Learn More
This paper examines threats to the security of the WiMax/ 802.16 broadband wireless access technology. Threats associated with the physical layer and MAC layer are reviewed in detail. The likelihood, impact and risk are evaluated according to a threat assessment methodology proposed by the ETSI. Threats are listed and ranked according to the level of risk(More)
A traditional approach for planning is to evaluate goal statements over state trajecto-ries modeling predicted behaviors of an agent. This paper describes a powerful extension of this approach for handling complex goals for reactive agents. We describe goals by using a modal temporal logic that can express quite complex time, safety, and liveness(More)
Media access control (MAC) address spoofing can result in the unauthorized use of network resources. This paper demonstrates a novel approach, which incorporates radio frequency fingerprinting (RFF) into a wireless intrusion detection system (IDS), for detecting this attack. RFF is a technique that is used to uniquely identify a transceiver based on the(More)
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. We also survey our recent investigations on Radio(More)
Supporting nodes without Global Positioning System (GPS) capability, in wireless ad hoc and sensor networks, has numerous applications in guidance and surveying systems in use today. At issue is that a procedure be available so that the subset of nodes with GPS capability succeed in supporting the maximum possible number of nodes without GPS capability and(More)
—We define post-query strategies: these are time dependent post-query protocols that are being executed in rounds. We show how existing service discovery protocols, like Jini, Bluetooth, and SLP fit within this framework. We propose several new post-query strategies that can be used for locating a service in an ad-hoc network. These include: non-adaptive,(More)
Increasingly ubiquitous wireless technologies require novel localiza-tion techniques to pinpoint the position of an uncooperative node, whether the target be a malicious device engaging in a security exploit or a low-battery hand-set in the middle of a critical emergency. Such scenarios necessitate that a radio signal source be localized by other network(More)
The Hierarchical Optimized Link State Routing (HOLSR) protocol enhances the scalability and heterogeneity of traditional OLSR-based Mobile Ad-Hoc Networks (MANETs). It organizes the network in logical levels and nodes in clusters. In every cluster, it implements the mechanisms and algorithms of the original OLSR to generate and to distribute control traffic(More)