Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Physical Sciences and Mathematics

Automatic Reaction To A Chemical Event Detected By A Low-Cost Wireless Chemical Sensing Network, Stephen Beirne, King Tong Lau, Brian Corcoran, Dermot Diamond Dec 2008

Automatic Reaction To A Chemical Event Detected By A Low-Cost Wireless Chemical Sensing Network, Stephen Beirne, King Tong Lau, Brian Corcoran, Dermot Diamond

Faculty of Science - Papers (Archive)

A test-scale wireless chemical sensor network (WCSN) has been deployed within a controlled Environmental Chamber (EC). The combined signals from the WCSN were used to initiate a controllable response to the detected chemical event. When a particular sensor response pattern was obtained, a purging cycle was initiated. Sensor data were continuously checked against user-defined action limits, to determine if a chemical event had occurred. An acidic contaminant was used to demonstrate the response of the sensor network. Once the acid plume was simultaneously detected by a number of wireless chemical sensor nodes, an automatic response action, which was the purging …


The Changing Usage Of A Mature Campus-Wide Wireless Network, Tristan Henderson, David Kotz, Ilya Abyzov Oct 2008

The Changing Usage Of A Mature Campus-Wide Wireless Network, Tristan Henderson, David Kotz, Ilya Abyzov

Dartmouth Scholarship

Wireless Local Area Networks (WLANs) are now commonplace on many academic and corporate campuses. As "Wi-Fi" technology becomes ubiquitous, it is increasingly important to understand trends in the usage of these networks. This paper analyzes an extensive network trace from a mature 802.11 WLAN, including more than 550 access points and 7000 users over seventeen weeks. We employ several measurement techniques, including syslog messages, telephone records, SNMP polling and tcpdump packet captures. This is the largest WLAN study to date, and the first to look at a mature WLAN. We compare this trace to a trace taken after the network's …


Autonomous And Intelligent Radio Switching For Heterogeneous Wireless Networks, Qiuyi Duan, Charles D. Knutson, Lei Wang, Daniel Zappala Sep 2008

Autonomous And Intelligent Radio Switching For Heterogeneous Wireless Networks, Qiuyi Duan, Charles D. Knutson, Lei Wang, Daniel Zappala

Faculty Publications

As wireless devices continue to become more prevalent, heterogeneous wireless networks - in which communicating devices have at their disposal multiple types of radios - will become the norm. Communication between nodes in these networks ought to be as simple as possible; they should be able to seamlessly switch between different radios and network stacks on the fly in order to better serve the user. To make this a possibility, we consider the challenging problems of when two communicating devices should decide to switch to a different radio, and which radio they should choose. We design an Autonomous and Intelligent …


Streaming Estimation Of Information-Theoretic Metrics For Anomaly Detection (Extended Abstract), Sergey Bratus, Joshua Brody, David Kotz, Anna Shubina Sep 2008

Streaming Estimation Of Information-Theoretic Metrics For Anomaly Detection (Extended Abstract), Sergey Bratus, Joshua Brody, David Kotz, Anna Shubina

Dartmouth Scholarship

Information-theoretic metrics hold great promise for modeling traffic and detecting anomalies if only they could be computed in an efficient, scalable ways. Recent advances in streaming estimation algorithms give hope that such computations can be made practical. We describe our work in progress that aims to use streaming algorithms on 802.11a/b/g link layer (and above) features and feature pairs to detect anomalies.


Workshop Report — Crawdad Workshop 2007, Jihwang Yeo, David Kotz, Tristan Henderson Jul 2008

Workshop Report — Crawdad Workshop 2007, Jihwang Yeo, David Kotz, Tristan Henderson

Dartmouth Scholarship

Wireless network researchers are hungry for data about how real users, applications, and devices use real networks under real network conditions. CRAWDAD, the Community Resource for Archiving Wireless Data at Dartmouth, is an NSF-funded project that is building a wireless network data archive for the research community. We host wireless data, and provide tools and documents to make it easy to collect and use wireless network data. We hope that this resource will help researchers to identify and evaluate real and interesting problems in mobile and pervasive computing. This report outlines the CRAWDAD project and summarizes the third CRAWDAD workshop, …


Detecting 802.11 Mac Layer Spoofing Using Received Signal Strength, Yong Sheng, Keren Tan, Guanling Chen, David Kotz, Andrew T. Campbell Apr 2008

Detecting 802.11 Mac Layer Spoofing Using Received Signal Strength, Yong Sheng, Keren Tan, Guanling Chen, David Kotz, Andrew T. Campbell

Dartmouth Scholarship

MAC addresses can be easily spoofed in 802.11 wireless LANs. An adversary can exploit this vulnerability to launch a large number of attacks. For example, an attacker may masquerade as a legitimate access point to disrupt network services or to advertise false services, tricking nearby wireless stations. On the other hand, the received signal strength (RSS) is a measurement that is hard to forge arbitrarily and it is highly correlated to the transmitter's location. Assuming the attacker and the victim are separated by a reasonable distance, RSS can be used to differentiate them to detect MAC spoofing, as recently proposed …


