november 17, 2006 analysis papers - dartmouth …dfk/map/map-refs.pdf · november 17, 2006 analysis...

26
map bibliography November 17, 2006 analysis papers [1] Marco Domenico Aime, Giorgio Calandriello, and Antonio Lioy. “A wire- less distributed intrusion detection system and a new attack model”. In Proceedings of the 11th IEEE Symposium on Computers and Communica- tions, pages 35–40, Cagliari, Italy, June 2006. http://security.polito. it/doc/pub/iscc2006 wirelessIDS attack model.pdf. [2] Paramvir Bahl, Ranveer Chandra, Jitendra Padhye, Lenin Ravindranath, Manpreet Singh, Alec Wolman, and Brian Zill. “Enhancing the security of corporate Wi-Fi networks using DAIR”. In Proceedings of MobiSys 2006, pages 1–14, Uppsala, Sweden, June 2006. http://doi.acm.org/10.1145/ 1134680.1134682. [3] Paramvir Bahl, Jitendra Padhye, Lenin Ravindranath, Manpreet Singh, Alec Wolman, and Brian Zill. “DAIR: A Framework for Managing En- terprise Wireless Networks Using Desktop Infrastructure”. In Proceed- ings of the Fourth Workshop on Hot Topics in Networks, College Park, MD, November 2005. http://research.microsoft.com/users/alecw/ hotnets-2005.pdf. [4] Johnny Cache and David Maynor. “Device Drivers: Don’t build a house on a shaky foundation”, August 2006. http://www.blackhat.com/html/ bh-usa-06/bh-usa-06-speakers.html. [5] Alvaro A. C´ ardenas, Svetlana Radosavac, and John S. Baras. “Detec- tion and prevention of MAC layer misbehavior in ad hoc networks”. In Proceedings of the Second ACM workshop on Security of ad hoc and sensor networks (SASN), pages 17–22, Washington, DC, USA, September 2004. ACM Press. http://www.glue.umd.edu/ svetlana/ sasn04-alvaro-svetlana.pdf. [6] Nitesh V. Chawla, Lawrence O. Hall, and Ajay Joshi. “Wrapper-based computation and evaluation of sampling methods for imbalanced datasets”. In Proceedings of the 1st International Workshop on Utility-Based Data Mining, pages 24–33, Chicago, IL, USA, August 2005. http://doi.acm. org/10.1145/1089827.1089830. 1

Upload: buiminh

Post on 05-Apr-2018

216 views

Category:

Documents


1 download

TRANSCRIPT

map bibliography

November 17, 2006

analysis papers

[1] Marco Domenico Aime, Giorgio Calandriello, and Antonio Lioy. “A wire-less distributed intrusion detection system and a new attack model”. InProceedings of the 11th IEEE Symposium on Computers and Communica-tions, pages 35–40, Cagliari, Italy, June 2006. http://security.polito.it/doc/pub/iscc2006 wirelessIDS attack model.pdf.

[2] Paramvir Bahl, Ranveer Chandra, Jitendra Padhye, Lenin Ravindranath,Manpreet Singh, Alec Wolman, and Brian Zill. “Enhancing the security ofcorporate Wi-Fi networks using DAIR”. In Proceedings of MobiSys 2006,pages 1–14, Uppsala, Sweden, June 2006. http://doi.acm.org/10.1145/1134680.1134682.

[3] Paramvir Bahl, Jitendra Padhye, Lenin Ravindranath, Manpreet Singh,Alec Wolman, and Brian Zill. “DAIR: A Framework for Managing En-terprise Wireless Networks Using Desktop Infrastructure”. In Proceed-ings of the Fourth Workshop on Hot Topics in Networks, College Park,MD, November 2005. http://research.microsoft.com/users/alecw/hotnets-2005.pdf.

[4] Johnny Cache and David Maynor. “Device Drivers: Don’t build a houseon a shaky foundation”, August 2006. http://www.blackhat.com/html/bh-usa-06/bh-usa-06-speakers.html.

[5] Alvaro A. Cardenas, Svetlana Radosavac, and John S. Baras. “Detec-tion and prevention of MAC layer misbehavior in ad hoc networks”.In Proceedings of the Second ACM workshop on Security of ad hocand sensor networks (SASN), pages 17–22, Washington, DC, USA,September 2004. ACM Press. http://www.glue.umd.edu/∼svetlana/sasn04-alvaro-svetlana.pdf.

[6] Nitesh V. Chawla, Lawrence O. Hall, and Ajay Joshi. “Wrapper-basedcomputation and evaluation of sampling methods for imbalanced datasets”.In Proceedings of the 1st International Workshop on Utility-Based DataMining, pages 24–33, Chicago, IL, USA, August 2005. http://doi.acm.org/10.1145/1089827.1089830.

1

[7] Jeffrey B. Colombe and Gregory Stephens. “Statistical profiling and visu-alization for detection of malicious insider attacks on computer networks”.In VizSEC/DMSEC ’04: Proceedings of the 2004 ACM workshop on Vi-sualization and data mining for computer security, pages 138–142, 2004.http://portal.acm.org/citation.cfm?id=1029231.

[8] Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, LidongZhou, Lintao Zhang, and Paul Barham. “Vigilante: End-to-End Contain-ment of Internet Worms”. In Proceedings of the 20th ACM Symposium onOperating Systems Principles (SOSP), Brighton, UK, October 2005. http://www.research.microsoft.com/∼manuelc/MS/VigilanteSOSP.pdf.

[9] Frederic Cuppens and Alexandre Miege. “Alert Correlation ina Cooperative Intrusion Detection Framework”. In IEEE Sym-posium on Security and Privacy, pages 202–215, 2002. http://computer.org/proceedings/sp/1543/15430202abs.htm;http://www.cs.fit.edu/∼pkc/id/related/cuppens-ieeesp02.pdf.

[10] Herve Debar, David A. Curry, and Benjamin S. Feinstein. “SomeIssues and Applications of Packet Marking for Differentiated Ser-vices”, January 2005. Internet-Draft (work in progress) draft-ietf-idwg-idmef-xml-14.txt, http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-14.txt.

[11] Jason Franklin, Damon McCoy, Parisa Tabriz, Vicentiu Neagoe,Jami Van Randwyk, and Douglas Sicker. “Passive Data LinkLayer 802.11 Wireless Device Driver Fingerprinting”. In Proceed-ings of the 15th USENIX Security Symposium, pages 167–178, Van-couver, Canada, jul-aug 2006. http://www.cs.cmu.edu/∼jfrankli/usenixsec06/usenixsec06driverfingerprinting.pdf.

