- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
We analyze a seven-week trace of the Metricom metropolitan-area packet radio wireless network to find how users take advantage of a mobile environment. Such understanding is criti...
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
—Recent years have witnessed mass proliferation of mobile devices with rich wireless communication capabilities as well as emerging mobile device based information dissemination ...
Xinfeng Li, Jin Teng, Boying Zhang, Adam C. Champi...
Location monitoring systems are used to detect human activities and provide monitoring services, e.g., aggregate queries. In this paper, we consider an aggregate location monitori...