Sciweavers

34 search results - page 2 / 7
» Countering Rogues in Wireless Networks
Sort
View
CCN
2006
278views Communications» more  CCN 2006»
13 years 6 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
GLOBECOM
2007
IEEE
13 years 11 months ago
Improved Measurement-Based Frequency Allocation Algorithms for Wireless Networks
Abstract— This paper presents three algorithms that outperform all other published work for allocating a limited number of orthogonal frequency channels to access points (APs) in...
Jeremy K. Chen, Gustavo de Veciana, Theodore S. Ra...
LCN
2008
IEEE
13 years 12 months ago
Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks
—Hyperbolic position bounding (HPB) provides a mechanism to probabilistically delimit the location of a wireless network malicious insider to a candidate area. A large scale path...
Christine Laurendeau, Michel Barbeau

Publication
145views
13 years 1 months ago
Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless
Resource-depletion attacks against IEEE 802.11 access points (APs) are commonly executed by flooding APs with fake authentication requests. Such attacks may exhaust an AP’s memor...
Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhel...