The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. However, these applications are predicated on the assumption of availability and confidentiality. Error-prone wireless networks afford an attacker considerable flexibility to exploit the vulnerabilities of 802.11-based mechanism. Two of most famous misbehaviors are selfish and malicious attacks. In this thesis we investigate two attacks: Spurious CTS attack (SCTS) and Jamming ACK attack (JACK). In the SCTS, malicious nodes may send periodic Spurious CTS packets to force other nodes to update their NAV values and prevent them from using the channel. In the JACK, an attacker ruins legitimate ACK packets for the intention of disrupting the t...
The Integrated Circuit (IC) design flow follows a global business model. A global business means tha...
Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, GrimstadZigBe...
Tracking of targets in remote inaccessible areas is an important application of Wireless Sensor Netw...
The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. How...
The Request-To-Send (RTS)/Clear-To-Send (CTS) mechanism is used to combat Hidden/Exposed node probl...
It is becoming more and more common place to find wireless networks present in residential homes. T...
Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives....
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medic...
Hardware security is a serious emerging concern in chip designs and applications. Due to the globali...
Energy is the main bottleneck for wireless sensor networks and it has dominating effects on network...
Wireless sensor networks (WSNs) are increasingly used due to their broad range of important applicat...
This thesis presents the outcomes of the research and development of strategies to improve 802.11 wi...
This thesis presents methods for securing a facility that has wireless connectivity. The goal of thi...
Wireless Networks is a very growing market. However, the security measures are not strong enough; t...
The Integrated Circuit (IC) design flow follows a global business model. A global business means tha...
Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, GrimstadZigBe...
Tracking of targets in remote inaccessible areas is an important application of Wireless Sensor Netw...
The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. How...
The Request-To-Send (RTS)/Clear-To-Send (CTS) mechanism is used to combat Hidden/Exposed node probl...
It is becoming more and more common place to find wireless networks present in residential homes. T...
Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives....
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
IEEE 802.11 WLANs and Bluetooth piconets both operate in the 2.4 GHz Industrial Scientific and Medic...
Hardware security is a serious emerging concern in chip designs and applications. Due to the globali...
Energy is the main bottleneck for wireless sensor networks and it has dominating effects on network...
Wireless sensor networks (WSNs) are increasingly used due to their broad range of important applicat...
This thesis presents the outcomes of the research and development of strategies to improve 802.11 wi...
This thesis presents methods for securing a facility that has wireless connectivity. The goal of thi...
Wireless Networks is a very growing market. However, the security measures are not strong enough; t...
The Integrated Circuit (IC) design flow follows a global business model. A global business means tha...
Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, GrimstadZigBe...
Tracking of targets in remote inaccessible areas is an important application of Wireless Sensor Netw...