• Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks 

      Broustis, I.; Sundaram, G. S.; Viswanathan, H. (2012)
      Machine-to-machine (M2M) communications are increasingly popular over cellular networks, due to their unlimited potential and the low cost of deployment. As a result, M2M infrastructures are attractive targets to attackers. ...
    • FIJI: Fighting implicit jamming in 802.11 WLANs 

      Broustis, I.; Pelechrinis, K.; Syrivelis, D.; Krishnamurthy, S. V.; Tassiulas, L. (2009)
      The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take ...
    • A framework for joint network coding and transmission rate control in wireless networks 

      Kim, T. S.; Vural, S.; Broustis, I.; Syrivelis, D.; Krishnamurthy, S. V.; La Porta, T. F. (2010)
      Network coding has been proposed as a technique that can potentially increase the transport capacity of a wireless network via processing and mixing of data packets at intermediate routers. However, most previous studies ...
    • Group Authentication: A New Paradigm for Emerging Applications 

      Broustis, I.; Sundaram, G. S.; Viswanathan, H. (2012)
      Traditional secure registration protocols rely on client-server authentication procedures. This concept has been extended to support single client registration to multiple servers, using single sign-on protocols. In this ...
    • Handling asymmetry in gain in directional antenna equipped ad hoc networks 

      Jakllari, G.; Broustis, I.; Korakis, T.; Krishnamurthy, S. V.; Tassiulas, L. (2005)
      The deployment of traditional higher layer protocols (especially the IEEE 802.11 MAC protocol at the MAC layer) with directional antennae could lead to problems from an increased number of collisions; this effect is primarily ...
    • LAC: Load-aware channel selection in 802.11 WLANs 

      Athanasiou, G.; Broustis, I.; Korakis, T.; Tassiulas, L. (2008)
      Dense deployments of hybrid WLANs result in high levels of interference and low end-user throughput. Many frequency allocation mechanisms for WLANs have been proposed by a large body of previous studies. However, none of ...
    • Lightweight jammer localization in wireless networks: System design and implementation 

      Pelechrinis, K.; Koutsopoulos, I.; Broustis, I.; Krishnamurthy, S. V. (2009)
      Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is of great importance for restoring normal ...
    • A modular framework for implementing joint wireless network coding and scheduling algorithms 

      Broustis, I.; Paschos, G. S.; Syrivelis, D.; Georgiadis, L.; Tassiulas, L. (2013)
      Intersession network coding (NC) can provide significant performance benefits via mixing packets at wireless routers; these benefits are especially pronounced when NC is applied in conjunction with intelligent scheduling. ...
    • Quantifying the overhead due to routing probes in multi-rate WMNs 

      Broustis, I.; Pelechrinis, K.; Syrivelis, D.; Krishnamurthy, S. V.; Tassiulas, L. (2010)
      The selection of high-throughput routes is a key element towards improving the performance of wireless multihop networks. While several routing metrics have been proposed in the literature, it has been shown that link-quality ...
    • Realizing the Benefits of Wireless Network Coding in Multirate Settings 

      Kim, T. S.; Broustis, I.; Vural, S.; Syrivelis, D.; Singh, S.; Krishnamurthy, S. V.; La Porta, T. F. (2013)
      Network coding has been proposed as a technique that can potentially increase the transport capacity of a wireless network via mixing data packets at intermediate routers. However, most previous studies either assume a ...
    • Routing-aware channel selection in multi-radio mesh networks 

      Athanasiou, G.; Broustis, I.; Korakis, T.; Tassiulas, L. (2009)
      Efficient channel selection is essential in 802.11 mesh deployments, for minimizing contention and interference among co-channel devices and thereby supporting a plurality of QoS-sensitive applications. In this paper, we ...
    • Secure Enablement of Real Time Applications: A Novel End-to-End Approach 

      Cakulev, V.; Broustis, I.; Sundaram, G. S. (2012)
      The Internet has evolved into a multi-service Internet Protocol (IP) network with support for various types of traffic, including multimedia. Given the relatively open nature of IP networks, securely enabling multimedia ...
    • A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks 

      Broustis, I.; Pelechrinis, K.; Syrivelis, D.; Krishnamurthy, S. V.; Tassiulas, L. (2011)
      The IEEE 802.11 protocol inherently provides the same long-term throughput to all the clients associated with a given access point (AP). In this paper, we first identify a clever, low-power jamming attack that can take ...