A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Wireless Protocol Validation Under Uncertainty
[chapter]
2016
Lecture Notes in Computer Science
Runtime validation of wireless protocol implementations cannot always employ direct instrumentation of the device under test (DUT). ...
We present a new approach enabling sniffer-based validation of wireless protocol implementations. ...
Conclusions We formally define the uncertainty problem in validating wireless protocol implementations using sniffers. ...
doi:10.1007/978-3-319-46982-9_22
fatcat:xkgny5is5fggjkhbigaw3eudey
VeriFi: Model-Driven Runtime Verification Framework for Wireless Protocol Implementations
[article]
2018
arXiv
pre-print
Validating wireless protocol implementations is challenging. ...
Finally, VERIFI accommodates uncertainty caused by the sniffer when validating traces, allowing it to provide accurate and reproducible results. ...
method of validating sniffer traces under uncertainty (as observed in [30] ). ...
arXiv:1808.03406v1
fatcat:huhmn4fttbdatpdvqwzbjr7s34
Secret keys from entangled sensor motes
2010
Proceedings of the third ACM conference on Wireless network security - WiSec '10
Key management in wireless sensor networks does not only face typical, but also several new challenges. ...
In our work, we introduce a protocol for key generation based on the frequency-selectivity of channel fading. ...
We also show that the concept is applicable on resource-constrained devices under realistic properties of the wireless channel. ...
doi:10.1145/1741866.1741889
dblp:conf/wisec/WilhelmMS10
fatcat:uzrh5sftrfg27js4gi72jhr5xu
Secure Key Generation in Sensor Networks Based on Frequency-Selective Channels
2013
IEEE Journal on Selected Areas in Communications
Key management in wireless sensor networks faces several new challenges. ...
Recently, several research contributions justified that the wireless channel itself can be used to generate information-theoretic secure keys. ...
We also show that the concept is applicable on resource-constrained devices under realistic properties of the wireless channel. ...
doi:10.1109/jsac.2013.130911
fatcat:bi3plldc6fcdhnqqk653abvrf4
Substantiating Security Threats Using Group Outlier Detection Techniques
2008
IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
Having wide ranging options for security configurations, users are camouflaged into profound uncertainty. ...
The latest security protocol, the IEEE 802.11i assures rigid security for WLANs with the support of IEEE 802.1x protocol for authentication, authorization and key distribution. ...
Uncertainty Function Next, we define the Uncertainty function H to measure the uncertainty of a group of events. ...
doi:10.1109/glocom.2008.ecp.420
dblp:conf/globecom/SithirasenanM08
fatcat:f5qodrdvdvaqzkvo3qcjqyrrdi
Opportunistic Routing
[chapter]
2013
Mobile Ad Hoc Networking
Overview of Mobile Ad Hoc Network Simulation Tools and Experimental Platforms, 192 6.3 Gap Between Simulations and Experiments: Issues and Factors, 199 Maximum Link Activation Under the SINR Model, 245 ...
, 520
14.3 Reliability-Oriented Geocasting Protocols, 525
14.4 Time-Critical Geocasting Protocols, 527
14.5 Small-Scale Routing Protocols, 529
14.6 Large-Scale Routing, 534
14.7 Summary, 539 ...
doi:10.1002/9781118511305.ch11
fatcat:6kbobwjok5alffht6oc5plzinm
Design and Implementation of Time Synchronization Experimental System for Wireless Sensor Networks
2018
International Journal of Online Engineering (iJOE)
The basic principle of the reference broadcast synchronization protocol using in wireless sensor networks is present,and a compact reference broadcast synchronization experimental system is designed and ...
scheme of the time synchronization experimental system proposed in this paper may be taken as technical reference for the planning and designing of low cost, miniaturization and high accuracy nodes in wireless ...
The baseband protocol engine constantly searches for a valid packet. ...
doi:10.3991/ijoe.v14i06.8356
fatcat:yeyoaacn25fadg62a5ddiljawy
Credibility Problems and Tradeoff between Realistic and Abstraction in WANET and WSN Simulation
2011
2011 7th International Conference on Wireless Communications, Networking and Mobile Computing
Validating simulation results with real implementation are still an unresolved question in wireless research in general and in particular WSN. ...
Wireless network Simulation is challenging due to the effect of the dynamic and fading channel. ...
