A comparison of mechanisms for improving TCP performance over wireless links
IEEE/ACM Transactions on Networking (TON)
Communications of the ACM
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Practical robust localization over large-scale 802.11 wireless networks
Proceedings of the 10th annual international conference on Mobile computing and networking
The Final Nail in WEP's Coffin
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Measurement-based models of delivery and interference in static wireless networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
MobiSteer: using steerable beam directional antenna for vehicular network access
Proceedings of the 5th international conference on Mobile systems, applications and services
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
WiLdnet: design and implementation of high performancewifi based long distance networks
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
A location-based management system for enterprise wireless LANs
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Physical Layer Attacks on Unlinkability in Wireless LANs
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
SecureAngle: improving wireless security using angle-of-arrival information
Hotnets-IX Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks
VeriPlace: a privacy-aware location proof architecture
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
Augmenting data center networks with multi-gigabit wireless links
Proceedings of the ACM SIGCOMM 2011 conference
Towards fine-grained radio-based indoor location
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications
You are facing the Mona Lisa: spot localization using PHY layer information
Proceedings of the 10th international conference on Mobile systems, applications, and services
ArrayTrack: a fine-grained indoor location system
nsdi'13 Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
Prifi beacons: piggybacking privacy implications on wifi beacons
Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication
Using a 2DST waveguide for usable, physically constrained out-of-band Wi-Fi authentication
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
ACM SIGSPATIAL GIS Cup 2013: geo-fencing
Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Hi-index | 0.00 |
We present a means of containing Wi-Fi coverage to physical boundaries that are meaningful to users. We call it geo-fencing . Our approach is based on directional antennas, and our motivation is to provide wireless access and privacy models that are a natural fit with user expectations. To evaluate geo-fencing, we use measurements from an indoor testbed of Wi-Fi nodes and APs with electronically-steerable directional antennas. We find that by combining directionality, power control and coding across multiple APs, we are able to successfully confine Wi-Fi coverage to clients located within target regions of varying shapes and sizes; we can select between nodes located as close as five feet from each other.