Academic literature on the topic 'Wi-Fi frames'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wi-Fi frames.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wi-Fi frames"

1

Reyes-Moncayo, Hector Ivan, Luis Daniel Malaver- Mendoza, and Andrea Lorena Ochoa-Murillo. "Survey of the security risks of Wi-Fi networks based on the information elements of beacon and probe response frames." Scientia et Technica 25, no. 3 (September 30, 2020): 351–57. http://dx.doi.org/10.22517/23447214.23781.

Full text
Abstract:
Wi-Fi networks have become prevalent in homes, businesses, and public places. Wi-Fi is one of the most common means that people use to access digital services like Facebook, WhatsApp, Instagram, email, and even payment platforms. Equipment for deploying Wi-Fi networks is affordable and its basic features are easy to manipulate. In many cases Wi-Fi users do not even have to buy any communication equipment, since Wi-Fi routers are installed by internet service providers (ISP) in the premises of their customers. Wi-Fi equipment, owned either by end users or ISP companies, should be configured as securely as possible to avoid potential attacks. The security capabilities and features of Wi-Fi routers and access points are inserted into beacon and probe response frames. Potential attackers can use sniffing tools like Wireshark to capture these frames and extract information about security features to discover vulnerabilities. In order to assess the security risks of Wi-Fi networks we conducted a survey in which we used Wireshark to capture the traffic from several Wi-Fi networks, and then through a filter we selected the beacon and probe response frames to analyze the security information elements carried by those frames. We came to the conclusion that despite technical recommendations, some security parameters and options are still set in a way that makes networks more prone to attacks. With this paper we want the readers to be aware of the security risks of their Wi-Fi networks, even the ones set up by their internet service providers.
APA, Harvard, Vancouver, ISO, and other styles
2

Vega-Barbas, Mario, Manuel Álvarez-Campana, Diego Rivera, Mario Sanz, and Julio Berrocal. "AFOROS: A Low-Cost Wi-Fi-Based Monitoring System for Estimating Occupancy of Public Spaces." Sensors 21, no. 11 (June 3, 2021): 3863. http://dx.doi.org/10.3390/s21113863.

Full text
Abstract:
Estimating the number of people present in a given venue in real-time is extremely useful from a security, management, and resource optimization perspective. This article presents the architecture of a system based on the use of Wi-Fi sensor devices that allows estimating, almost in real-time, the number of people attending an event that is taking place in a venue. The estimate is based on the analysis of the “probe request” messages periodically transmitted by smartphones to determine the existence of Wi-Fi access points in the vicinity. The method considers the MAC address randomization mechanisms introduced in recent years in smartphones, which prevents the estimation of the number of devices by simply counting different MAC addresses. To solve this difficulty, our Wi-Fi sensors analyze other fields present in the header of the IEEE 802.11 frames, the information elements, to extract a unique fingerprint from each smartphone. The designed system was tested in a set of real scenarios, obtaining an estimate of attendance at different public events with an accuracy close to 95%.
APA, Harvard, Vancouver, ISO, and other styles
3

Gu, Xiaolin, Wenjia Wu, Xiaodan Gu, Zhen Ling, Ming Yang, and Aibo Song. "Probe Request Based Device Identification Attack and Defense." Sensors 20, no. 16 (August 17, 2020): 4620. http://dx.doi.org/10.3390/s20164620.

Full text
Abstract:
Wi-Fi network has an open nature so that it needs to face greater security risks compared to wired network. The MAC address represents the unique identifier of the device, and is easily obtained by an attacker. Therefore MAC address randomization is proposed to protect the privacy of devices in a Wi-Fi network. However, implicit identifiers are used by attackers to identify user’s device, which can cause the leakage of user’s privacy. We propose device identification based on 802.11ac probe request frames. Here, a detailed analysis on the effectiveness of 802.11ac fields is given and a novel device identification method based on deep learning whose average f1-score exceeds 99% is presented. With a purpose of preventing attackers from obtaining relevant information by the device identification method above, we design a novel defense mechanism based on stream cipher. In that case, the original content of probe request frame is hidden by encrypting probe request frames and construction of probe request is reserved to avoid the finding of attackers. This defense mechanism can effectively reduce the performance of the proposed device identification method whose average f1-score is below 30%. In general, our research on attack and defense mechanism can preserve device privacy better.
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Dong Hyun, and Jong Deok Kim. "Unequal loss protection scheme using a quality prediction model in a Wi-Fi broadcasting system." International Journal of Distributed Sensor Networks 15, no. 6 (June 2019): 155014771985424. http://dx.doi.org/10.1177/1550147719854247.

