2,100 research outputs found
Denial of service attacks and challenges in broadband wireless networks
Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and
Wireless Mesh Network (WMN). Security attacks and
vulnerabilities vary amongst these broadband wireless networks because of differences in topologies, network operations and physical setups. Amongst the various security risks, Denial of Service (DoS) attack is the most severe security threat, as DoS can compromise the availability and integrity of broadband
wireless network. In this paper, we present DoS attack issues in broadband wireless networks, along with possible defenses and future directions
Implementing and Evaluating a Wireless Body Sensor System for Automated Physiological Data Acquisition at Home
Advances in embedded devices and wireless sensor networks have resulted in
new and inexpensive health care solutions. This paper describes the
implementation and the evaluation of a wireless body sensor system that
monitors human physiological data at home. Specifically, a waist-mounted
triaxial accelerometer unit is used to record human movements. Sampled data are
transmitted using an IEEE 802.15.4 wireless transceiver to a data logger unit.
The wearable sensor unit is light, small, and consumes low energy, which allows
for inexpensive and unobtrusive monitoring during normal daily activities at
home. The acceleration measurement tests show that it is possible to classify
different human motion through the acceleration reading. The 802.15.4 wireless
signal quality is also tested in typical home scenarios. Measurement results
show that even with interference from nearby IEEE 802.11 signals and microwave
ovens, the data delivery performance is satisfactory and can be improved by
selecting an appropriate channel. Moreover, we found that the wireless signal
can be attenuated by housing materials, home appliances, and even plants.
Therefore, the deployment of wireless body sensor systems at home needs to take
all these factors into consideration.Comment: 15 page
Throughput optimization strategies for large-scale wireless LANs
Thanks to the active development of IEEE 802.11, the performance of wireless local area networks (WLANs) is improving by every new edition of the standard facilitating large enterprises to rely on Wi-Fi for more demanding applications. The limited number of channels in the unlicensed industrial scientific medical frequency band however is one of the key bottlenecks of Wi-Fi when scalability and robustness are points of concern. In this paper we propose two strategies for the optimization of throughput in wireless LANs: a heuristic derived from a theoretical model and a surrogate model based decision engine
Why It Takes So Long to Connect to a WiFi Access Point
Today's WiFi networks deliver a large fraction of traffic. However, the
performance and quality of WiFi networks are still far from satisfactory. Among
many popular quality metrics (throughput, latency), the probability of
successfully connecting to WiFi APs and the time cost of the WiFi connection
set-up process are the two of the most critical metrics that affect WiFi users'
experience. To understand the WiFi connection set-up process in real-world
settings, we carry out measurement studies on million mobile users from
representative cities associating with million APs in billion WiFi
sessions, collected from a mobile "WiFi Manager" App that tops the Android/iOS
App market. To the best of our knowledge, we are the first to do such large
scale study on: how large the WiFi connection set-up time cost is, what factors
affect the WiFi connection set-up process, and what can be done to reduce the
WiFi connection set-up time cost. Based on the measurement analysis, we develop
a machine learning based AP selection strategy that can significantly improve
WiFi connection set-up performance, against the conventional strategy purely
based on signal strength, by reducing the connection set-up failures from
to and reducing time costs of the connection set-up
processes by more than times.Comment: 11pages, conferenc
Survey of Spectrum Sharing for Inter-Technology Coexistence
Increasing capacity demands in emerging wireless technologies are expected to
be met by network densification and spectrum bands open to multiple
technologies. These will, in turn, increase the level of interference and also
result in more complex inter-technology interactions, which will need to be
managed through spectrum sharing mechanisms. Consequently, novel spectrum
sharing mechanisms should be designed to allow spectrum access for multiple
technologies, while efficiently utilizing the spectrum resources overall.
Importantly, it is not trivial to design such efficient mechanisms, not only
due to technical aspects, but also due to regulatory and business model
constraints. In this survey we address spectrum sharing mechanisms for wireless
inter-technology coexistence by means of a technology circle that incorporates
in a unified, system-level view the technical and non-technical aspects. We
thus systematically explore the spectrum sharing design space consisting of
parameters at different layers. Using this framework, we present a literature
review on inter-technology coexistence with a focus on wireless technologies
with equal spectrum access rights, i.e. (i) primary/primary, (ii)
secondary/secondary, and (iii) technologies operating in a spectrum commons.
Moreover, we reflect on our literature review to identify possible spectrum
sharing design solutions and performance evaluation approaches useful for
future coexistence cases. Finally, we discuss spectrum sharing design
challenges and suggest future research directions
EVEREST IST - 2002 - 00185 : D23 : final report
Deliverable pĂşblic del projecte europeu EVERESTThis deliverable constitutes the final report of the project IST-2002-001858 EVEREST. After its successful completion, the project presents this document that firstly summarizes the context, goal and the approach objective of the project. Then it presents a concise summary of the major goals and results, as well as highlights the most valuable lessons derived form the project work. A list of deliverables and publications is included in the annex.Postprint (published version
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
- …