[12] Christopher W. Geib and Robert P. Goldman. “Plan Recog-nition in Intrusion Detection Systems”, March 23 2001. http://citeseer.ist.psu.edu/467970.html;http://www.geocities.com/rpgoldman/papers/discex01pr.ps.

[13] Anup K. Ghosh and Aaron Schwartzbard. “A Study in Using NeuralNetworks for Anomaly and Misuse Detection”. In USENIX, editor, Pro-ceedings of the eighth USENIX Security Symposium (Security ’99), Au-gust 23–26, 1999, Washington, DC, USA, pages ??–??, pub-USENIX:adr,1999. pub-USENIX. http://db.usenix.org/publications/library/proceedings/sec99/ghosh.html.

[14] Jose M. Gonzalez and Vern Paxson. “Enhancing Network Intrusion De-tection With Integrated Sampling and Filtering”. In Proceedings of the9th International Symposium On Recent Advances In Intrusion Detection(RAID 2006), Hamburg, Germany, September 2006. http://www.icir.org/vern/papers/secondary-path-raid06.pdf.

2

[15] Fanglu Guo and Tzi cker Chiueh. “Sequence Number-Based MAC Ad-dress Spoof Detection”. In Proceedings of the 8th International Symposiumon Recent Advances in Intrusion Detection, Seattle, WA, USA, Septem-ber 2005. http://www.cs.uml.edu/∼glchen/teaching/91.564/papers/guo.raid05.pdf.

[16] Jeyanthi Hall, Michel Barbeau, and Evangelos Kranakis. “Using Mobil-ity Profiles for Anomaly-based Intrusion Detection in Mobile Networks”.In The 12th Annual Network and Distributed System Security SymposiumPre-Conference Wireless and Mobile Security Workshop, San Diego, CA,USA, February 2005. http://www.isoc.org/isoc/conferences/ndss/05/workshop/hall.pdf.

[17] Pradeep Kyasanur and Nitin H. Vaidya. “Detection and Handling of MAClayer misbehavior in wireless networks”. In Proceedings of the InternationalConference on Dependable Systems and Networks, San Francisco, CA, USA,June 2003. http://www.crhc.uiuc.edu/∼kyasanur/papers/misbehavedsn.pdf.

[18] Anukool Lakhina, Mark Crovella, and Christophe Diot. “Diagnosingnetwork-wide traffic anomalies”. In Proceedings of SIGCOMM 2004, pages219–230, Portland, OR, August 2004. http://doi.acm.org/10.1145/1015467.1015492. [dfk] They use PCA to bring structure to the traf-fic volume crossing the links of a backbone network, identifying principalcomponents that represent normal traffic, and other components that rep-resent the residual. When the observed traffic volume, viewed in this way,shows large amounts in these residual components they decide that there isa volume anomaly. They can also identify which OD flow (from one POPto another POP) is the cause, and quantify it.

[19] Anukool Lakhina, Mark Crovella, and Christophe Diot. “Mining AnomaliesUsing Traffic Feature Distributions”. Technical Report 2005-002, CS De-partment, Boston University, February 10 2005. http://www.cs.bu.edu/faculty/crovella/paper-archive/mining-anomalies-TR.pdf;http://www.sigcomm.org/sigcomm2005/paper-LakCro.pdf.

[20] Anukool Lakhina, Mark Crovella, and Christophe Diot. “Mining anomaliesusing traffic feature distributions”. In Proceedings of SIGCOMM 2005,pages 217–228, Philadelphia, PA, August 2005. http://doi.acm.org/10.1145/1080091.1080118. [dfk] I skimmed this and it looks like it might beuseful for the MAP project, since they focus on identifying changes in thedistribution of various traffic features. On the other hand, it appears to bean off-line method.

[21] Wenke Lee, Joao B. D. Cabrera, Ashley Thomas, Niranjan Balwalli,Sunmeet Saluja, and Yi Zhang. “Performance Adaptation in Real-TimeIntrusion Detection Systems”. In RAID, pages 252–273, 2002. http://

3

link.springer.de/link/service/series/0558/bibs/2516/25160252.htm;http://www.cc.gatech.edu/∼wenke/ids-readings/raid02.ps.

[22] Wenke Lee and Dong Xiang. “Information-theoretic measures for anomalydetection”. In Symposium on Security and Privacy (SSP ’01), pages 130–143, Washington - Brussels - Tokyo, May 2001. IEEE. http://citeseer.ist.psu.edu/408421.html.

[23] T. Matsukawa, T. Satake, and J. Yamada. “Metrics for detection of QoSdegradation over wireless LAN”. In Proceedings of the Symposium on Ap-plications and the Internet (SAINT), pages 198–203, Trento, Italy, January2005. http://ieeexplore.ieee.org/iel5/9522/30170/01386115.pdf.

[24] Peter Mell, Vincent Hu, Richard Lippmann, Josh Haines, and MarcZissman. “An Overview of Issues in Testing Intrusion Detection Sys-tems”, August 2003. http://csrc.nist.gov/publications/nistir/nistir-7007.pdf.

[25] Craig Partridge, David Cousins, Alden W. Jackson, Rajesh Krishnan,Tushar Saxena, and W. Timothy Strayer. “Using signal processing toanalyze wireless data traffic”. In Proceedings of the 3rd ACM workshopon Wireless security (WiSe), pages 67–76, Atlanta, GA, USA, September2002. http://doi.acm.org/10.1145/570681.570689.

[26] Vern Paxson. “Bro: A System for Detecting Network Intruders in Real-Time”. In USENIX, editor, Seventh USENIX Security Symposium proceed-ings: conference proceedings: San Antonio, Texas, January 26–29, 1998,pages ??–??, pub-USENIX:adr, 1998. pub-USENIX. http://www.usenix.org/publications/library/proceedings/sec98/paxson.html.

[27] Svetlana Radosavac, John S. Baras, and Oirdanis Koutsopoulos. “AFramework for MAC Protocol Misbehavior Detection in Wireless Net-works”. In Proceedings of the ACM Workshop on Wireless Security(WiSE), pages 33–42, Cologne, Germany, September 2005. ACM Press.http://doi.acm.org/10.1145/1080793.1080801. They try to detect at-tackers who are cheating on the backoff protocols within the 802.11 MAC inan infrastructure wireless network. Their metric for success is the numberof observations required to detect the misbehavior. They only pay attentionto long-term attacks that generate a large benefit for the attacker (and byimplication large impact on the others). They use the theory of SequentialProbability Ratio Test. The paper is severely limited by numerous assump-tions to make their theory work but also make it rather unrealistic... lotsmore work yet to be done.