Refocusing In 802.11 Wireless Measurement, Udayan Deshpande, Chris Mcdonald, David Kotz Apr 2008

Refocusing In 802.11 Wireless Measurement, Udayan Deshpande, Chris Mcdonald, David Kotz

Dartmouth Scholarship

The edge of the Internet is increasingly wireless. To understand the Internet, one must understand the edge, and yet the measurement of wireless networks poses many new challenges. IEEE 802.11 networks support multiple wireless channels and any monitoring technique involves capturing traffic on each of these channels to gather a representative sample of frames from the network. We call this procedure \emphchannel sampling, in which each sniffer visits each channel periodically, resulting in a sample of the traffic on each of the channels. \par This sampling approach may be sufficient, for example, for a system administrator or anomaly detection module …


Active Behavioral Fingerprinting Of Wireless Devices, Sergey Bratus, Cory Cornelius, David Kotz, Dan Peebles Mar 2008

Active Behavioral Fingerprinting Of Wireless Devices, Sergey Bratus, Cory Cornelius, David Kotz, Dan Peebles

Dartmouth Scholarship

We propose a simple active method for discovering facts about the chipset, the firmware or the driver of an 802.11 wireless device by observing its responses (or lack thereof) to a series of crafted non-standard or malformed 802.11 frames. We demonstrate that such responses can differ significantly enough to distinguish between a number of popular chipsets and drivers. We expect to significantly expand the number of recognized device types through community contributions of signature data for the proposed open fingerprinting framework. Our method complements known fingerprinting approaches, and can be used to interrogate and spot devices that may be spoofing …


Wireless Authentication Using Remote Passwords, Andrew S. Harding Jan 2008

Wireless Authentication Using Remote Passwords, Andrew S. Harding

Theses and Dissertations

Current authentication methods for wireless networks are difficult to maintain. They often rely on globally shared secrets or heavyweight public-key infrastructure. Wireless Authentication using Remote Passwords (WARP) mitigates authentication woes by providing usable mechanisms for both administrators and end-users. Administrators grant access by simply adding users' personal messaging identifiers (e.g., email addresses, IM handles, cell phone numbers) to an access control list. There is no need to store passwords or other account information. Users simply prove ownership of their authorized identifier to obtain wireless access.


Chemical Event Tracking Using A Low-Cost Wireless Chemical Sensing Network, Stephen T. Beirne, B Corcoran, K T Lau, D Diamond Jan 2008

Chemical Event Tracking Using A Low-Cost Wireless Chemical Sensing Network, Stephen T. Beirne, B Corcoran, K T Lau, D Diamond

Faculty of Science - Papers (Archive)

A recently developed low-cost light emitting diode (LED) chemical sensing technique is integrated with a Mica2Dot wireless communications platform to form a deployable wireless chemical event indicator network. The operation of the colorimetric sensing node has been evaluated to determine its reproducibility and limit of detection for an acidic airborne contaminant. A test-scale network of five similar chemical sensing nodes is deployed in a star communication topology at fixed points within a custom built Environmental Sensing Chamber (ESC). Presented data sets collected from the deployed wireless chemical sensor network (WCSN) show that during an acidic event scenario it is possible …


An Energy-Aware Multilevel Clustering Algorithm For Wireless Sensor Networks, Xinfang Yan, Jiangtao Xi, Joe F. Chicharo, Yanguang Yu Jan 2008

An Energy-Aware Multilevel Clustering Algorithm For Wireless Sensor Networks, Xinfang Yan, Jiangtao Xi, Joe F. Chicharo, Yanguang Yu

Faculty of Informatics - Papers (Archive)

Clustering sensors nodes as the basic of routing is an efficient mechanism for prolonging the lifetime of wireless sensor networks. In this paper, the high-efficient multilevel clustering is abstracted as a root tree which has the performances of the minimal relay set and the maximal weight according to graph theory. A mathematical model for the clustering virtual backbone is built. Based on the model, an algorithm called energy-aware multilevel clustering (EAMC) is proposed. The EAMC can reduce the number of relays used for data transmission by minimizing the amount of the nodes in the root tree (that is cluster-head). Furthermore, …


Evaluation Of A Low Cost Wireless Chemical Sensor Network For Environmental Monitoring, Jer Hayes, Stephen Beirne, King-Tong Lau, Dermot Diamond Jan 2008

Evaluation Of A Low Cost Wireless Chemical Sensor Network For Environmental Monitoring, Jer Hayes, Stephen Beirne, King-Tong Lau, Dermot Diamond

Faculty of Science - Papers (Archive)

We present work on the development and testing of a low-cost wireless chemical sensor network (WCSN) for monitoring irritant/toxic gases in the environment. The WCSN used in this work takes advantage of recent advances in low power wireless communication platforms and uses colorimetric sensors to detect the presence of certain target gases. This sensor network adopts a star configuration and performs one way RF communications from individual sensor nodes to the base-station. Each node in the network is composed of a multiple sensor platform that measures light intensity, temperature and motion. The light sensor was used as the chemical sensing …