Now showing items 1-13 of 13

  • Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks 

    Broustis, I.; Sundaram, G. S.; Viswanathan, H. (2012)
    Machine-to-machine (M2M) communications are increasingly popular over cellular networks, due to their unlimited potential and the low cost of deployment. As a result, M2M infrastructures are attractive targets to attackers. ...
  • FIJI: Fighting implicit jamming in 802.11 WLANs 

    Broustis, I.; Pelechrinis, K.; Syrivelis, D.; Krishnamurthy, S. V.; Tassiulas, L. (2009)
    The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take ...
  • A framework for joint network coding and transmission rate control in wireless networks 

    Kim, T. S.; Vural, S.; Broustis, I.; Syrivelis, D.; Krishnamurthy, S. V.; La Porta, T. F. (2010)
    Network coding has been proposed as a technique that can potentially increase the transport capacity of a wireless network via processing and mixing of data packets at intermediate routers. However, most previous studies ...
  • Group Authentication: A New Paradigm for Emerging Applications 

    Broustis, I.; Sundaram, G. S.; Viswanathan, H. (2012)
    Traditional secure registration protocols rely on client-server authentication procedures. This concept has been extended to support single client registration to multiple servers, using single sign-on protocols. In this ...
  • Handling asymmetry in gain in directional antenna equipped ad hoc networks 

    Jakllari, G.; Broustis, I.; Korakis, T.; Krishnamurthy, S. V.; Tassiulas, L. (2005)
    The deployment of traditional higher layer protocols (especially the IEEE 802.11 MAC protocol at the MAC layer) with directional antennae could lead to problems from an increased number of collisions; this effect is primarily ...
  • LAC: Load-aware channel selection in 802.11 WLANs 

    Athanasiou, G.; Broustis, I.; Korakis, T.; Tassiulas, L. (2008)
    Dense deployments of hybrid WLANs result in high levels of interference and low end-user throughput. Many frequency allocation mechanisms for WLANs have been proposed by a large body of previous studies. However, none of ...
  • Lightweight jammer localization in wireless networks: System design and implementation 

    Pelechrinis, K.; Koutsopoulos, I.; Broustis, I.; Krishnamurthy, S. V. (2009)
    Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is of great importance for restoring normal ...
  • A modular framework for implementing joint wireless network coding and scheduling algorithms 

    Broustis, I.; Paschos, G. S.; Syrivelis, D.; Georgiadis, L.; Tassiulas, L. (2013)
    Intersession network coding (NC) can provide significant performance benefits via mixing packets at wireless routers; these benefits are especially pronounced when NC is applied in conjunction with intelligent scheduling. ...
  • Quantifying the overhead due to routing probes in multi-rate WMNs 

    Broustis, I.; Pelechrinis, K.; Syrivelis, D.; Krishnamurthy, S. V.; Tassiulas, L. (2010)
    The selection of high-throughput routes is a key element towards improving the performance of wireless multihop networks. While several routing metrics have been proposed in the literature, it has been shown that link-quality ...
  • Realizing the Benefits of Wireless Network Coding in Multirate Settings 

    Kim, T. S.; Broustis, I.; Vural, S.; Syrivelis, D.; Singh, S.; Krishnamurthy, S. V.; La Porta, T. F. (2013)
    Network coding has been proposed as a technique that can potentially increase the transport capacity of a wireless network via mixing data packets at intermediate routers. However, most previous studies either assume a ...
  • Routing-aware channel selection in multi-radio mesh networks 

    Athanasiou, G.; Broustis, I.; Korakis, T.; Tassiulas, L. (2009)
    Efficient channel selection is essential in 802.11 mesh deployments, for minimizing contention and interference among co-channel devices and thereby supporting a plurality of QoS-sensitive applications. In this paper, we ...
  • Secure Enablement of Real Time Applications: A Novel End-to-End Approach 

    Cakulev, V.; Broustis, I.; Sundaram, G. S. (2012)
    The Internet has evolved into a multi-service Internet Protocol (IP) network with support for various types of traffic, including multimedia. Given the relatively open nature of IP networks, securely enabling multimedia ...
  • A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks 

    Broustis, I.; Pelechrinis, K.; Syrivelis, D.; Krishnamurthy, S. V.; Tassiulas, L. (2011)
    The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take ...