Computer graphics: principles and practice (2nd ed.)
Computer graphics: principles and practice (2nd ed.)
The active badge location system
ACM Transactions on Information Systems (TOIS)
TCP/IP illustrated (vol. 1): the protocols
TCP/IP illustrated (vol. 1): the protocols
Modeling TCP throughput: a simple model and its empirical validation
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Equation-based congestion control for unicast applications
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Critical path analysis of TCP transactions
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
On the constancy of internet path properties
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
Robotics-based location sensing using wireless ethernet
Proceedings of the 8th annual international conference on Mobile computing and networking
On the characteristics and origins of internet flow rates
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
User-level internet path diagnosis
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Estimating loss rates with TCP
ACM SIGMETRICS Performance Evaluation Review
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Kerberos: an authentication service for computer networks
IEEE Communications Magazine
Enhancing the security of corporate Wi-Fi networks using DAIR
Proceedings of the 4th international conference on Mobile systems, applications and services
MOJO: a distributed physical layer anomaly detection system for 802.11 WLANs
Proceedings of the 4th international conference on Mobile systems, applications and services
WiFiProfiler: cooperative diagnosis in wireless LANs
Proceedings of the 4th international conference on Mobile systems, applications and services
Management and Diagnosis Architecture for a Large-Scale Public WLAN
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Troubleshooting wireless mesh networks
ACM SIGCOMM Computer Communication Review
Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
Passive and accurate traffic load estimation for infrastructure-mode wireless lan
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
ACM Transactions on Information and System Security (TISSEC)
A distributed fault identification protocol for wireless and mobile ad hoc networks
Journal of Parallel and Distributed Computing
International Journal of Mobile Communications
SMARTA: a self-managing architecture for thin access points
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
FatVAP: aggregating AP backhaul capacity to maximize throughput
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
On fast and accurate detection of unauthorized wireless access points using clock skews
Proceedings of the 14th ACM international conference on Mobile computing and networking
Opportunistic use of client repeaters to improve performance of WLANs
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Point&Connect: intention-based device pairing for mobile phone users
Proceedings of the 7th international conference on Mobile systems, applications, and services
RAP: protecting commodity wi-fi networks from rogue access points
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Change is hard: adapting dependency graph models for unified diagnosis in wired/wireless networks
Proceedings of the 1st ACM workshop on Research on enterprise networking
Opportunistic use of client repeaters to improve performance of WLANs
IEEE/ACM Transactions on Networking (TON)
Network stack diagnosis and visualization tool
Proceedings of the Symposium on Computer Human Interaction for the Management of Information Technology
Detecting 802.11 wireless hosts from remote passive observations
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
IEEE 802.11 user fingerprinting and its applications for intrusion detection
Computers & Mathematics with Applications
Distributed testing and diagnosis in a mobile computing environment
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Sybot: an adaptive and mobile spectrum survey system for wifi networks
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Passive online wireless LAN health monitoring from a single measurement point
ACM SIGMOBILE Mobile Computing and Communications Review
A location-based management system for enterprise wireless LANs
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Understanding 802.11 performance in heterogeneous environments
Proceedings of the 2nd ACM SIGCOMM workshop on Home networks
WiFiHop - mitigating the Evil twin attack through multi-hop detection
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
End-user perspectives of Internet connectivity problems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Identifying 802.11 traffic from passive measurements using iterative Bayesian inference
IEEE/ACM Transactions on Networking (TON)
Sniffer channel selection for monitoring wireless LANs
Computer Communications
Robust authentication of public access points using digital certificates: a novel approach
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
An efficient fault detection and diagnosis protocolfor vehicular networks
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Hi-index | 0.00 |
The wide-scale deployment of IEEE 802.11 wireless networks has generated significant challenges for Information Technology (IT) departments in corporations. Users frequently complain about connectivity and performance problems, and network administrators are expected to diagnose these problems while managing corporate security and coverage. Their task is particularly difficult due to the unreliable nature of the wireless medium and a lack of intelligent diagnostic tools for determining the cause of these problems.This paper presents an architecture for detecting and diagnosing faults in IEEE 802.11 infrastructure wireless networks. To the best of our knowledge, ours is the first paper to address fault diagnostic issues for these networks. As part of our architecture, we propose and evaluate a novel technique called Client Conduit, which enables boot-strapping and fault diagnosis of disconnected clients. We describe techniques for analyzing performance problems faced in a wireless LAN deployment. We also present an approach for detecting unauthorized access points. We have built a prototype of our fault diagnostic architecture on the Windows operating system using off-the-shelf IEEE 802.11 cards. The initial results show that our mechanisms are effective; furthermore, they impose low overheads when clients are not experiencing problems.