The Request-To-Send (RTS)/Clear-To-Send (CTS) mechanism is used to combat Hidden/Exposed node problems in Mobile Ad Hoc Networks (MANETs). The popular implementation of the RTS/CTS mechanism may lead to virtual blocking of the wireless medium. Problem arises if a malicious node randomly sends out a large number of spurious CTS frames in order to falsely block regular nodes in its neighborhood. Such an attack is termed as spurious CTS attack. In this thesis, we investigate the effects of such spurious CTS attacks and propose a solution to mitigate the problem. Our proposed solution, Carrier Sensing based Deferral (CSD) mechanism, asks nodes to perform carrier sensing in their deferral state. Therefore, when deferring nodes do not se...
2018 IEEE Region 2 Student Activities Conference, 1st place paper competition2018 Denman Undergradua...
The theft of Radio Frequency Identification (RFID) tag identity, commonly referred to as tag cloning...
Energy is the main bottleneck for wireless sensor networks and it has dominating effects on network...
The Request-To-Send (RTS)/Clear-To-Send (CTS) mechanism is used to combat Hidden/Exposed node probl...
The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. How...
Spectrum shortage is a major problem in wireless communications. Existing research on attacks and se...
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
It is becoming more and more common place to find wireless networks present in residential homes. T...
Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives....
Hardware security is a serious emerging concern in chip designs and applications. Due to the globali...
Distributed Denial of Service (DDoS) attacks are very common type of computer attack in the world ...
Tracking of targets in remote inaccessible areas is an important application of Wireless Sensor Netw...
Wireless sensor networks (WSNs) are increasingly used due to their broad range of important applicat...
Applications using dedicated short-range communication (DSRC) are being developed to prevent automob...
The objective of this research is to investigate and develop an efficient and seamless data transpor...
2018 IEEE Region 2 Student Activities Conference, 1st place paper competition2018 Denman Undergradua...
The theft of Radio Frequency Identification (RFID) tag identity, commonly referred to as tag cloning...
Energy is the main bottleneck for wireless sensor networks and it has dominating effects on network...
The Request-To-Send (RTS)/Clear-To-Send (CTS) mechanism is used to combat Hidden/Exposed node probl...
The convenience of IEEE 802.11-based wireless access networks has led to widespread deployment. How...
Spectrum shortage is a major problem in wireless communications. Existing research on attacks and se...
As the first step to defend against DoS attacks, Network-based Intrusion Detection System is well ex...
It is becoming more and more common place to find wireless networks present in residential homes. T...
Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives....
Hardware security is a serious emerging concern in chip designs and applications. Due to the globali...
Distributed Denial of Service (DDoS) attacks are very common type of computer attack in the world ...
Tracking of targets in remote inaccessible areas is an important application of Wireless Sensor Netw...
Wireless sensor networks (WSNs) are increasingly used due to their broad range of important applicat...
Applications using dedicated short-range communication (DSRC) are being developed to prevent automob...
The objective of this research is to investigate and develop an efficient and seamless data transpor...
2018 IEEE Region 2 Student Activities Conference, 1st place paper competition2018 Denman Undergradua...
The theft of Radio Frequency Identification (RFID) tag identity, commonly referred to as tag cloning...
Energy is the main bottleneck for wireless sensor networks and it has dominating effects on network...