wireless network protocols
Recently Published Documents


TOTAL DOCUMENTS

15
(FIVE YEARS 2)

H-INDEX

5
(FIVE YEARS 1)

Author(s):  
M. IVANCIU ◽  
M. ALEXANDRU

The evolution of small drone technology raises new challenges regarding personal privacy due to the acquisition and flight of unlicensed small drones. Many of these small drones are controlled over Wi-Fi connection making them inexpensive and easy to control. Latest discoveries in vulnerabilities of wireless network protocols give us the advantage to use cyber-attacks as a method of defense. This paper is addressing general audience on how to create a personal shield against small drones with the advantage of being nonintrusive to the other surrounding wireless networks and, at the same time, protecting your personal privacy of a rogue drone.


Sensors ◽  
2019 ◽  
Vol 19 (1) ◽  
pp. 187 ◽  
Author(s):  
Yuichi Igarashi ◽  
Ryo Nakano ◽  
Naoki Wakamiya

The Industrial Internet of Things (IIoT) applications are required to provide precise measurement functions as feedback for controlling devices. The applications traditionally use polling-based communication protocols. However, in polling-based communication over current industrial wireless network protocols such as ISA100.11a, WirelessHART have difficulty in realizing both scheduled periodic data collection at high success ratio and unpredictable on-demand communications with short latency. In this paper, a polling-based transmission scheme using a network traffic uniformity metric is proposed for IIoT applications. In the proposed scheme, a center node controls the transmission timing of all polling-based communication in accordance with a schedule that is determined by a Genetic Algorithm. Communication of both periodic and unpredictable on-demand data collection are uniformly assigned to solve the above difficulties in the schedule. Simulation results show that network traffic is generated uniformly and a center node can collect periodic data from nodes at high success ratio. The average success probability of periodical data collection is 97.4 % and the lowest probability is 95.2 % .


2018 ◽  
Vol 27 (47) ◽  
Author(s):  
Alberto Acosta-López ◽  
Elver Yesid Melo-Monroy ◽  
Pablo Andrés Linares-Murcia

Due to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this paper introduces the WPA2 protocol by describing its operation and the potential attacks it may suffer; the second part details the methodology used to collect the tests data and to carry out the evaluation necessary for the preparation of this article. In addition, we present the Linset and Aircrack-ng tools for auditing wireless networks that were selected to assess the security of the protocol. Finally, we show the results and conclusions.


2017 ◽  
pp. 603-614
Author(s):  
Renato Mariz de Moraes ◽  
Hamid R. Sadjadpour

2014 ◽  
Vol 989-994 ◽  
pp. 4078-4081 ◽  
Author(s):  
Dong Qiu ◽  
Yan Xiang Yang

The IEEE 802.11 and IEEE 802.15.4 are two of the most popular wireless network protocols. And it is very important to look into the differences between IEEE 802.11 MAC and IEEE 802.15.4 MAC. The main goal of this paper is to look into the hidden terminal problem of the MAC layers of 802.11 and 802.15.4 based on NS2 platform. Through a dedicated experiment, the author compares the results based on the NAM animation and throughput and then explains the reasons respectively.


2014 ◽  
Vol 2014 ◽  
pp. 1-8 ◽  
Author(s):  
Jiujun Cheng ◽  
Liufei Hu ◽  
Junjun Liu ◽  
Qingyang Zhang ◽  
Chendan Yan

Wireless LAN (WLAN) technology is developing rapidly with the help of wireless communication technology and social demand. During the development of WLAN, the security is more and more important, and wireless monitoring and shielding are of prime importance for network security. In this paper, we have explored various security issues of IEEE 802.11 based wireless network and analyzed numerous problems in implementing the wireless monitoring and shielding system. We identify the challenges which monitoring and shielding system needs to be aware of, and then provide a feasible mechanism to avoid those challenges. We implemented an actual wireless LAN monitoring and shielding system on Maemo operating system to monitor wireless network data stream efficiently and solve the security problems of mobile users. More importantly, the system analyzes wireless network protocols efficiently and flexibly, reveals rich information of the IEEE 802.11 protocol such as traffic distribution and different IP connections, and graphically displays later. Moreover, the system running results show that the system has the capability to work stably, and accurately and analyze the wireless protocols efficiently.


2012 ◽  
Vol 6 (14) ◽  
pp. 2115 ◽  
Author(s):  
M.S. Obaidat ◽  
P. Nicopolitidis ◽  
S.K. Dhurandher

Sign in / Sign up

Export Citation Format

Share Document