Filters








15,454 Hits in 2.5 sec

Wireless Protocol Validation Under Uncertainty [chapter]

Jinghao Shi, Shuvendu K. Lahiri, Ranveer Chandra, Geoffrey Challen
2016 Lecture Notes in Computer Science  
Runtime validation of wireless protocol implementations cannot always employ direct instrumentation of the device under test (DUT).  ...  We present a new approach enabling sniffer-based validation of wireless protocol implementations.  ...  Conclusions We formally define the uncertainty problem in validating wireless protocol implementations using sniffers.  ... 
doi:10.1007/978-3-319-46982-9_22 fatcat:xkgny5is5fggjkhbigaw3eudey

VeriFi: Model-Driven Runtime Verification Framework for Wireless Protocol Implementations [article]

Jinghao Shi, Shuvendu Lahiri, Ranveer Chandra, Geoffrey Challen
2018 arXiv   pre-print
Validating wireless protocol implementations is challenging.  ...  Finally, VERIFI accommodates uncertainty caused by the sniffer when validating traces, allowing it to provide accurate and reproducible results.  ...  method of validating sniffer traces under uncertainty (as observed in [30] ).  ... 
arXiv:1808.03406v1 fatcat:huhmn4fttbdatpdvqwzbjr7s34

Secret keys from entangled sensor motes

Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
2010 Proceedings of the third ACM conference on Wireless network security - WiSec '10  
Key management in wireless sensor networks does not only face typical, but also several new challenges.  ...  In our work, we introduce a protocol for key generation based on the frequency-selectivity of channel fading.  ...  We also show that the concept is applicable on resource-constrained devices under realistic properties of the wireless channel.  ... 
doi:10.1145/1741866.1741889 dblp:conf/wisec/WilhelmMS10 fatcat:uzrh5sftrfg27js4gi72jhr5xu

Secure Key Generation in Sensor Networks Based on Frequency-Selective Channels

Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
2013 IEEE Journal on Selected Areas in Communications  
Key management in wireless sensor networks faces several new challenges.  ...  Recently, several research contributions justified that the wireless channel itself can be used to generate information-theoretic secure keys.  ...  We also show that the concept is applicable on resource-constrained devices under realistic properties of the wireless channel.  ... 
doi:10.1109/jsac.2013.130911 fatcat:bi3plldc6fcdhnqqk653abvrf4

Substantiating Security Threats Using Group Outlier Detection Techniques

Elankayer Sithirasenan, Vallipuram Muthukkumarasamy
2008 IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference  
Having wide ranging options for security configurations, users are camouflaged into profound uncertainty.  ...  The latest security protocol, the IEEE 802.11i assures rigid security for WLANs with the support of IEEE 802.1x protocol for authentication, authorization and key distribution.  ...  Uncertainty Function Next, we define the Uncertainty function H to measure the uncertainty of a group of events.  ... 
doi:10.1109/glocom.2008.ecp.420 dblp:conf/globecom/SithirasenanM08 fatcat:f5qodrdvdvaqzkvo3qcjqyrrdi

Opportunistic Routing [chapter]

Thrasyvoulos Spyropoulos, Andreea Picu
2013 Mobile Ad Hoc Networking  
Overview of Mobile Ad Hoc Network Simulation Tools and Experimental Platforms, 192 6.3 Gap Between Simulations and Experiments: Issues and Factors, 199 Maximum Link Activation Under the SINR Model, 245  ...  , 520 14.3 Reliability-Oriented Geocasting Protocols, 525 14.4 Time-Critical Geocasting Protocols, 527 14.5 Small-Scale Routing Protocols, 529 14.6 Large-Scale Routing, 534 14.7 Summary, 539  ... 
doi:10.1002/9781118511305.ch11 fatcat:6kbobwjok5alffht6oc5plzinm

Design and Implementation of Time Synchronization Experimental System for Wireless Sensor Networks

Tang Sheng, Ke Jing, Li Zunzun, Dong Pengfei
2018 International Journal of Online Engineering (iJOE)  
The basic principle of the reference broadcast synchronization protocol using in wireless sensor networks is present,and a compact reference broadcast synchronization experimental system is designed and  ...  scheme of the time synchronization experimental system proposed in this paper may be taken as technical reference for the planning and designing of low cost, miniaturization and high accuracy nodes in wireless  ...  The baseband protocol engine constantly searches for a valid packet.  ... 
doi:10.3991/ijoe.v14i06.8356 fatcat:yeyoaacn25fadg62a5ddiljawy

Credibility Problems and Tradeoff between Realistic and Abstraction in WANET and WSN Simulation

Dong Yu, Priyadarsi Nanda, Robin Braun
2011 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing  
Validating simulation results with real implementation are still an unresolved question in wireless research in general and in particular WSN.  ...  Wireless network Simulation is challenging due to the effect of the dynamic and fading channel.  ...  This uncertainty is common for WSN but rare in wired network, even in other form of wireless network where energy recharging is not problematic.  ... 
doi:10.1109/wicom.2011.6040378 fatcat:cpfs7th4z5fdtajjy7g3tp3qha