[28] Brennen Reynolds and Dipak Ghosal. “Secure IP Telephony usingMulti-layered Protection”. In Proceedings of The 10th Annual Net-work and Distributed System Security Symposium, San Diego, CA,USA, February 2003. http://www.isoc.org/isoc/conferences/ndss/03/proceedings/papers/3.pdf.

4

[29] Dawn Xiaodong Song, David Wagner, and Xuqing Tian. “Timing Analysisof Keystrokes and Timing Attacks on SSH”. In Proc. 10th USENIX SecuritySymposium, aug 2001. http://citeseer.ist.psu.edu/song01timing.html.

[30] Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N.Padmanabhan, and Lili Qiu. “Statistical Identi cation of Encrypted WebBrowsing Traffic”. In Proc. IEEE Symp. Security and Privacy, pages 19–30,Oakland, CA, 2002. http://citeseer.ist.psu.edu/sun02statistical.html.

[31] Kymie M. C. Tan and Roy A. Maxion. “Why 6?Defining the OperationalLimits of stide”. In Proceedings of the IEEE Symposium on Research inSecurity and Privacy, pages 188–201, Oakland, CA, May 2002. IEEE Com-puter Society, Technical Committee on Security and Privacy, IEEE Com-puter Society Press. http://citeseer.ist.psu.edu/484707.html;http://reports-archive.adm.cs.cmu.edu/anon/2001/CMU-CS-01-158.ps.

[32] Jeffrey L Undercoffer, Anupam Joshi, Tim Finin, and John Pinkston.“A Target Centric Ontology for Intrusion Detection: Using DAML+OILto Classify Intrusive Behaviors”. Knowledge Engineering Review, Jan-uary 2004. http://citeseer.ist.psu.edu/568003.html;http://www.cs.umbc.edu/∼finin/papers/ijcai03OntologiesIDS.pdf.

[33] Mario Cagalj, Saurabh Ganeriwal, Imad Aad, and Jean-Pierre Hubaux.“On Cheating in CSMA/CA Ad Hoc Networks”. Technical Re-port IC/2004/27, EPFL-IC, March 2004. http://icwww.epfl.ch/publications/documents/IC TECH REPORT 200427.pdf.

[34] Vinod Yegneswaran, Jonathon T. Giffin, Paul Barford, and Somesh Jha.“An Architecture for Generating Semantics-Aware Signatures”. In Proceed-ings of the 14th USENIX Security Symposium, pages 97–112, Baltimore,MD, USA, August 2005. http://www.cs.wisc.edu/∼vinod/nemean.pdf.

[35] Wenzhe Zhou, Alan Marshall, and Qiang Gu. “A novel classification schemefor 802.11 WLAN active attacking traffic patterns”. In Proceedings of theIEEE Wireless Communications and Networking Conference, Las Vegas,April 2006. IEEE Communications Society.

attack papers

[1] Kwang-Hyun Baek and Sean W. Smith. “Preventing Theft of Quality ofService on Open Platforms”. Technical Report TR2005-539, DartmouthCollege, Computer Science, Hanover, NH, USA, May 2005. ftp://ftp.cs.dartmouth.edu/TR/TR2005-539.pdf. REVISION 1 of May 5, 2005.

[2] John Bellardo and Stefan Savage. “802.11 Denial-of-Service Attacks: RealVulnerabilities and Practical Solutions”. In Proceedings of the Twelfth

5

USENIX Security Symposium, pages 15–28, Washington, DC, USA, August2003. USENIX Association. http://www.cs.ucsd.edu/∼savage/papers/UsenixSec03.pdf. A great paper with a clear summary of several DOS at-tacks on 802.11, an explanation of how they can actually be implementedusing commodity NICs, and a few simple solutions that can avoid or miti-gate the effects. Rather than attempting to detect an attack, then respondto it, the implementation of their solution in the AP and all (or some?)clients will avoid the problem.

[3] Berghel and Uecker. “WiFi Attack Vectors”. CACM: Communications ofthe ACM, 48, 2005.

[4] Andrea Bittau, Mark Handley, and Joshua Lackey. “The Final Nail inWEP’s Coffin”. In Proceedings of the 2006 IEEE Symposium on Secu-rity and Privacy (S&P’06), pages 386–400, Oakland, CA, USA, May 2006.http://dx.doi.org/10.1109/SP.2006.40.

[5] Nikita Borisov, Ian Goldberg, and David Wagner. “Intercepting mobilecommunications: the insecurity of 802.11”. In Proceedings of the SeventhAnnual International Conference on Mobile Computing and Networking,pages 180–189, Rome, Italy, July 2001.

[6] L. Buttyan and J.-P. Hubaux. “Report on a Working Session on Securityin Wireless Ad Hoc Networks”. Mobile Computing and CommunicationsReview, 6(4), September 2002.

[7] Alvaro A. Cardenas, Svetlana Radosavac, and John S. Baras. “Detec-tion and prevention of MAC layer misbehavior in ad hoc networks”.In Proceedings of the Second ACM workshop on Security of ad hocand sensor networks (SASN), pages 17–22, Washington, DC, USA,September 2004. ACM Press. http://www.glue.umd.edu/∼svetlana/sasn04-alvaro-svetlana.pdf.

[8] Computer Economics. “Can WLAN Security Problems BeFixed?”. Computer Economics Report, 26(1):7–9, 2004. % url-http://www.ingenta.com/isis/searching/Expand/ingenta?unc=1045723004.

[9] John Edney and William A. Arbaugh. Real 802.11 Security. AddisonWesley, Reading, Massachusetts, July 2003.

[10] Jochen Eisinger, Peter Winterer, and Bernd Becker. “Securing Wire-less Networks in a University Environment”. In Proceedings of theThird IEEE International Conference on Pervasive Computing andCommunications Workshops, pages 312–316, Kauai, HI, USA, March2005. http://csdl.computer.org/comp/proceedings/percomw/2005/2300/00/23000312abs.htm.

6

[11] Michalis Faloutsos and Srikanth Krishnamurthy. “Denial of ServiceAttacks at the MAC Layer in Wireless Ad Hoc Networks”, Septem-ber 17 2002. http://citeseer.ist.psu.edu/543762.html;http://www.cs.ucr.edu/∼michalis/PAPERS/milcom-vik.pdf.