Full text
Abstract:
Wireless local area network–based broadcasting techniques are a type of mobile Internet Protocol television technology that simultaneously transmits multimedia content to local users. Contrary to the existing wireless local area network–based multimedia transmission systems, which transmit multimedia data to users using unicast packets, a wireless local area network–based broadcasting system is able to transmit multimedia data to many users in a single broadcast packet. Consequently, network resources do not increase with the increase in the number of users. However, IEEE 802.11 does not provide a packet loss recovery algorithm for broadcast packet loss, which is unavoidable. Therefore, the forward error correction technique is required to address the issue of broadcast packet loss. The broadcast packet loss rate of a wireless local area network–based broadcasting system that transmits compressed multimedia data is not proportional to the quality deterioration of the received video signals; therefore, it is difficult to predict the quality of the received video while also considering the effect of broadcast packet loss. In this scenario, allocating equal forward error correction packets to compressed frames is not an effective method for recovering broadcast packet loss. Thus, several studies on unequal loss protection have been conducted. This study proposes an effective, prediction-based unequal loss protection algorithm that can be applied to wireless local area network–based broadcasting systems. The proposed unequal loss protection algorithm adopts a novel approach by adding forward error correction packets to every transmission frame while considering frame loss. This algorithm was used as a new metric to predict video quality deterioration, and an unequal loss protection structure was designed, implemented, and verified. The effectiveness of the quality deterioration model and the validity of the unequal loss protection algorithm were demonstrated through experiments.
APA, Harvard, Vancouver, ISO, and other styles
5

Lu, Qian, Haipeng Qu, Yuzhan Ouyang, and Jiahui Zhang. "SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames." Security and Communication Networks 2019 (June 2, 2019): 1–10. http://dx.doi.org/10.1155/2019/2718741.

Full text
Abstract:
In general, the IEEE 802.11 network identifiers used by wireless access points (APs) can be easily spoofed. Accordingly, a malicious adversary is able to clone the identity information of a legitimate AP (LAP) to launch evil twin attacks (ETAs). The evil twin is a class of rogue access point (RAP) that masquerades as a LAP and allures Wi-Fi victims’ traffic. It enables an attacker with little effort and expenditure to eavesdrop or manipulate wireless communications. Due to the characteristics of strong concealment, high confusion, great harmfulness, and easy implementation, the ETA has become one of the most severe security threats in Wireless Local Area Networks (WLANs). Here, we propose a novel client-side approach, Speical Length Frames Arrival Time (SLFAT), to detect the ETA, which utilizes the same gateway as the LAP. By monitoring the traffic emitted by target APs at a detection node, SLFAT extracts the arrival time of the special frames with the same length to determine the evil twin’s forwarding behavior. SLFAT is passive, lightweight, efficient, hard to be escaped. It allows users to independently detect ETA on ordinary wireless devices. Through implementation and evaluation in our study, SLFAT achieves a very high detection rate in distinguishing evil twins from LAPs.
APA, Harvard, Vancouver, ISO, and other styles
6

Ishikawa, Naoki, Yasuhiro Ohishi, and Kaori Maeda. "Nulls in the Air: Passive and Low-Complexity QoS Estimation Method for a Large-Scale Wi-Fi Network Based on Null Function Data Frames." IEEE Access 7 (2019): 28581–91. http://dx.doi.org/10.1109/access.2019.2902182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jeong, Baek, and Son. "Hierarchical Network Architecture for Non-Safety Applications in Urban Vehicular Ad-Hoc Networks." Sensors 19, no. 19 (October 4, 2019): 4306. http://dx.doi.org/10.3390/s19194306.