Cross-Layered Synchronization Protocol for Wireless Sensor Networks

Thomas Beluch, Daniela Dragomirescu, Florian Perget, Robert Plana
2010 2010 Ninth International Conference on Networks  
Specific algorithms are implanted into the MAC and physical layers and form a cross-layered synchronization protocol for deterministic Wireless Sensor Networks named WiDeCS (Wireless Deterministic Clock  ...  Among the many processes necessary to validate calculated aerodynamic models, real time pressure measurements are made on the wings during test flights.  ...  Captured values have a ±0.5 clock period uncertainty.  ... 
doi:10.1109/icn.2010.36 fatcat:e5q2qs6ltbf3zhdw6hheitlram

PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks

Hui Lin, Jianfeng Ma, Jia Hu, Kai Yang
2012 EURASIP Journal on Wireless Communications and Networking  
To address these issues, we propose a Privacy-Aware Secure Hybrid Wireless Mesh Protocol (PA-SHWMP), which combines a new dynamic reputation mechanism based on subject logic and uncertainty with the multi-level  ...  Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless networks and provide a low-cost and convenient solution to the last-mile problem.  ...  All protocols are run under the identical traffic scenario.  ... 
doi:10.1186/1687-1499-2012-69 fatcat:5x2ogszpdbaddgiamvavpwkr7e

PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks

Hui Lin, Jianfeng Ma, Jia Hu, Kai Yang
2012 EURASIP Journal on Wireless Communications and Networking  
To address these issues, we propose a Privacy-Aware Secure Hybrid Wireless Mesh Protocol (PA-SHWMP), which combines a new dynamic reputation mechanism based on subject logic and uncertainty with the multi-level  ...  Wireless mesh networks (WMNs) have emerged as a key technology for next generation wireless networks and provide a low-cost and convenient solution to the last-mile problem.  ...  All protocols are run under the identical traffic scenario.  ... 
doi:10.1186/preaccept-1151503215536238 fatcat:hfnv32pvpbel3kke5eo6xuwqym

A subjective logic based dynamic trust mechanism for voice over internet protocol (VOIP) over wireless mesh networks (WMNs)
English

Lin Hui, Xu Li, Gao Jianliang, Yang Kai
2011 Scientific Research and Essays  
communication systems in WMNs, which are usually deployed under the assumption that participating nodes cooperate with each other.  ...  Voice over internet protocol (VoIP) service has been a very popular and important application over the internet.  ...  (SIP)-based voice over internet protocol (VoIP) over wireless mesh networks (WMNs).  ... 
doi:10.5897/sre11.440 fatcat:fofr5hfqyrbwrbkj56voulsasa

Communication and Consensus Co-Design for Distributed, Low-Latency and Reliable Wireless Systems [article]

Hyowoon Seo, Jihong Park, Mehdi Bennis, Wan Choi
2020 arXiv   pre-print
The problem is aggravated under wireless connectivity that may be slower and less reliable, compared to wired connections.  ...  Specifically, we propose a novel communication-efficient distributed consensus protocol, termed Random Representative Consensus (R2C), and show its effectiveness under gossip and broadcast communication  ...  Towards supporting mission-critical and real-time tasks over wireless links, the consensus protocol needs to account for wireless system characteristics and thereby optimize its operations under the consensus  ... 
arXiv:1907.08116v2 fatcat:jkow3gavtfd23iipax55pxdoum

Data Validity and Dependable Perception in Networked Sensor-Based Systems

Luis Marques, Antonio Casimiro
2010 2010 29th IEEE Symposium on Reliable Distributed Systems  
Although the technology and applications of wireless sensor networks have greatly increased over the last years, ensuring a dependable real-time operation despite faults and temporal uncertainties is still  ...  The ability to know if sensor data flowing in the system is valid -data validity awareness -, is a first step to achieve a dependable operation.  ...  First, by assuming that communication delays are stochastic variables, we will extend previous work in [14] studying the concrete observed behaviors in wireless sensor networks, under varied operating  ... 
doi:10.1109/srds.2010.52 dblp:conf/srds/MarquesC10 fatcat:z2gre2njtfendnpkkrd32n5l2u

Towards a cognitive MAC layer: Predicting the MAC-level performance in Dynamic WSN using Machine learning [article]

Merima Kulin, Eli de Poorter, Tarik Kazaz, Ingrid Moerman
2017 arXiv   pre-print
Predictable network performance is key in many low-power wireless sensor network applications.  ...  Acknowledgements The research leading to these results has received funding from the European Horizon 2020 Programmes under grant agreement n • 645274 and n • 688116, and SBO SAMURAI.  ...  Such diversity of wireless technologies, applications and services will pose several communication challenges, including co-existence, cross-technology interference, spectrum scarcity and uncertainty in  ... 
arXiv:1612.03932v2 fatcat:jhils2kyljdk5pxmb2mz5vptca
« Previous Showing results 1 — 15 out of 15,454 results