[12] Faria and Cheriton. “DoS and Authentication in Wireless Public AccessNetworks”. In WiSe: Proceedings of the ACM Workshop on Wireless Se-curity, 2002.

[13] Fluhrer, Mantin, and Shamir. “Weaknesses in the Key Scheduling Algo-rithm of RC4”. In SAC: Annual International Workshop on Selected Areasin Cryptography. LNCS, 2001.

[14] David Gorman and Mary Ruhl. “Intrusion Detection for TelephonySignalling”. In Proceedings of the International Symposium on RecentAdvances in Intrusion Detection (RAID’99), West Lafayette, IN, USA,September 1999. http://www.raid-symposium.org/raid99/PAPERS/Gorman.pdf.

[15] Mina Guirguis, Azer Bestavros, and Ibrahim Matta. “Reduction of Qual-ity (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessmentand Design Tradeoffs”. In Proceedings of IEEE INFOCOM 2007, An-chorage, AK, USA, May 2007. http://www.cs.bu.edu/fac/best/res/papers/infocom07-roq.pdf.

[16] Changhua He and John C. Mitchell. “Security Analysis and Im-provements for IEEE 802.11i”. In Proceedings of the 12th AnnualNetwork and Distributed System Security Symposium, San Diego, CA,USA, February 2005. http://www.isoc.org/isoc/conferences/ndss/05/proceedings/papers/NDSS05-1107.pdf. This excellent paper ana-lyzes the new 802.11i wireless networking standard, which aims to providebetter security in terms of data confidentiality, integrity, mutual authen-tication, and availability. They describe seven threats to wireless securityin general. They analyse several potential weaknesses in the protocol, andsuggest some improvements. They cover denial of service attacks in detail.The appendix is a nice, brief summary of 802.11 security protocols andattacks.

[17] Yih-Chun Hu, Adrian Perrig, and David B. Johnson. “Packet Leashes: ADefense against Wormhole Attacks in Wireless Networks”. In INFOCOM,2003. http://www.ieee-infocom.org/2003/papers/48 03.PDF.

[18] Kyle Jamieson, Bret Hull, Allen Miu, and Hari Balakrishnan. “Under-standing the Real-World Performance of Carrier Sense”. In Proceedingsof the ACM SIGCOMM 2005 Workshop on experimental approaches towireless network design and analysis (E-WIND-05), Philadelphia, PA,USA, August 2005. http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-JamHul.pdf.

7

[19] Charlie Kaufman, Radia Perlman, and Bill Sommerfeld. “DoS protectionfor UDP-based protocols”. In Proceedings of the 10th ACM conference onComputer and communications security, pages 2–7, Washington, DC, USA,October 2003. http://doi.acm.org/10.1145/948109.948113.

[20] Michael Kershaw. “Threats Posed by and to 802.11 Wireless Networks”.IAnewsletter, 8(2):22–27, Summer 2005. http://iac.dtic.mil/iatac/download/Vol8 No2.pdf. Written by the author of the popular ’kismet’tool, he first quickly surveys the range of threats to WiFi systems andfairly strongly suggests that WiFi networks should not be trusted withanything truly important. He mentions that three open-source tools arebest: kismet, tcpdump, and ethereal. He shows a few examples of howkismet works. Kismet has a small IDS capability as well as packet-captureand network-exploration tools.

[21] Mike Kershaw. “802.11 Networking in Hostile Environments”. Pre-sentation for the MIT Summer Security Camp, August 19 2004. Pre-sentation slides, % urlhttp://www.kismetwireless.net/presentations/mit-hostilewireless.pdf. [dfk] See also http://smartap.kismetwireless.net/. Thekey things I find interesting are that - it uses a mixture of three types ofnodes: sniffers, attackers, and access points; - access points provide servicewhile sniffers listen for attacks; - the attacker nodes provide protection viacounter-attack; - a central server manages the assignments of nodes to thesetasks; - central server provides useful statistics for real-time or post-mortemanalysis.

[22] Gunjan Khanna, Ammar Masood, and Cristina Nita-Rotaru. “Synchro-nization Attacks Against 802.11”. In The 12th Annual Network and Dis-tributed System Security Symposium Pre-Conference Wireless and Mo-bile Security Workshop, San Diego, CA, USA, February 2005. http://www.isoc.org/isoc/conferences/ndss/05/workshop/khanna.pdf.

[23] Pradeep Kyasanur and Nitin H. Vaidya. “Detection and Handling of MAClayer misbehavior in wireless networks”. In Proceedings of the InternationalConference on Dependable Systems and Networks, San Francisco, CA, USA,June 2003. http://www.crhc.uiuc.edu/∼kyasanur/papers/misbehavedsn.pdf.

[24] Shih-Tsung Liang and Ming-Yi Weng. “Protecting IEEE 802.11 wirelessLANs against the FCS false blocking attack”. In Proceedings of the 11thInternational Conference on Parallel and Distributed Systems (ICPADS2005), pages 723–729, Fukuoka, Japan, July 2005. http://dx.doi.org/10.1109/ICPADS.2005.243.

[25] Yu-Xi Lim, Tim Schmoyer, John Levine, and Henry L. Owen. “Wire-less Intrusion Detection and Response”. In Proceedings of the 2003IEEE Workshop on Information Assurance, West Point, NY, USA, June

8

2003. http://users.ece.gatech.edu/∼owen/Research/Conference%20Publications/wireless IAW2003.pdf.

[26] Guolong Lin and Guevara Noubir. “On link layer denial of servicein data wireless LANs”. Wireless Communications & Mobile Comput-ing, 5(3):273–284, May 2005. http://www3.interscience.wiley.com/cgi-bin/fulltext/109582321/PDFSTART.

[27] Ulf Lindqvist and Erland Jonsson. “How to Systematically Classify Com-puter Security Intrusions”. In Proceedings of the 1997 IEEE Symposiumon Security and Privacy, pages 154–163, Oakland, CA, USA, May 1997.http://ieeexplore.ieee.org/iel3/4693/13107/00601330.pdf.

[28] Guevara Noubir and Guolong Lin. “Low-power DoS attacks in data wire-less LANs and countermeasures”. Mobile Computing and CommunicationsReview, 7(3):29–30, 2003. http://doi.acm.org/10.1145/961277.

[29] Vern Paxson. “Measuring Adversaries”. ACM SIGMETRICS PerformanceEvaluation Review, 32(1):142, 2004. http://portal.acm.org/citation.cfm?id=1005686.1005688.

[30] Bruce Potter. “Wireless vulnerability assessment”. Network Se-curity, 2005(6):14–15, June 2005. http://dx.doi.org/10.1016/S1353-4858(05)70248-8.