Full text
Abstract:
In the vehicular ad-hoc networks (VANETs), wireless access in vehicular environments (WAVE) as the core networking technology is suitable for supporting safety-critical applications, but it is difficult to guarantee its performance when transmitting non-safety data, especially high volumes of data, in a multi-hop manner. Therefore, to provide non-safety applications effectively and reliably for users, we propose a hybrid V2V communication system (HVCS) using hierarchical networking architecture: a centralized control model for the establishment of a fast connection and a local data propagation model for efficient and reliable transmissions. The centralized control model had the functionality of node discovery, local ad-hoc group (LAG) formation, a LAG owner (LAGO) determination, and LAG management. The local data propagation indicates that data are transmitted only within the LAG under the management of the LAGO. To support the end-to-end multi-hop transmission over V2V communication, vehicles outside the LAG employ the store and forward model. We designed three phases consisting of concise device discovery (CDD), concise provisioning (CP), and data transmission, so that the HVCS is highly efficient and robust on the hierarchical networking architecture. Under the centralized control, the phase of the CDD operates to improve connection establishment time, and the CP is to simplify operations required for security establishment. Our HVCS is implemented as a two-tier system using a traffic controller for centralized control using cellular networks and a smartphone for local data propagation over Wi-Fi Direct. The HVCS’ performance was evaluated using Veins, and compared with WAVE in terms of throughput, connectivity, and quality of service (QoS). The effectiveness of the centralized control was demonstrated in comparative experiments with Wi-Fi Direct. The connection establishment time measured was only 0.95 s for the HVCS. In the case of video streaming services through the HVCS, about 98% of the events could be played over 16 frames per second. The throughput for the streaming data was between 74% to 81% when the vehicle density was over 50%. We demonstrated that the proposed system has high throughput and satisfies the QoS of streaming services even though the end-to-end delay is a bit longer when compared to that of WAVE.
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmed, Adel A., and Omar Barukab. "Autonomous framework simulation tools for real-time multimedia streaming over wireless ad-hoc networks." SIMULATION 96, no. 2 (July 2, 2019): 185–97. http://dx.doi.org/10.1177/0037549719859065.

Full text
Abstract:
Real-time video communication has become one of the most significant applications extensively used by homogeneous/heterogeneous wireless network technologies, such as Wi-Fi, the Internet of things, the wireless sensor network (WSN), 5G, etc. This leads to enhanced deployment of multimedia streaming applications over wireless network technologies. In order to accomplish the optimal performance of real-time multimedia streaming applications over the homogeneous/heterogeneous wireless network, it is therefore necessary to develop a simulation tool-set that effectively measures the quality of service (QoS) for different multimedia streaming applications over transport layer protocols. This paper proposes an autonomous simulation tool (AST) that is entirely independent from the source code of transport layer protocols. Furthermore, the AST is integrated into NS-2 to evaluate the QoS of real-time video streaming over numerous transport layer protocols and it uses new QoS measurement tools to test the video delivery quality based on I-frames to speeds up the assessment of multimedia streaming quality and ensure high accuracy of performance metrics. The simulation results show that using the AST to simulate real-time multimedia stream results in between 13% and 36% higher delivery ratio and 150–250% less cumulative jitter delay compared with using baseline simulation tools. Also, the AST guarantees an optimal QoS performance measurements in terms of the peak signal-to-noise Ratio and visual quality of the received video.
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Kan, and Song Lin Liu. "Remote Stepper Motor Controlled Based on Wi-Fi Module." Applied Mechanics and Materials 727-728 (January 2015): 612–15. http://dx.doi.org/10.4028/www.scientific.net/amm.727-728.612.

Full text
Abstract:
This paperdescribes an approach based on Wi-Fi technology to remotelycontrol the stepper motor. Through usingMCU Nested Vectored InterruptController (NVIC) and timer, the stepper motor would run smooth without intervalor frame miss, which could happen due to the problem of unstable Wi-Fi connection.The drive board and Wi-Fi module were also re designed to smooth the runningprocess of stepper motor.
APA, Harvard, Vancouver, ISO, and other styles
10

Hong, Sung-Tae, Harim Lee, Hyoil Kim, and Hyun Jong Yang. "Lightweight Wi-Fi Frame Detection for Licensed Assisted Access LTE." IEEE Access 7 (2019): 77618–28. http://dx.doi.org/10.1109/access.2019.2921724.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Wi-Fi frames"

1

Venger, Adam. "Black-box analýza zabezpečení Wi-Fi." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445533.

