XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Wireless access networks

Articles & Features

Lighting the way to wireless efficiency

SECTION: Features

Lighting the way to wireless efficiency

The ubiquity of light makes it an attractive option for both illumination and wireless communication. We explore the future of visible light communication, including next-generation devices, groundbreaking applications, and open challenges.

By Charles J. Carver, Tianxing Li, Xia Zhou, September 2019

PDF | HTML | In the Digital Library

Autonomous infrastructure for a suckless internet

Autonomous infrastructure for a suckless internet

How can we promote an internet that respects human rights? Investing in autonomous infrastructure built and operated by politically motivated techies, who put their skills at the service of the public interest, may be the answer.

By Stefania Milan, July 2018

PDF | HTML | In the Digital Library

A high-speed, real-time mobile gait rehabilitation system

A high-speed, real-time mobile gait rehabilitation system

Combining advanced technologies in real-time wireless communication, control theory, sensor and actuator design, and rehabilitation science.

By Wenlong Zhang, Yi-Hung Wei, Quan Leng, Song Han, March 2014

PDF | HTML | In the Digital Library

WLAN Security

DEPARTMENT: Back

WLAN Security

A look back at wireless technology through the years.

By Finn Kuusisto, September 2013

PDF | HTML | In the Digital Library

Smarter Cities: Making societies smarter

SPECIAL SECTION: Online Features

Smarter Cities: Making societies smarter

In this article we outline the technological characteristics and features of "smart cities," describe how these are being implemented in the real-world, and explore some of the challenges these characteristics present to communications technologies.

By Peter J. McNerney, Ning Zhang, December 2011

PDF | HTML | In the Digital Library

Overcoming misbehavior in mobile ad hoc networks

By George Athanasiou, Leandros Tassiulas, Gregory S. Yovanof, August 2005

PDF | HTML | In the Digital Library

Experimental mobile gateways

By Premshree Pillai, August 2005

PDF | HTML | In the Digital Library

WiFi exposed

Over the past few years, IEEE 802.11 wireless networks have become increasingly widely deployed. Wireless LANs can be found in coffee shops, airports, hospitals, and all major institutes. However, as for conventional wired networks, the spread of such networks may have been faster than the diffusion of security knowledge about them. As a consequence, 802.11 is the new playground for many hackers, who are attracted to the environment by virtue of its anonymity. Attacks may be traced back to the wireless network, but the intruder could have been anyone driving by within the radius of the network, making it hard, if not impossible, for him/her to be traced. Securing wireless networks is a hard task, because the standard solutions do not work effectively in guaranteeing privacy and authentication, as this article shows; as a consequence, many wireless networks are left open.This article is structured as follows: initially, an overview of the 802.11 protocol is presented. This is followed by an analysis of the steps involved in connection to and use of such a network, first in the absence of encryption and then taking into account WEP. Attacks for these different scenarios are presented and analyzed, leading to the conclusion that WEP is unsuitable as the sole security measure for such links. Finally, attacks on wired networks that are connected to a wireless LAN are analyzed.The article concludes that existing standards for wireless security as applied to the most widely used wireless standard, 802.11, are inadequate in several ways, can be attacked using publicly available tools, and lead to a false sense of security. Some advice about mitigation of threats is offered throughout the article, but the most effective solution is awareness of potential attacks and the maximization of the amount of time and effort needed to break into the network by using defence in depth.

By Andrea Bittau, September 2004

PDF | HTML | In the Digital Library

Bluetooth

By Myra Dideles, June 2003

PDF | HTML | In the Digital Library

Cellular networks

By Lourens O. Walters, P. S. Kritzinger, December 2000

PDF | HTML | In the Digital Library

Service discovery in the future for mobile commerce

By Dipanjan Chakraborty, Harry Chen, December 2000

PDF | HTML | In the Digital Library

AgentOS

By Larry Chen, November 1998

PDF | HTML | In the Digital Library