[31] Maxim Raya, Jean-Pierre Hubaux, and Imad Aad. “DOMINO: A Systemto Detect Greedy Behavior in IEEE 802.11 Hotspots”. In Proceedings ofthe 2004 International Conference on Mobile Systems, Applications, andServices (MobiSys), pages 84–97, Boston, MA, June 2004. ACM Press.http://doi.acm.org/10.1145/990064.990077.

[32] Samuel I. Schaen and Brian W. McKenney. “Network auditing: issues andrecommendations”. In Proceedings of the 7th Annual Computer SecurityApplications Conference, San Antonio, TX, USA, December 1991. http://ieeexplore.ieee.org/iel2/369/5562/00213017.pdf.

[33] Timothy R. Schmoyer, Lim Yu Xi, and Henry L. Owen. “Wireless IntrusionDetection and Response: A case study using the classic man-in-the-middleattack”. In Proceedings of the 2004 IEEE Wireless Communications andNetworking Conference, pages 883–888, Atlanta, GA, March 2004. http://ieeexplore.ieee.org/iel5/9178/29115/01311303.pdf.

[34] Minho Shin, Justin Ma, Arunesh Mishra, and William A. Arbaugh.“Wireless network security and interworking”. Proceedings of the IEEE,94(2):455–466, February 2006. http://ieeexplore.ieee.org/iel5/5/33381/01580513.pdf.

[35] Adam Stubblefield, John Ioannidis, and Aviel D. Rubin. “A key recoveryattack on the 802.11b Wired Equivalent Privacy protocol (WEP)”. ACMTransactions on Information and System Security, 7(2):319–332, May 2004.

9

[36] Mario Cagalj, Saurabh Ganeriwal, Imad Aad, and Jean-Pierre Hubaux.“On Cheating in CSMA/CA Ad Hoc Networks”. Technical Re-port IC/2004/27, EPFL-IC, March 2004. http://icwww.epfl.ch/publications/documents/IC TECH REPORT 200427.pdf.

[37] Andrew A. Vladimirov, Konstantin V. Gavrilenko, and Andrei A.Mikhailovsky. Wi-Foo: Secrets of wireless hacking. Addison-Wesley,Boston, MA, USA, 2004.

[38] Chris Wullems, Kevin Tham, Jason Smith, and Mark Looi. “A triv-ial denial of service attack on IEEE 802.11 direct sequence spread spec-trum wireless LANs”. In Proceedings of the 2004 Wireless Telecom-munications Symposium, pages 129–136, Pomona, CA, USA, May 2004.http://ieeexplore.ieee.org/iel5/9227/29245/01319575.pdf.

[39] Wenyuan Xu, Wade Trappe, Yanyong Zhang, and Timothy Wood. “Thefeasibility of launching and detecting jamming attacks in wireless net-works”. In Proceedings of the 6th ACM International Symposium onMobile ad hoc Networking and Computing (MobiHoc), pages 46–57,Urbana-Champaign, IL, USA, May 2005. http://doi.acm.org/10.1145/1062689.1062697.

[40] Hao Yang, Fabio Ricciato, Songwu Lu, and Lixia Zhang. “Securing awireless world”. Proceedings of the IEEE, 94(2):442–454, February 2006.http://ieeexplore.ieee.org/iel5/5/33381/01580512.pdf.

[41] Yongguang Zhang and Wenke Lee. “Intrusion detection in wireless ad-hocnetworks”. In MOBICOM, pages 275–283, 2000. http://doi.acm.org/10.1145/345910.345958.

[42] Wenzhe Zhou, Alan Marshall, and Qiang Gu. “A novel classification schemefor 802.11 WLAN active attacking traffic patterns”. In Proceedings of theIEEE Wireless Communications and Networking Conference, Las Vegas,April 2006. IEEE Communications Society.

measurement papers

[1] Atul Adya, Paramvir Bahl, Ranveer Chandra, and Lili Qiu. “Archi-tecture and techniques for diagnosing faults in IEEE 802.11 infrastruc-ture networks”. In Proceedings of the Tenth Annual International Con-ference on Mobile Computing and Networking (MobiCom), pages 30–44,Philadelphia, PA, USA, September 2004. http://doi.acm.org/10.1145/1023720.1023724. They use nearby clients to help disconnected clients getconnected (and identify RF holes), to detect rogue APs, and diagnose someperformance problems. Their neat technique allows an unhappy client tobeacon, find happy clients who are willing to help relay traffic.

10

[2] Matthew Andrews and Lisa Zhang. “A CDMA Data Measurement andAnalysis Tool”. In Proceedings of the Second Workshop on Wireless Net-work Measurements, Boston, MA, USA, April 2006. http://www.winmee.org/papers/02-02.pdf.

[3] Nils Aschenbruck, Matthias Frank, Peter Martini, and Jens Toelle. “Traf-fic Measurement and Statistical Analysis in a Disaster Area Scenario”.In Proceedings of the First Workshop on Wireless Network Measure-ments, Trentino, Italy, April 2005. http://www.winmee.org/papers/WiNMee Aschenbruck.pdf.

[4] Aaron Ault, Edward Coyle, and Xuan Zhong. “K-Nearest-Neighbor Anal-ysis of Received Signal Strength Distance Estimation Across Environ-ments”. In Proceedings of the First Workshop on Wireless Network Mea-surements, Trentino, Italy, April 2005. http://www.winmee.org/papers/WiNMee Ault.pdf.

[5] Paramvir Bahl, Jitendra Padhye, Lenin Ravindranath, Manpreet Singh,Alec Wolman, and Brian Zill. “DAIR: A Framework for Managing En-terprise Wireless Networks Using Desktop Infrastructure”. In Proceed-ings of the Fourth Workshop on Hot Topics in Networks, College Park,MD, November 2005. http://research.microsoft.com/users/alecw/hotnets-2005.pdf.

[6] Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl, and P. VenkatRangan. “Characterizing User Behavior and Network Performance in aPublic Wireless LAN”. In Proceedings of the 2002 ACM SIGMETRICSConference, pages 195–205, Marina Del Rey, CA, USA, June 2002. ACMPress. http://doi.acm.org/10.1145/511334.511359. An interestingstudy although limited to 2.5 days in a conference setting. In additionto the basic stats they model some of their distributions with Markov pro-cesses and fit some to Pareto distributions. They use SNMP and tcpdumpto collect data, and define sessions differently than I do. All of their scriptsand data are available on-line.

[7] Magdalena Balazinska and Paul Castro. “Characterizing Mobility andNetwork Usage in a Corporate Wireless Local-Area Network”. In Pro-ceedings of the First International Conference on Mobile Systems, Ap-plications, and Services (MobiSys), pages 303–316, San Francisco, CA,USA, May 2003. USENIX Association. http://www.usenix.org/events/mobisys03/tech/balazinska.html.

[8] Christopher L. Barrett, Gabriel Istrate, V. S. Anil Kumar, Madhav V.Marathe, Shripad Thite, and Sunil Thulasidasan. “Strong Edge Coloringfor Channel Assignment in Wireless Radio Networks”. In Proceedings of theIEEE International Workshop on ”Foundation and Algorithms for WirelessNetworking (FAWN 2006), Pisa, Italy, March 2006. http://www.win.tue.nl/∼sthite/pubs/d2ec-fawn06.pdf.

11

[9] David P. Blinn, Tristan Henderson, and David Kotz. “Analysis of aWi-Fi Hotspot Network”. In Proceedings of the International Work-shop on Wireless Traffic Measurements and Modeling, pages 1–6, Seat-tle, WA, USA, June 2005. http://www.sigmobile.org/mobisys/2005/witmemo05/tech/full papers/blinn/blinn.pdf.

[10] Vladimir Brik, Arunesh Mishra, and Suman Banerjee. “Eliminating Hand-off Latencies in 802.11 WLANs Using Multiple Radios: Applications, Ex-perience, and Evaluation”. In Proceedings of the 2005 Internet Measure-ment Conference, pages 299–304, Berkeley, CA, USA, October 2005. http://www.imconf.net/imc-2005/papers/imc05efiles/brik/brik.pdf.

[11] Martin Casado, Tal Garfinkel, Weidong Cui, Vern Paxson, , and StefanSavage. “Opportunistic Measurement: Extracting Insight from SpuriousTraffic”. In Proceedings of the Fourth Workshop on Hot Topics in Networks,College Park, MD, November 2005. http://www.acm.org/sigs/sigcomm/HotNets-IV/papers/monitor 90.pdf.

[12] Claude Chaudet, Eric Fleury, Isabelle Guerin Lassous, Herve Rivan, andMarie-Emilie Voge. “Optimal positioning of active and passive monitoringdevices”. In Proceedings of CoNEXT, Toulouse, France, October 2005.ftp://ftp.inria.fr/INRIA/publication/publi-pdf/RR/RR-5273.pdf.

[13] Francisco Chinchilla, Mark Lindsey, and Maria Papadopouli. “Analysisof wireless information locality and association patterns in a campus”. InProceedings of the 23rd Annual Joint Conference of the IEEE Computerand Communications Societies (INFOCOM), pages 906–917, Hong Kong,China, March 2004. IEEE. http://www.cs.unc.edu/∼maria/infocom04.pdf.

[14] Teresa Dahlberg, Asis Nasipuri, and Craig Taylor. “Explorebots: Mo-bile Network Experimentation”. In Proceedings of the ACM SIGCOMM2005 Workshop on experimental approaches to wireless network designand analysis (E-WIND-05), Philadelphia, PA, USA, August 2005. http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-DahNas.pdf.

[15] Ian Dangerfield and David Malone. “Experimental Evaluation of 802.11eEDCA for Enhanced Voice over WLAN Performance”. In Proceedings ofthe Second Workshop on Wireless Network Measurements, Boston, MA,USA, April 2006. http://www.winmee.org/papers/02-05.pdf.

[16] Franca Delmastro, Eleonora Borgia, Marco Conti, and Enrico Gregori.“Experimental Comparison of Routing and Middleware Solutions for Mo-bile ad hoc Networks: Legacy vs. Cross-Layer Approach”. In Proceed-ings of the ACM SIGCOMM 2005 Workshop on experimental approachesto wireless network design and analysis (E-WIND-05), Philadelphia, PA,USA, August 2005. http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-DelBor.pdf.

12

[17] Udayan Deshpande, Tristan Henderson, and David Kotz. “Channel Sam-pling Strategies for Monitoring Wireless Networks”. In Proceedings of theSecond Workshop on Wireless Network Measurements, Boston, MA, USA,April 2006. IEEE Computer Society Press. http://www.cs.dartmouth.edu/∼dfk/papers/deshpande:sampling.pdf.

[18] Sebastian Felis, Juergen Quittek, and Lars Eggert. “Measurement-BasedWireless LAN Troubleshooting”. In Proceedings of the First Workshopon Wireless Network Measurements, Trentino, Italy, April 2005. http://www.winmee.org/papers/WiNMee Felis.pdf.

[19] Mirko Franceschinis, Marco Mellia, Michela Meo, and Maurizio Munafo.“Measuring TCP over WiFi: A Real Case”. In Proceedings of the FirstWorkshop on Wireless Network Measurements, Trentino, Italy, April 2005.http://www.winmee.org/papers/WiNMee Franceschinis.pdf.

[20] Gregor Gaertner and Vinny Cahill. “Understanding Link Quality in 802.11Mobile Ad Hoc Networks”. IEEE Internet Computing, 8(1):55–60, Jan-uary/February 2004. http://dsonline.computer.org/0401/f/w1spot.htm.

[21] Francisco Gonzalez, Jesus A. Perez, and Victor H. Zarate. “HAMS: Layer2 Handoff Accurate Measurement Strategy in WLANs 802.11”. In Proceed-ings of the First Workshop on Wireless Network Measurements, Trentino,Italy, April 2005. http://www.winmee.org/papers/WiNMee Gonzalez.pdf.

[22] Sumathi Gopal and Dipankar Raychaudhuri. “Experimental Evaluationof the TCP Simultaneous Send Problem in 802.11 Wireless Local AreaNetworks”. In Proceedings of the ACM SIGCOMM 2005 Workshop onexperimental approaches to wireless network design and analysis (E-WIND-05), Philadelphia, PA, USA, August 2005. http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-GopRay.pdf.

[23] Bjorn Gronvall and Ian Marsh. “Performance Evaluation of Voice Han-dovers in Real 802.11 Networks”. In Proceedings of the Second Work-shop on Wireless Network Measurements, Boston, MA, USA, April 2006.http://www.winmee.org/papers/02-04.pdf.

[24] Youngjune Gwon, James Kempf, Raghu Dendukuri, and Ravi Jain. “Ex-perimental Results on IP-layer Enhancement to Capacity of VoIPv6 overIEEE 802.11b Wireless LAN”. In Proceedings of the First Workshopon Wireless Network Measurements, Trentino, Italy, April 2005. http://www.winmee.org/papers/WiNMee Gwon.pdf.

[25] Tristan Henderson, Denise Anthony, and David Kotz. “Measuring wirelessnetwork usage with the Experience Sampling Method”. In Proceedings ofthe First Workshop on Wireless Network Measurements, Trentino, Italy,April 2005. http://www.winmee.org/papers/WiNMee Henderson.pdf.

13

[26] Tristan Henderson, David Kotz, and Ilya Abyzov. “The Changing Usageof a Mature Campus-wide Wireless Network”. In Proceedings of the TenthAnnual International Conference on Mobile Computing and Networking(MobiCom), pages 187–201, Philadelphia, PA, USA, September 2004. ACMPress. http://www.cs.dartmouth.edu/∼dfk/papers/henderson:voice.pdf.

[27] Chihfan Hsin and Mingyan Liu. “Self-monitoring of wireless sen-sor networks”. Computer Communications, 29(4):462–476, Febru-ary 20 2006. http://www.sciencedirect.com/science/article/B6TYP-4FGX42D-1/2/5b540f4d631b53aebed3fa76279a28a0.

[28] Wei-Jen Hsu and Ahmed Helmy. “On Modeling User Associations in Wire-less LAN Traces on University Campuses”. In Proceedings of the SecondWorkshop on Wireless Network Measurements, Boston, MA, USA, April2006. http://www.winmee.org/papers/01-05.pdf.

[29] Wei-Jen Hsu and Ahmed Helmy. “On Nodal Encounter Patterns in WirelessLAN Traces”. In Proceedings of the Second Workshop on Wireless NetworkMeasurements, Boston, MA, USA, April 2006. http://www.winmee.org/papers/02-03.pdf.

[30] Ron Hutchins and Ellen W. Zegura. “Measurements From a CampusWireless Network”. In Proceedings of the IEEE International Conferenceon Communications (ICC), volume 5, pages 3161–3167, New York, NY,USA, April 2002. IEEE Computer Society Press. http://www.cc.gatech.edu/computing/Telecomm/seminar/fall01/wireless.pdf. During win-ter and spring of 2001 they captured the wireless activity of the 802.11bnetwork on part of their campus, using a sniffer, SNMP polling, and recordsfrom their authentication server. The study is larger than tang:wavelan, butsmaller than kotz:campus. There is some interesting data processing here:session length is determined by authentication server data; they stitch to-gether long-lived TCP connections from the short flow data determinedby a tool with a five-minute window, flow length by protocol for the mostcommon protocols. They do look a little at roaming and seem to imply thattheir network does not support roaming (?). Similarities to my data: diur-nal patterns in number of flows, number of sessions; popularity of http, ssl,pop, ident; large number of non-mobile hosts. Differences: they have flowdata; they have inter-move times; they have single point for sniffing; theyhave authentication logs. Some limitations: no traffic quantity analysis;their flow lengths are complicated by a five-minute window for measuringflows, and no TCP SYN/FIN bit; their SNMP polling interval is 15 minutesso they do not catch most short-term mobility patterns; they do not givea detailed protocol popularity analysis (they appear to have just chosen alist of well-known protocols and analysed those);.

[31] Sushant Jadhav, Timothy Brown, Sheetalkumar Doshi, Daniel Henkel, andRoshan Thekkekunnel. “Lessons Learned Constructing A Wireless Ad Hoc

14

Network Test Bed”. In Proceedings of the First Workshop on WirelessNetwork Measurements, Trentino, Italy, April 2005. http://www.winmee.org/papers/WiNMee Jadhav.pdf.

[32] Kyle Jamieson, Bret Hull, Allen Miu, and Hari Balakrishnan. “Under-standing the Real-World Performance of Carrier Sense”. In Proceedingsof the ACM SIGCOMM 2005 Workshop on experimental approaches towireless network design and analysis (E-WIND-05), Philadelphia, PA,USA, August 2005. http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-JamHul.pdf.

[33] Amit Jardosh, Krishna Ramachandran, Kevin Almeroth, and ElizabethBelding-Royer. “Understanding Link-Layer Behavior in Highly CongestedIEEE 802.11b Wireless Networks”. In Proceedings of the ACM SIGCOMM2005 Workshop on experimental approaches to wireless network design andanalysis (E-WIND-05), Philadelphia, PA, USA, August 2005. http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-JarRam.pdf.

[34] Amit P. Jardosh, Krishna N. Ramachandran, Kevin C. Almeroth,and Elizabeth M. Belding-Royer. “Understanding Congestion in IEEE802.11b Wireless Networks”. In Proceedings of the 2005 InternetMeasurement Conference, pages 279–292, Berkeley, CA, USA, Octo-ber 2005. http://www.usenix.org/events/imc05/tech/full papers/jardosh/jardosh new.pdf.

[35] Wenyu Jiang. “Bit Error Correction Without Redundant Data: A MACLayer Technique for 802.11 Networks”. In Proceedings of the Second Work-shop on Wireless Network Measurements, Boston, MA, USA, April 2006.http://www.winmee.org/papers/03-02.pdf.

[36] Sharad Agarwal Jitendra Padhye, Venkata N. Padmanabhan, Lili Qiu,Ananth Rao, and Brian Zill. “Estimation of Link Interference in StaticMulti-hop Wireless Networks”. In Proceedings of the 2005 InternetMeasurement Conference, pages 305–310, Berkeley, CA, USA, Octo-ber 2005. http://www.usenix.org/events/imc05/tech/full papers/padhye/padhye.pdf.

[37] Glenn Judd and Peter Steenkiste. “A Simple Mechanism for Capturingand Replaying Wireless Channels”. In Proceedings of the ACM SIGCOMM2005 Workshop on experimental approaches to wireless network design andanalysis (E-WIND-05), Philadelphia, PA, USA, August 2005. http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-JudSte.pdf.

[38] Sewook Jung, Alexander Chang, and Mario Gerla. “Comparison of Blue-tooth Interconnection Methods Using BlueProbe”. In Proceedings of theSecond Workshop on Wireless Network Measurements, Boston, MA, USA,April 2006. http://www.winmee.org/papers/03-03.doc.

15

[39] Vikas Kawadia and P. R. Kumar. “Experimental Investigations into TCPPerformance over Wireless Multihop Networks”. In Proceedings of the ACMSIGCOMM 2005 Workshop on experimental approaches to wireless networkdesign and analysis (E-WIND-05), Philadelphia, PA, USA, August 2005.http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-KawKum.pdf.

