SECTION: Features
The ubiquity of light makes it an attractive option for both illumination and wireless communication. We explore the future of visible light communication, including next-generation devices, groundbreaking applications, and open challenges.
By Charles J. Carver, Tianxing Li, Xia Zhou, September 2019
PDF | HTML | In the Digital Library
How can we promote an internet that respects human rights? Investing in autonomous infrastructure built and operated by politically motivated techies, who put their skills at the service of the public interest, may be the answer.
By Stefania Milan, July 2018
PDF | HTML | In the Digital Library
Combining advanced technologies in real-time wireless communication, control theory, sensor and actuator design, and rehabilitation science.
By Wenlong Zhang, Yi-Hung Wei, Quan Leng, Song Han, March 2014
PDF | HTML | In the Digital Library
SPECIAL SECTION: Online Features
In this article we outline the technological characteristics and features of "smart cities," describe how these are being implemented in the real-world, and explore some of the challenges these characteristics present to communications technologies.
By Peter J. McNerney, Ning Zhang, December 2011
PDF | HTML | In the Digital Library
Over the past few years, IEEE 802.11 wireless networks have become increasingly widely deployed. Wireless LANs can be found in coffee shops, airports, hospitals, and all major institutes. However, as for conventional wired networks, the spread of such networks may have been faster than the diffusion of security knowledge about them. As a consequence, 802.11 is the new playground for many hackers, who are attracted to the environment by virtue of its anonymity. Attacks may be traced back to the wireless network, but the intruder could have been anyone driving by within the radius of the network, making it hard, if not impossible, for him/her to be traced. Securing wireless networks is a hard task, because the standard solutions do not work effectively in guaranteeing privacy and authentication, as this article shows; as a consequence, many wireless networks are left open.This article is structured as follows: initially, an overview of the 802.11 protocol is presented. This is followed by an analysis of the steps involved in connection to and use of such a network, first in the absence of encryption and then taking into account WEP. Attacks for these different scenarios are presented and analyzed, leading to the conclusion that WEP is unsuitable as the sole security measure for such links. Finally, attacks on wired networks that are connected to a wireless LAN are analyzed.The article concludes that existing standards for wireless security as applied to the most widely used wireless standard, 802.11, are inadequate in several ways, can be attacked using publicly available tools, and lead to a false sense of security. Some advice about mitigation of threats is offered throughout the article, but the most effective solution is awareness of potential attacks and the maximization of the amount of time and effort needed to break into the network by using defence in depth.
By Andrea Bittau, September 2004
PDF | HTML | In the Digital Library