Designing a practical access point association protocol

F Xu, CC Tan, Q Li, G Yan, J Wu - 2010 Proceedings IEEE …, 2010 - ieeexplore.ieee.org
In a Wireless Local Area Network (WLAN), the Access Point (AP) selection of a client heavily
influences the performance of its own and others. Through theoretical analysis, we reveal …

Solution to the wireless evil-twin transmitter attack

P Bhatia, C Laurendeau… - 2010 Fifth International …, 2010 - ieeexplore.ieee.org
In a wireless network comprising some receivers and a truth-teller transmitter, an attacker
adds a malicious evil-twin transmitter to the network such that the evil-twin lies about its true …

[PDF][PDF] Strategy for detection and localization of evil-twin transmitters in wireless networks

P Bhatia - 2010 - repository.library.carleton.ca
The boost in the use of wireless networks in our day-to-day world is phenomenal. Users
need to have a confidence in communicating securely over the wireless medium. They want …

Synchronous communication research and implementation of Evolutionary Cryptography

Z Guoping, Z Xinyu, G Si, D Qing - … International Symposium on …, 2010 - ieeexplore.ieee.org
It has been almost ten years since Evolutionary Cryptography is brought forward. It has
yielded substantial results in cryptographic components and function design. However …