Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Security of Wireless Networks (3)
- Presentations (2)
- Anti-Collision Algorithm (1)
- Digital video (1)
- Eavesdropping (1)
-
- Infrastructure (1)
- Introduction; Radio Frequency Identification; RFID; Collision; Framed Slotted ALOHA Anit-collision Algorithms; Tag Estimation Method (1)
- Latency (1)
- Modeling (1)
- Multiple channels (1)
- New Wireless Network Architecture (1)
- Performance of Wireless Networks (1)
- RFID (1)
- Real-time (1)
- Security (1)
- Tag Estimation Method (1)
- UAS (1)
- UAV (1)
- UAV (unmanned aerial vehicle) (1)
- Wireless ad hoc networks (1)
- Wireless networks (1)
- Publication
Articles 1 - 7 of 7
Full-Text Articles in Computer Engineering
On Modeling Eavesdropping Attacks In Wireless Networks, Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak Fong Cheang, Qiu Wang
On Modeling Eavesdropping Attacks In Wireless Networks, Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak Fong Cheang, Qiu Wang
Hong-Ning Dai
This paper concerns the eavesdropping attacks from the eavesdroppers’ perspective, which is new since most of current studies consider the problem from the good nodes’ perspective. In this paper, we originally propose an analytical framework to quantify the effective area and the probability of the eavesdropping attacks. This framework enables us to theoretically evaluate the impact of node density, antenna model, and wireless channel model on the eavesdropping attacks. We verify via extensive simulations that the proposed analytical framework is very accurate. Our results show that the probability of eavesdropping attacks significantly vary, depending on the wireless environments (such as …
Introduction To Anti-Collision Algorithms And Estimation Methods In Rfid Systems, Masoud Shakiba
Introduction To Anti-Collision Algorithms And Estimation Methods In Rfid Systems, Masoud Shakiba
Masoud Shakiba
The main objective of Radio Frequency Identification (RFID) systems is to provide fast identification for tagged objects. The noteworthy advantage of RFID technology, is its capability to identify objects simultaneously. However, when radio frequency signals are emitted simultaneously, there is a probability of collision occurrence, and thereby resulting in a waste of resources. Collision is a time-consuming event that reduces the performance of RFID systems. Consequently, several anti-collision algorithms have been proposed in the literature, attempt to decrease the collision occurrence probability. In almost all the existing anti-collision algorithms, a prior knowledge of the number of tags has a significant …
Multi-Channel Wireless Networks With Infrastructure Support: Capacity And Delay, Hong-Ning Dai, Raymond Chi-Wing Wong, Qinglin Zhao
Multi-Channel Wireless Networks With Infrastructure Support: Capacity And Delay, Hong-Ning Dai, Raymond Chi-Wing Wong, Qinglin Zhao
Hong-Ning Dai
No abstract provided.
Introduction To Rfid Technology And Collision Problem, Masoud Shakiba
Introduction To Rfid Technology And Collision Problem, Masoud Shakiba
Masoud Shakiba
Radio Frequency Identification (RFID) system is a new communication technology to identify the objects using electromagnetic waves. The main superiority of RFID systems in comparison with other identification systems, such as barcodes, is its ability in simultaneous identification process, but when more than one tag wants to communicate with the reader, collision problem occurs and wastes time and increases energy consumption. This reduces efficiency of the identification process in RFID systems. Collision problem happens when the reader has to identify more than one tag at the same time. Consequently, it is essential to develop an efficient anti-collision algorithm to save …
Verification Of Video Frame Latency Telemetry For Uav Systems Using A Secondary Optical Method, Sam B. Siewert
Verification Of Video Frame Latency Telemetry For Uav Systems Using A Secondary Optical Method, Sam B. Siewert
Sam B. Siewert
This paper presents preliminary work and a prototype computer vision optical method for latency measurement for an UAS (Uninhabited Aerial System) digital video capture, encode, transport, decode, and presentation subsystem. Challenges in this type of latency measurement include a no-touch policy for the camera and encoder as well as the decoder and player because the methods developed must not interfere with the system under test. The goal is to measure the true latency of displayed frames compared to observed scenes (and targets in those scenes) and provide an indication of latency to operators that can be verified and compared to …
Eavesdropping Attacks In Wireless Ad Hoc Networks Under A Shadow Fading Environment, Xuran Li, Hong-Ning Dai, Qinglin Zhao, Qiu Wang
Eavesdropping Attacks In Wireless Ad Hoc Networks Under A Shadow Fading Environment, Xuran Li, Hong-Ning Dai, Qinglin Zhao, Qiu Wang
Hong-Ning Dai
This paper concerns the eavesdropping attacks in wireless ad hoc networks under a shadow fading environment. Most of previous studies have only concentrated on protecting the confidential communications at both the transmitters and the receivers and little attention has been paid on investigating the eavesdropping behaviors done by the malicious nodes. We therefore investigate the eavesdropping success rate of eavesdroppers equipped with various antenna models under various channels conditions, such as the path loss effect and the shadow fading effect. In particular, we formulate the eavesdropping attack problem with consideration of both simplistic directional antenna models and realistic antenna models. …
An Analytical Model On Eavesdropping Attacks In Wireless Networks, Xuran Li, Hong-Ning Dai, Qinglin Zhao
An Analytical Model On Eavesdropping Attacks In Wireless Networks, Xuran Li, Hong-Ning Dai, Qinglin Zhao
Hong-Ning Dai
This paper concerns the eavesdropping problem from the eavesdroppers’ perspective, which is new since most of previous studies only concentrate on the good nodes. We propose an analytical framework to investigate the eavesdropping attacks, taking account into various channel conditions and antenna models. Our extensive numerical results show that the probability of eavesdropping attacks heavily depends on the shadow fading effect, the path loss effect and the antenna models; particularly, they imply that using directional antennas at eavesdroppers can increase the probability of eavesdropping attacks when the path loss effect is less notable. This study is helpful for us to …