摘要:
A network node computes a fair share data rate for the sharing of a shared communication channel in a local area network. The network node determines the required information for computing the fair share by snooping the network, by receiving the required information from other network nodes, or a combination of the two techniques. Alternatively, instead of computing the fair share data rate, the network node may receive the fair share data rate which was computed by another network node. The fair share data rate is enforced by the network node in a network protocol stack layer above the media access control layer. In one embodiment, the network protocol stack layer above the media access control layer is the link layer.
摘要:
The ability of a receiver to determine when a transmitter has changed location is important for energy conservation in wireless sensor networks, for physical security of radio tagged objects, and for wireless network security in detection of replication attacks. In embodiments of the present invention, a measured temporal link signature is determined to uniquely identify the link between a transmitter and a receiver. The temporal link signature is an impulse response of a transmitted signal from the transmitter over a channel between the transmitter and a receiver over a channel. When the transmitter changes location, or if an attacker at a different location assumes the identity of the transmitter, the proposed link distinction methodology reliably detects the change in the physical channel. This detection can be performed at a single receiver or collaboratively by multiple receivers.
摘要:
A new methodology to exchange a random secret key between two parties. The diverse physical characteristics of the wireless medium and device mobility are exploited for secure key exchange. Unique physical characteristics of wireless channels between the two devices are measured at different random locations. A function of these unique characteristics determines the shared secret key between the two devices.
摘要:
A new methodology to exchange a random secret key between two parties. The diverse physical characteristics of the wireless medium and device mobility are exploited for secure key exchange. Unique physical characteristics of wireless channels between the two devices are measured at different random locations. A function of these unique characteristics determines the shared secret key between the two devices.
摘要:
Techniques are provided for controlling overload conditions using two values; an acceptance rate fraction allowed value and an occupancy fraction allowed value. The inventive techniques allow quick response to the sudden onset of overload conditions, are robust enough to be used when processor speeds are increased and compare favorably to known techniques.
摘要:
The ability of a receiver to determine when a transmitter has changed location is important for energy conservation in wireless sensor networks, for physical security of radio tagged objects, and for wireless network security in detection of replication attacks. In embodiments of the present invention, a measured temporal link signature is determined to uniquely identify the link between a transmitter and a receiver. The temporal link signature is an impulse response of a transmitted signal from the transmitter over a channel between the transmitter and a receiver over a channel. When the transmitter changes location, or if an attacker at a different location assumes the identity of the transmitter, the proposed link distinction methodology reliably detects the change in the physical channel. This detection can be performed at a single receiver or collaboratively by multiple receivers.
摘要:
A new methodology to exchange a random secret key between two parties. The diverse physical characteristics of the wireless medium and device mobility are exploited for secure key exchange. Unique physical characteristics of wireless channels between the two devices are measured at different random locations. A function of these unique characteristics determines the shared secret key between the two devices.
摘要:
A new methodology to exchange a random secret key between two parties. The diverse physical characteristics of the wireless medium and device mobility are exploited for secure key exchange. Unique physical characteristics of wireless channels between the two devices are measured at different random locations. A function of these unique characteristics determines the shared secret key between the two devices.
摘要:
Identifying valid wireless access points based on clock skews. A computing device receives plurality of frames, each including a corresponding timestamp, from a wireless access point. The computing device calculates transmit and receive offsets based on transmit and receive times of the plurality of frames, and also calculates differences between the transmit and receive offsets. The computing device also calculates a clock skew of a clock at the wireless access point based on a slope of the differences. The client computing device determines whether the wireless access point is an authorized wireless access point or an unauthorized wireless access point based on comparing the calculated clock skew with one or more known baseline clock skews of one or more authorized wireless access points.
摘要:
A new methodology that uses clock skews of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The clock skew is determined from time synchronization function (TSF) timestamps sent out in beacon probes.