Full text
Abstract:
Zariadenia, na ktoré sa každodenne spoliehame, sú stále zložitejšie a využívajú zložitejšie protokoly. Jedným z týchto protokolov je Wi-Fi. S rastúcou zložitosťou sa zvyšuje aj potenciál pre implementačné chyby. Táto práca skúma Wi-Fi protokol a použitie fuzz testingu pre generovanie semi-validných vstupov, ktoré by mohli odhaliť zraniteľné miesta v zariadeniach. Špeciálna pozornosť bola venovaná testovaniu Wi-Fi v systéme ESP32 a ESP32-S2. Výsledkom práce je fuzzer vhodný pre testovanie akéhokoľvek Wi-Fi zariadenia, monitorovací nástroj špeciálne pre ESP32 a sada testovacích programov pre ESP32. Nástroj neodhalil žiadne potenciálne zraniteľnosti.
APA, Harvard, Vancouver, ISO, and other styles
2

Prudík, Jiří. "Model metropolitní optické sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217666.

Full text
Abstract:
The purpose of this master’s thesis is foremost to provide a simple guide how to build elements of optical metropolitan area network. The basic model consists to sequence of construction, network topology, passive and active parts. The collection contains examples of alternative technology such as Wireless LAN with different frequency. The optical network construction based on optical cable, fibres, splices, trays, adapters, connectors and active parts for example a lot of media convertor models. After that there are demonstrating type of wavelength division multiplexer used in metropolitan area network – passive planar PCL splitter. One of the passive planar splitter are used to increase optical fibre channel. At the end of the collection a simplified examples of used measurements – optical time domain reflectometry and optical fibre transmission. Contains standard protocols or reflectogram. The conclusion of this thesis summarizes costs of FTTb (Fibre To The Building) model of optical metropolitan area network in Czech republic and future contribution for society.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Wi-Fi frames"

1

Vatti, Rambabu A., and Arun N. Gaikwad. "Frame Converter for Cooperative Coexistence Between IEEE 802.15.4 Wireless Sensor Networks and Wi-Fi." In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, 151–57. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2529-4_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gari, Nicolae, and Xingguo Xiong. "Prototyping of Lunabotic Excavator Robotic System." In Prototyping of Robotic Systems, 217–51. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0176-5.ch008.

Full text
Abstract:
In this chapter, the design and prototyping of a lunar excavator robotic system is proposed. The lunabotic excavator was developed for participating in 2010 NASA Lunar Excavating Competition. Being remotely controlled by operator using a computer via Wi-Fi telecommunication, the autonomous lunabotic excavator can perform the tasks of excavating regolith stimulant, collecting it in the dumpster, and dumping it into the assigned collector box. The design and prototyping of the lunabotic excavator robotic system are discussed. The excavator includes multiple modules including mechanical frames, front/rear wheels, excavating conveyor, steering system, dumping system, power supply and distribution system, actuation system, switch control system, data acquisition system, and telecommunication system. The lunabotic excavator robotic system has been implemented. The excavator can perform the expected functions as designed. The lunabotic excavator designs in NASA Lunar Excavating Competition may lead to new and effective robotic excavators for planetary exploration. The design and prototyping strategies used in the lunabotic excavator may be extended to other ground wheeled vehicles or remotely-controlled robotic systems as well.
APA, Harvard, Vancouver, ISO, and other styles
3

"Wireless Hacking." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, 244–57. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7628-0.ch009.

Full text
Abstract:
Wired networks add to cost and space required to setup while wireless networks are easy to expand without adding complexity of cables. Most organizations implement wireless networks as an extension to an existing wired connection by installing multiple access points at various locations to cover larger area. The wi-fi network users can be assigned limited and restricted access to the actual wired network and organizational resources. Although less reliable, wireless networks offer mobility, flexibility, ease of deployment, scalability with reduced cost of implementation. However, besides these many advantages, wireless network expands the security threat level by offering ease of intercepting network traffic to the hackers via open networks. Hence, there is a need to determine the potential wi-fi security threats, attacks, attacking tools, and possible countermeasures to be used to secure organizational wireless networks. This chapter focuses on different IEEE 802.11 wireless standards, authentication and association processes in 802.11, and WLAN frame structure. This chapter explains different wireless attacks like war-driving, war-chalking, wi-fi signal jamming, denial of service (DOS) attack, rogue access point attack, wireless traffic analysis, MAC spoofing, de-authentication attack, man-in-the-middle attack, evil twin attack, cracking wi-fi encryptions, spectrum analysis, bluetooth devices attacks, etc. The chapter also discusses different tools used for carrying out wireless attacks or auditing wireless security like NetStumbler, Kismet, Aircrack, insider, KisMAC, WEPWedgie, WIDZ, and Snort-wireless. The chapter also discusses countermeasures against these attacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Pandey, Bishwajeet Kumar, D. M. Akbar Hussain, and Jason Levy. "AI and FPGA-Based IoT Architectures, Models, and Platforms for Smart City Application." In IoT Architectures, Models, and Platforms for Smart City Applications, 94–106. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1253-1.ch005.

