1,720 research outputs found

    OFDM over IEEE 802.11b hardware for telemedical applications

    Get PDF
    Using a wireless Local Area Network (WLAN) to transmit live high-quality video suitable for a telemedical application presents many challenges, including ensuring sufficient Quality of Service (QoS) for the end-user to be able to make an accurate diagnosis. One of the many problems that exist when developing such a system is the multipath effect caused by the reflections of the transmitted signals on various surfaces including walls, floors, furniture and people. This degrades the signal quality and reduces the amount of available bandwidth and, thus, the quality of the image. Presently, most of Europe is using the IEEE 802.11b hardware for such applications. As an alternative to the existing modulation of 802.11b, Orthogonal Frequency Division Multiplexing (OFDM) is investigated, especially for use inside hospitals. The advantages of using this modulation over IEEE 802.11b hardware for a telemedicine application are examined by means of simulation using three different simulation packages

    Picking pockets on the lawn: the development of tactics and strategies in a mobile game

    Get PDF
    This paper presents Treasure, an outdoor mobile multiplayer game inspired by Weiser’s notion of seams, gaps and breaks in different media. Playing Treasure involves movement in and out of a wi-fi network, using PDAs to pick up virtual ’coins’ that may be scattered outside network coverage. Coins have to be uploaded to a server to gain game points, and players can collaborate with teammates to double the points given for an upload. Players can also steal coins from opponents. As they move around, players’ PDAs sample network signal strength and update coverage maps. Reporting on a study of players taking part in multiple games, we discuss how their tactics and strategies developed as their experience grew with successive games. We suggest that meaningful play arises in just this way, and that repeated play is vital when evaluating such games

    A Resilient MAC Protocol for Wireless Networks

    Get PDF
    Paper presented at the IMA Conference on Game Theory and its Applications, Oxford, 8/12/2014Peer reviewe

    WIRELESS SECURITY: AN OVERVIEW

    Get PDF
    The physical transport methods used in wireless communication differ from wired communication. These differences affect how a secure channel can be established in a wireless environment. The purpose of this tutorial is to provide an overview of how a secure channel is set up in a wireless environment that uses the 802.11 or WAP standards

    Developing a Systematic Process for Mobile Surveying and Analysis of WLAN security

    Get PDF
    Wireless Local Area Network (WLAN), familiarly known as Wi-Fi, is one of the most used wireless networking technologies. WLANs have rapidly grown in popularity since the release of the original IEEE 802.11 WLAN standard in 1997. We are using our beloved wireless internet connection for everything and are connecting more and more devices into our wireless networks in every form imaginable. As the number of wireless network devices keeps increasing, so does the importance of wireless network security. During its now over twenty-year life cycle, a multitude of various security measures and protocols have been introduced into WLAN connections to keep our wireless communication secure. The most notable security measures presented in the 802.11 standard have been the encryption protocols Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). Both encryption protocols have had their share of flaws and vulnerabilities, some of them so severe that the use of WEP and the first generation of the WPA protocol have been deemed irredeemably broken and unfit to be used for WLAN encryption. Even though the aforementioned encryption protocols have been long since deemed fatally broken and insecure, research shows that both can still be found in use today. The purpose of this Master’s Thesis is to develop a process for surveying wireless local area networks and to survey the current state of WLAN security in Finland. The goal has been to develop a WLAN surveying process that would at the same time be efficient, scalable, and easily replicable. The purpose of the survey is to determine to what extent are the deprecated encryption protocols used in Finland. Furthermore, we want to find out in what state is WLAN security currently in Finland by observing the use of other WLAN security practices. The survey process presented in this work is based on a WLAN scanning method called Wardriving. Despite its intimidating name, wardriving is simply a form of passive wireless network scanning. Passive wireless network scanning is used for collecting information about the surrounding wireless networks by listening to the messages broadcasted by wireless network devices. To collect our research data, we conducted wardriving surveys on three separate occasions between the spring of 2019 and early spring of 2020, in a typical medium-sized Finnish city. Our survey results show that 2.2% out of the located networks used insecure encryption protocols and 9.2% of the located networks did not use any encryption protocol. While the percentage of insecure networks is moderately low, we observed during our study that private consumers are reluctant to change the factory-set default settings of their wireless network devices, possibly exposing them to other security threats

    A Survey on Handover Management in Mobility Architectures

    Full text link
    This work presents a comprehensive and structured taxonomy of available techniques for managing the handover process in mobility architectures. Representative works from the existing literature have been divided into appropriate categories, based on their ability to support horizontal handovers, vertical handovers and multihoming. We describe approaches designed to work on the current Internet (i.e. IPv4-based networks), as well as those that have been devised for the "future" Internet (e.g. IPv6-based networks and extensions). Quantitative measures and qualitative indicators are also presented and used to evaluate and compare the examined approaches. This critical review provides some valuable guidelines and suggestions for designing and developing mobility architectures, including some practical expedients (e.g. those required in the current Internet environment), aimed to cope with the presence of NAT/firewalls and to provide support to legacy systems and several communication protocols working at the application layer
    • …
    corecore