Πλοήγηση ανά Συγγραφέα "Broustis, I."
-
Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks
Broustis, I.; Sundaram, G. S.; Viswanathan, H. (2012)Machine-to-machine (M2M) communications are increasingly popular over cellular networks, due to their unlimited potential and the low cost of deployment. As a result, M2M infrastructures are attractive targets to attackers. ... -
FIJI: Fighting implicit jamming in 802.11 WLANs
Broustis, I.; Pelechrinis, K.; Syrivelis, D.; Krishnamurthy, S. V.; Tassiulas, L. (2009)The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take ... -
A framework for joint network coding and transmission rate control in wireless networks
Kim, T. S.; Vural, S.; Broustis, I.; Syrivelis, D.; Krishnamurthy, S. V.; La Porta, T. F. (2010)Network coding has been proposed as a technique that can potentially increase the transport capacity of a wireless network via processing and mixing of data packets at intermediate routers. However, most previous studies ... -
Group Authentication: A New Paradigm for Emerging Applications
Broustis, I.; Sundaram, G. S.; Viswanathan, H. (2012)Traditional secure registration protocols rely on client-server authentication procedures. This concept has been extended to support single client registration to multiple servers, using single sign-on protocols. In this ... -
Handling asymmetry in gain in directional antenna equipped ad hoc networks
Jakllari, G.; Broustis, I.; Korakis, T.; Krishnamurthy, S. V.; Tassiulas, L. (2005)The deployment of traditional higher layer protocols (especially the IEEE 802.11 MAC protocol at the MAC layer) with directional antennae could lead to problems from an increased number of collisions; this effect is primarily ... -
LAC: Load-aware channel selection in 802.11 WLANs
Athanasiou, G.; Broustis, I.; Korakis, T.; Tassiulas, L. (2008)Dense deployments of hybrid WLANs result in high levels of interference and low end-user throughput. Many frequency allocation mechanisms for WLANs have been proposed by a large body of previous studies. However, none of ... -
Lightweight jammer localization in wireless networks: System design and implementation
Pelechrinis, K.; Koutsopoulos, I.; Broustis, I.; Krishnamurthy, S. V. (2009)Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is of great importance for restoring normal ... -
A modular framework for implementing joint wireless network coding and scheduling algorithms
Broustis, I.; Paschos, G. S.; Syrivelis, D.; Georgiadis, L.; Tassiulas, L. (2013)Intersession network coding (NC) can provide significant performance benefits via mixing packets at wireless routers; these benefits are especially pronounced when NC is applied in conjunction with intelligent scheduling. ... -
Quantifying the overhead due to routing probes in multi-rate WMNs
Broustis, I.; Pelechrinis, K.; Syrivelis, D.; Krishnamurthy, S. V.; Tassiulas, L. (2010)The selection of high-throughput routes is a key element towards improving the performance of wireless multihop networks. While several routing metrics have been proposed in the literature, it has been shown that link-quality ... -
Realizing the Benefits of Wireless Network Coding in Multirate Settings
Kim, T. S.; Broustis, I.; Vural, S.; Syrivelis, D.; Singh, S.; Krishnamurthy, S. V.; La Porta, T. F. (2013)Network coding has been proposed as a technique that can potentially increase the transport capacity of a wireless network via mixing data packets at intermediate routers. However, most previous studies either assume a ... -
Routing-aware channel selection in multi-radio mesh networks
Athanasiou, G.; Broustis, I.; Korakis, T.; Tassiulas, L. (2009)Efficient channel selection is essential in 802.11 mesh deployments, for minimizing contention and interference among co-channel devices and thereby supporting a plurality of QoS-sensitive applications. In this paper, we ... -
Secure Enablement of Real Time Applications: A Novel End-to-End Approach
Cakulev, V.; Broustis, I.; Sundaram, G. S. (2012)The Internet has evolved into a multi-service Internet Protocol (IP) network with support for various types of traffic, including multimedia. Given the relatively open nature of IP networks, securely enabling multimedia ... -
A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks
Broustis, I.; Pelechrinis, K.; Syrivelis, D.; Krishnamurthy, S. V.; Tassiulas, L. (2011)The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take ...