Shantanu Kangude

Learn More
As the cost of 802.11 hardware continues to fall, the appeal of inserting unauthorized wireless access into enterprise networks grows. These rogue access points (APs) expose the enterprise network to a barrage of security vulnerabilities in that they are typically connected to a network port behind the firewall. Most of the current approaches to detecting(More)
In this paper, we present an analysis of the collision resolution mechanism in the Home Phone-line Networking Alliance (Home PNA) 2.0 MAC protocol. We begin with a brief description of the collision resolution (CR) mechanism, bringing out the differences with respect to other CR mechanisms. We show that the mechanism can be modeled as a recursive one, with(More)
  • 1