen, James Crowley, Kai Kunze, Paul Lukowicz, Albrecht Schmidt, Lizzie Coles-Kemp, Carrie Gates, Dieter Gollmann, Sean Peisert (+11 others)
2012 unpublished
All three panels are linked and the geographical display as well as the time-line can be used for zooming, panning or selecting a subset of the data.  ...  Personal introductions We started out by a three rounds of personal introductions of the participants.  ...  Methods can be separated depending on the nature of the results (entities or fields?), interrelations can be found to clustering.  ... 

Soutenue le par Anouk MUKHERJEE F-X de Vaujany

Université Paris-Dauphine, François-Xavier De Vaujany, Mme Godé, M Clegg
2017 unpublished
More indirect relationships can be gleaned from the transcripts linking the body with ICT.  ...  Widely available Internet connectivity -either through WiFi or 3G -mean that any portable wireless device is in theory mobile and can be used anywhere and at any time.  ...  The results clearly demonstrate the inadequacy of affordance theory for the study of ICT in general.  ...