Measurement and analysis of the error characteristics of an in-building wireless network
Conference proceedings on Applications, technologies, architectures, and protocols for computer communications
Wireless Andrew: experience building a high speed, campus-wide wireless data network
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
Analysis of a local-area wireless network
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Characterizing user behavior and network performance in a public wireless LAN
SIGMETRICS '02 Proceedings of the 2002 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Analysis of a campus-wide wireless network
Proceedings of the 8th annual international conference on Mobile computing and networking
Estimating Available Capacity of a Network Connection
ICON '00 Proceedings of the 8th IEEE International Conference on Networks
Intrusion detection techniques for mobile wireless networks
Wireless Networks
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
An accurate technique for measuring the wireless side of wireless networks
WiTMeMo '05 Papers presented at the 2005 workshop on Wireless traffic measurements and modeling
Measurement-based characterization of 802.11 in a hotspot setting
Proceedings of the 2005 ACM SIGCOMM workshop on Experimental approaches to wireless network design and analysis
Understanding link-layer behavior in highly congested IEEE 802.11b wireless networks
Proceedings of the 2005 ACM SIGCOMM workshop on Experimental approaches to wireless network design and analysis
MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs
Proceedings of the 4th international conference on Mobile systems, applications and services
Jigsaw: solving the puzzle of enterprise 802.11 analysis
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Analyzing the MAC-level behavior of wireless networks in the wild
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Understanding congestion in IEEE 802.11b wireless networks
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Automating cross-layer diagnosis of enterprise wireless networks
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Remote analysis of a distributed WLAN using passive wireless-side measurement
Performance Evaluation
Understanding handoffs in large ieee 802.11 wireless networks
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Model validation through experimental testbed: the fluid flow behavior example
Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities
A city-wide vehicular infrastructure for wide-area wireless experimentation
Proceedings of the third ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
Active capture of wireless traces: overcome the lack in protocol analysis
Proceedings of the third ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
The changing usage of a mature campus-wide wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
RAP: protecting commodity wi-fi networks from rogue access points
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Sniffer Channel Selection for Monitoring Wireless LANs
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
IEEE Transactions on Multimedia - Special issue on quality-driven cross-layer design for multimedia communications
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
WiPal: efficient offline merging of IEEE 802.11 traces
ACM SIGMOBILE Mobile Computing and Communications Review
On the fidelity of 802.11 packet traces
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
IEEE 802.11 user fingerprinting and its applications for intrusion detection
Computers & Mathematics with Applications
Brief announcement: complexity and solution of the send-receive correlation problem
Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Dartmouth internet security testbed (DIST: building a campus-wide wireless testbed
CSET'09 Proceedings of the 2nd conference on Cyber security experimentation and test
Dartmouth internet security testbed (DIST: building a campus-wide wireless testbed
CSET'09 Proceedings of the 2nd conference on Cyber security experimentation and test
On quality of monitoring for multi-channel wireless infrastructure networks
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
Techniques for improving the accuracy of 802.11 WLAN-based networking experimentation
EURASIP Journal on Wireless Communications and Networking - Special issue on simulators and experimental testbeds design and development for wireless networks
TimeRemap: stable and accurate time in vehicular networks
IEEE Communications Magazine
Passive online wireless LAN health monitoring from a single measurement point
ACM SIGMOBILE Mobile Computing and Communications Review
Aegis: physical space security for wireless networks with smart antennas
IEEE/ACM Transactions on Networking (TON)
PIE in the sky: online passive interference estimation for enterprise WLANs
Proceedings of the 8th USENIX conference on Networked systems design and implementation
PMSW: a passive monitoring system in wireless sensor networks
International Journal of Network Management
Proceedings of the 8th ACM Symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Sequence number-based MAC address spoof detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Manipulating Wi-Fi packet traces with WiPal: design and experience
Software—Practice & Experience
Identifying 802.11 traffic from passive measurements using iterative Bayesian inference
IEEE/ACM Transactions on Networking (TON)
Sniffer channel selection for monitoring wireless LANs
Computer Communications
Hi-index | 0.00 |
Many studies on measurement and characterization of wireless LANs (WLANs) have been performed recently. Most of these measurements have been conducted from the wired portion of the network based on wired monitoring (e.g. sniffer at some wired point) or SNMP statistics. More recently, wireless monitoring, the traffic measurement from a wireless vantage point, is also widely adopted in both wireless research and commercial WLAN management product development. Wireless monitoring technique can provide detailed PHY/MAC information on wireless medium. For the network diagnosis purpose (e.g. anomaly detection and security monitoring) such detailed wireless information is more useful than the information provided by SNMP or wired monitoring. In this paper we have explored various issues in implementing the wireless monitoring system for an IEEE 802.11 based wireless network. We identify the pitfalls that such system needs to be aware of, and then provide feasible solutions to avoid those pitfalls. We implement an actual wireless monitoring system and demonstrate its effectiveness by characterizing a typical computer science department WLAN traffic. Our characterization reveals rich information about the PHY/MAC layers of the IEEE 802.11 protocol such as the typical traffic mix of different frame types, their temporal characteristics and correlation with the user activities. Moreover, we identify various anomalies in protocol and security of the IEEE 802.11 MAC. Regarding the security, we identify malicious usages of WLAN, such as email worm and network scanning. Our results also show excessive retransmissions of some management frame types reducing the useful throughput of the wireless network.