Sciweavers

119 search results - page 1 / 24
» Secure Localization with Hidden and Mobile Base Stations
Sort
View
INFOCOM
2006
IEEE
13 years 10 months ago
Secure Localization with Hidden and Mobile Base Stations
— Until recently, the problem of localization in wireless networks has been mainly studied in a non-adversarial setting. Only recently, a number of solutions have been proposed t...
Srdjan Capkun, Mario Cagalj, Mani B. Srivastava
TMC
2008
83views more  TMC 2008»
13 years 4 months ago
Secure Location Verification with Hidden and Mobile Base Stations
In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach ...
Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagal...
IJNSEC
2006
134views more  IJNSEC 2006»
13 years 4 months ago
Physical Security Perimeters for Wireless Local Area Networks
On a wired network, physical authentication is implicitly provided by access: if a user is able to plug a cable into a network socket, he must have cleared other security checks s...
Vishal Bhargava, Mihail L. Sichitiu
INFOCOM
2008
IEEE
13 years 10 months ago
Cell Selection in 4G Cellular Networks
—Cell selection is the process of determining the cell(s) that provide service to each mobile station. Optimizing these processes is an important step towards maximizing the util...
David Amzallag, Reuven Bar-Yehuda, Danny Raz, Gabr...
ICMB
2005
IEEE
76views Business» more  ICMB 2005»
13 years 10 months ago
ZoneIT: Using Short-Range Radios to Control Mobile Device Functionality
This paper describes a prototype system, ZoneIT, for selectively controlling functionality of mobile devices, e.g. ringing of cellular telephones. ZoneIT exploits the fact that ma...
Tim Moors, Marvyn Mei, Agus Salim