Full text
Abstract:
Anything that has an IP address is IoT-enabled. In this chapter, the authors have surveyed nine different IoT-enabled designs from IoT-based water management cyber-physical system (IoT-WMCPS) to IoT-based random access memory (IoT-RAM). They have also surveyed a platform called Quickscript. The Quickscript platform is used to develop natural language based IoT system. The nine different IoT-enabled designs discussed in this chapter are IoT-enabled bicycle called Mo-Bike, IoT-enabled house, IoT-enabled water utility, IoT-enabled mining, IoT-enabled healthcare, IoT-enabled frame buffer, IoT-enabled RAM, IoT-enabled key generator, and IoT-enabled wi-fi encoder. In cyber physical systems for water supply, researchers are able to integrate IPv6 addresses into sensors, actuators, and controllers used in water supply systems. The IPv6 address is integrating into every object available in the city so that researchers may track any object when need occurs. We may locate freely available IoT-enabled bicycles if we need to go anywhere, and we may also trace bicycles in case of theft by criminals.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wi-Fi frames"

1

Maier, Marco, Lorenz Schauer, and Florian Dorfmeister. "ProbeTags: Privacy-preserving proximity detection using Wi-Fi management frames." In 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, 2015. http://dx.doi.org/10.1109/wimob.2015.7348038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Hao, Yifan Zhang, Wei Li, and Ping Zhang. "Non-Cooperative Wi-Fi Localization via Monitoring Probe Request Frames." In 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall). IEEE, 2016. http://dx.doi.org/10.1109/vtcfall.2016.7881110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Romero-Hierro, P., M. C. Aguayo-Torres, C. Cardenas, and J. Banos-Polglase. "Wi-Fi® channel load estimation based on control frames metrics." In 2016 IEEE 27th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, 2016. http://dx.doi.org/10.1109/pimrc.2016.7794833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jiang, Zhiping, Jizhong Zhao, Xiang-Yang Li, Jinsong Han, and Wei Xi. "Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information." In IEEE INFOCOM 2013 - IEEE Conference on Computer Communications. IEEE, 2013. http://dx.doi.org/10.1109/infcom.2013.6567061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Barsocchi, Paolo, Gabriele Oligeri, and Francesco Potorti. "Frame error model in rural Wi-Fi networks." In 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt). IEEE, 2007. http://dx.doi.org/10.1109/wiopt.2007.4480105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alaslani, Maha, Ahmad Showail, and Basem Shihada. "Green frame aggregation scheme for Wi-Fi networks." In 2015 IEEE 16th International Conference on High Performance Switching and Routing (HPSR). IEEE, 2015. http://dx.doi.org/10.1109/hpsr.2015.7483076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Amer, Mohammed, Anthony Busson, and Isabelle Guérin Lassous. "Considering Frame Aggregation in Association Optimization for High Throughput Wi-Fi Networks." In the 15th ACM International Symposium. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3243046.3243057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Harim, Hyoil Kim, and Hyun Jong Yang. "Development of an LAA-LTE Transmitter with Lightweight Wi-Fi Frame Detection." In MobiCom '18: The 24th Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3241539.3267754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kwon, Jung-Hyok, Sang-Woo Lee, and Eui-Jik Kim. "Dynamic Frame Length Adaptation for Anti-Collision Management in Wi-Fi Backscatter System." In 2019 International Conference on Platform Technology and Service (PlatCon). IEEE, 2019. http://dx.doi.org/10.1109/platcon.2019.8669408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Asaduzzaman, Md, Mohammad Shahjahan Majib, and Md Mahbubur Rahman. "Wi-Fi Frame Classification and Feature Selection Analysis in Detecting Evil Twin Attack." In 2020 IEEE Region 10 Symposium (TENSYMP). IEEE, 2020. http://dx.doi.org/10.1109/tensymp50017.2020.9231042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography