scispace - formally typeset
Open AccessJournal ArticleDOI

CRAWDAD dataset umd/sigcomm2008 (v.2009-03-02)

Reads0
Chats0
About
This article is published in CRAWDAD wireless network data archive.The article was published on 2009-03-02 and is currently open access. It has received 34 citations till now.

read more

Citations
More filters
Proceedings ArticleDOI

E-MiLi: energy-minimizing idle listening in wireless networks

TL;DR: E-MiLi employs an opportunistic downclocking mechanism to optimize the efficiency of switching clock rate, based on a simple interface to existing MAC-layer scheduling protocols, and can detect packets with close to 100 percent accuracy on the USRP software radio platform.
Proceedings ArticleDOI

Gap Sense: Lightweight coordination of heterogeneous wireless devices

TL;DR: Gap Sense (GSense) is introduced, a novel mechanism that can coordinate heterogeneous devices without modifying their PHYlayer modulation schemes or spectrum widths and is shown to deliver coordination information with close to 100% accuracy within practical SNR regions.
Proceedings ArticleDOI

An Empirical Study of Passive 802.11 Device Fingerprinting

TL;DR: This work evaluates a set of global wireless network parameters with respect to their ability to identify 802.11 devices and focuses on inter-arrival times, the most promising parameter for device identification, and shows its dependency from several device characteristics such as the wireless card and driver but also running applications.
Proceedings ArticleDOI

The Effect of the 802.11 Power Save Mechanism (PSM) on Energy Efficiency and Performance during System Activity

TL;DR: This work experimentally evaluated performance at the packet level and system-wide power usage under various offered loads, controlled by packet size and data rate, on the authors' 802.11n test bed, and found that in their scenarios, no significant benefit can be gained from using PSM.
Book ChapterDOI

WiFiHop - mitigating the Evil twin attack through multi-hop detection

TL;DR: This paper proposes WiFiHop, a client-sided tool that leverages the intrinsic multi-hop characteristics of the evil twin attack, and detects the attacks in real time (i.e. before any user traffic is transmitted).
Related Papers (5)