This uncertainty is common for WSN but rare in wired network, even in other form of wireless network where energy recharging is not problematic. ...
doi:10.1109/wicom.2011.6040378
fatcat:cpfs7th4z5fdtajjy7g3tp3qha
Cross-Layered Synchronization Protocol for Wireless Sensor Networks
2010
2010 Ninth International Conference on Networks
Specific algorithms are implanted into the MAC and physical layers and form a cross-layered synchronization protocol for deterministic Wireless Sensor Networks named WiDeCS (Wireless Deterministic Clock ...
Among the many processes necessary to validate calculated aerodynamic models, real time pressure measurements are made on the wings during test flights. ...
Captured values have a ±0.5 clock period uncertainty. ...
doi:10.1109/icn.2010.36
fatcat:e5q2qs6ltbf3zhdw6hheitlram
PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks
2012
EURASIP Journal on Wireless Communications and Networking
To address these issues, we propose a Privacy-Aware Secure Hybrid Wireless Mesh Protocol (PA-SHWMP), which combines a new dynamic reputation mechanism based on subject logic and uncertainty with the multi-level ...
Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless networks and provide a low-cost and convenient solution to the last-mile problem. ...
All protocols are run under the identical traffic scenario. ...
doi:10.1186/1687-1499-2012-69
fatcat:5x2ogszpdbaddgiamvavpwkr7e
PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks
2012
EURASIP Journal on Wireless Communications and Networking
To address these issues, we propose a Privacy-Aware Secure Hybrid Wireless Mesh Protocol (PA-SHWMP), which combines a new dynamic reputation mechanism based on subject logic and uncertainty with the multi-level ...
Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless networks and provide a low-cost and convenient solution to the last-mile problem. ...
All protocols are run under the identical traffic scenario. ...
doi:10.1186/preaccept-1151503215536238
fatcat:hfnv32pvpbel3kke5eo6xuwqym
A subjective logic based dynamic trust mechanism for voice over internet protocol (VOIP) over wireless mesh networks (WMNs)
English
2011
Scientific Research and Essays
English
communication systems in WMNs, which are usually deployed under the assumption that participating nodes cooperate with each other. ...
Voice over internet protocol (VoIP) service has been a very popular and important application over the internet. ...
(SIP)-based voice over internet protocol (VoIP) over wireless mesh networks (WMNs). ...
doi:10.5897/sre11.440
fatcat:fofr5hfqyrbwrbkj56voulsasa
Communication and Consensus Co-Design for Distributed, Low-Latency and Reliable Wireless Systems
[article]
2020
arXiv
pre-print
The problem is aggravated under wireless connectivity that may be slower and less reliable, compared to wired connections. ...
Specifically, we propose a novel communication-efficient distributed consensus protocol, termed Random Representative Consensus (R2C), and show its effectiveness under gossip and broadcast communication ...
Towards supporting mission-critical and real-time tasks over wireless links, the consensus protocol needs to account for wireless system characteristics and thereby optimize its operations under the consensus ...
arXiv:1907.08116v2
fatcat:jkow3gavtfd23iipax55pxdoum
Data Validity and Dependable Perception in Networked Sensor-Based Systems
2010
2010 29th IEEE Symposium on Reliable Distributed Systems
Although the technology and applications of wireless sensor networks have greatly increased over the last years, ensuring a dependable real-time operation despite faults and temporal uncertainties is still ...
The ability to know if sensor data flowing in the system is valid -data validity awareness -, is a first step to achieve a dependable operation. ...
First, by assuming that communication delays are stochastic variables, we will extend previous work in [14] studying the concrete observed behaviors in wireless sensor networks, under varied operating ...
doi:10.1109/srds.2010.52
dblp:conf/srds/MarquesC10
fatcat:z2gre2njtfendnpkkrd32n5l2u
Towards a cognitive MAC layer: Predicting the MAC-level performance in Dynamic WSN using Machine learning
[article]
2017
arXiv
pre-print
Predictable network performance is key in many low-power wireless sensor network applications. ...
Acknowledgements The research leading to these results has received funding from the European Horizon 2020 Programmes under grant agreement n • 645274 and n • 688116, and SBO SAMURAI. ...
Such diversity of wireless technologies, applications and services will pose several communication challenges, including co-existence, cross-technology interference, spectrum scarcity and uncertainty in ...
arXiv:1612.03932v2
fatcat:jhils2kyljdk5pxmb2mz5vptca
« Previous
Showing results 1 — 15 out of 15,454 results