Sciweavers

163 search results - page 2 / 33
» WiFi attack vectors
Sort
View
GLOBECOM
2007
IEEE
13 years 11 months ago
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
WMASH
2004
ACM
13 years 10 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
INFOCOM
2008
IEEE
13 years 11 months ago
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks
—We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity WiFi networks. It is the first scheme that combines the distributed wi...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
IWCMC
2006
ACM
13 years 11 months ago
Wireless symbolic positioning using support vector machines
This paper introduces a novel symbolic positioning system based on wireless access points and Support Vector Machines. The system works both indoors and outdoors and is cost-effec...
C. Philipp Schloter, Hamid K. Aghajan
JDFP
2006
109views more  JDFP 2006»
13 years 5 months ago
Warkitting: The Drive-by Subversion of Wireless Home Routers
In this paper we introduce the notion of warkitting as the drive-by subversion of wireless home routers through unauthorized access by mobile WiFi clients. We describe how such at...
Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wet...