Learn More
A traditional approach for planning is to evaluate goal statements over state trajecto-ries modeling predicted behaviors of an agent. This paper describes a powerful extension of this approach for handling complex goals for reactive agents. We describe goals by using a modal temporal logic that can express quite complex time, safety, and liveness(More)
Media access control (MAC) address spoofing can result in the unauthorized use of network resources. This paper demonstrates a novel approach, which incorporates radio frequency fingerprinting (RFF) into a wireless intrusion detection system (IDS), for detecting this attack. RFF is a technique that is used to uniquely identify a transceiver based on the(More)
This paper examines threats to the security of the WiMax/ 802.16 broadband wireless access technology. Threats associated with the physical layer and MAC layer are reviewed in detail. The likelihood, impact and risk are evaluated according to a threat assessment methodology proposed by the ETSI. Threats are listed and ranked according to the level of risk(More)
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation attacks offer attractive incentives to malicious criminals and should therefore be given highest priority in research studies. We also survey our recent investigations on Radio(More)
—We define post-query strategies: these are time dependent post-query protocols that are being executed in rounds. We show how existing service discovery protocols, like Jini, Bluetooth, and SLP fit within this framework. We propose several new post-query strategies that can be used for locating a service in an ad-hoc network. These include: non-adaptive,(More)
— For the purpose of anomaly-based intrusion detection in mobile networks, the utilization of profiles based on hardware signatures, calling patterns, service usage and mobility patterns have been explored by various research teams and commercial systems, namely the Fraud Management System by Hewlett-Packard and Compaq. This paper examines the feasibility(More)
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and initiate other forms of attacks. This paper investigates a novel intrusion detection approach, which makes use of radio frequency fingerprinting (RFF) for profiling, Hotelling's T 2(More)
Supporting nodes without Global Positioning System (GPS) capability, in wireless ad hoc and sensor networks, has numerous applications in guidance and surveying systems in use today. At issue is that a procedure be available so that the subset of nodes with GPS capability succeed in supporting the maximum possible number of nodes without GPS capability and(More)