• Publications
  • Influence
Witness-Based Detection of Forwarding Misbehaviors in Wireless Networks
tl;dr
We consider the problem of identifying a node that incorrectly forwards packets in a static wireless ad hoc network. Expand
  • 14
  • 1
  • Open Access
Performance Analysis of Decentralized RAN (Radio Access Network) Discovery Schemes for IEEE 802.21
tl;dr
We derive several decentralized RAN discovery schemes and evaluate them in terms of achieved bandwidth, the number of handovers and power consumption. Expand
  • 10
  • Open Access
Disambiguation of residential wired and wireless access in a forensic setting
tl;dr
We propose legal methods that use remotely measured traffic to disambiguate wired and wireless residential medium access of a criminal in a practical forensic setting. Expand
  • 7
  • Open Access
Measurement and modeling of user transitioning among networks
tl;dr
We perform a measurement study of user transitioning among networks from a network-level point of view, characterizing the sequence of networks to which a user is attached and discuss insights and implications drawn from these measurements. Expand
  • 6
  • Open Access
User Transitioning Among Networks-a Measurement and Modeling Study
tl;dr
We perform a measurement study of user-transitioning among networks from a networklevel point of view, characterizing the sequence of access networks to which a user is attached and from which it obtains its routable IP address. Expand
  • 2
  • Open Access
Cliff-sensor-based Low-level Obstacle Detection for a Wheeled Robot in an Indoor Environment
tl;dr
We developed cliff-sensor-based low-level obstacle detection that distinguished an obstacle by climbing over an obstacle for a wheeled robot in an indoor environment. Expand
Court Trial Based Detection of Forwarding Misbehaviors in Wireless Networks
tl;dr
This paper considers the problem of identifying the source of forwarding misbehavior in ad hoc networks. Expand
Forensic and Management Challenges in Wireless and Mobile Network Environment
tl;dr
We present a witness-based detection scheme that utilizes witness nodes located in the neighborhood of a forwarding node, as long as there is at least one uncompromised observing node and compromised nodes do not collude. Expand