[40] Minkyong Kim and David Kotz. “Modeling Users’ Mobility amongWiFi Access Points”. In Proceedings of the International Workshopon Wireless Traffic Measurements and Modeling, pages 19–24, Seat-tle, WA, USA, June 2005. http://www.sigmobile.org/mobisys/2005/witmemo05/tech/full papers/kim/kim.pdf.

[41] Ramana Rao Kompella, Narayanan Ramabhadran, Ishwar Ramani, andAlex Snoeren. “Cooperative Scheduling Via Pipelining in 802.11 WirelessNetworks”. In Proceedings of the ACM SIGCOMM 2005 Workshop onexperimental approaches to wireless network design and analysis (E-WIND-05), Philadelphia, PA, USA, August 2005. http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-KomRam.pdf.

[42] David Kotz and Kobby Essien. “Analysis of a Campus-wide Wireless Net-work”. In Proceedings of the Eighth Annual International Conference onMobile Computing and Networking (MobiCom), pages 107–118, September2002. Revised and corrected as Dartmouth CS Technical Report TR2002-432, http://www.cs.dartmouth.edu/∼dfk/papers/kotz:campus.pdf.

[43] David Kotz and Kobby Essien. “Analysis of a Campus-wide WirelessNetwork”. Wireless Networks, 11:115–133, 2005. An earlier version ap-peared in ACM MobiCom 2002, and as Dartmouth College Technical Re-port TR2002-432.

[44] Jerome Lacan and Tanguy Perennou. “Evaluation of Error Control Mech-anisms for 802.11b Multicast Transmissions”. In Proceedings of the SecondWorkshop on Wireless Network Measurements, Boston, MA, USA, April2006. http://www.winmee.org/papers/03-01.pdf.

[45] Jaehwan Lee, Sunghyun Choi, and Hanwook Jung. “Analysis of User Be-havior and Traffic Pattern in a Large-Scale 802.11a/b Network”. In Proceed-ings of the First Workshop on Wireless Network Measurements, Trentino,Italy, April 2005. http://www.winmee.org/papers/WiNMee Lee.pdf.

[46] Feng Li, Mingzhe Li, Rui Lu, Huahui Wu, Mark Claypool, and RobertKinicki. “Tools and Techniques for Measurement of IEEE 802.11 WirelessNetworks”. In Proceedings of the Second Workshop on Wireless NetworkMeasurements, Boston, MA, USA, April 2006. http://www.winmee.org/papers/02-01.pdf.

[47] Priya Mahadevan, Adolfo Rodriguez, David Becker, and Amin Vah-dat. “MobiNet: A Scalable Emulation Infrastructure for Ad hoc

16

and Wireless Networks”. In Proceedings of the International Work-shop on Wireless Traffic Measurements and Modeling, pages 7–12, Seat-tle, WA, USA, June 2005. http://www.sigmobile.org/mobisys/2005/witmemo05/tech/full papers/mahedevan/mahedevan.pdf.

[48] Ratul Mahajan, Maya Rodrig, David Wetherall, and John Zahorjan. “An-alyzing the MAC-level behavior of wireless networks in the wild”. In Pro-ceedings of SIGCOMM 2006, pages 75–86, Pisa, Italy, September 2006.http://doi.acm.org/10.1145/1151659.1159923.

[49] Marvin McNett and Geoffrey M. Voelker. “Access and Mobility of WirelessPDA Users”. Technical Report CS2004-0780, Department of ComputerScience and Engineering, University of California, San Diego, February2004. http://ramp.ucsd.edu/wtd/wtd.pdf.

[50] Arunesh Mishra, Eric Rozner, Suman Banerjee, and William Ar-baugh. “Exploiting Partially Overlapping Channels in Wireless Net-works: Turning a Peril into an Advantage”. In Proceedings ofthe 2005 Internet Measurement Conference, pages 311–316, Berke-ley, CA, USA, October 2005. % urlhttp://www.imconf.net/imc-2005/papers/imc05efiles/mishra/mishra.pdf.

[51] Arunesh Mishra, Minho Shin, and William A. Arbaugh. “AnEmpirical Analysis of the IEEE 802.11 MAC Layer Handoff Pro-cess”. ACM SIGCOMM Computer Communication Review, 33(2):93–102, April 2003. rlhttp://www.cs.umd.edu/ mhshin/paper/ACMCCR-Mishra.Shin.Arbaugh.pdf.

[52] Melody Moh. “A Prototype on RFID and Sensor Networks for ElderHealthcare”. In Proceedings of the ACM SIGCOMM 2005 Workshop on ex-perimental approaches to wireless network design and analysis (E-WIND-05), Philadelphia, PA, USA, August 2005. http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-Moh.pdf.

[53] Vinayak Naik, Emre Ertin, Hongwei Zhang, and Anish Arora. “WirelessTestbed Bonsai”. In Proceedings of the Second Workshop on Wireless Net-work Measurements, Boston, MA, USA, April 2006. http://www.winmee.org/papers/01-01.pdf.

[54] Asis Nasipuri and Ribal Najjar. “Experimental Evaluation of an AngleBased Indoor Localization System”. In Proceedings of the Second Workshopon Wireless Network Measurements, Boston, MA, USA, April 2006. http://www.winmee.org/papers/03-05.pdf.

[55] Anthony C. H. Ng, David Malone, and Douglas Leith. “Experimen-tal Evaluation of TCP Performance and Fairness in an 802.11e Test-bed”. In Proceedings of the ACM SIGCOMM 2005 Workshop on ex-perimental approaches to wireless network design and analysis (E-WIND-05), Philadelphia, PA, USA, August 2005. http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-NgMal.pdf.

17

[56] Maria Papadopouli, Haipeng Shen, and Manolis Spanakis. “Characterizingthe duration and association patterns of wireless access in a campus”. InProceedings of the 11th European Wireless Conference, Nicosia, Cyprus,April 2005.

[57] Marc Portoles-Comeras, Josep Mangues-Bafalluy, and Manuel Requena-Esteso. “Multi-Radio Based Active and Passive Wireless Network Mea-surements”. In Proceedings of the Second Workshop on Wireless NetworkMeasurements, Boston, MA, USA, April 2006. http://www.winmee.org/papers/01-03.doc.

[58] Kishore Ramachandran, Sanjit Kaul, Suhas Mathur, Marco Gruteser, andIvan Seskar. “Towards Large-Scale Mobile Network Emulation ThroughSpatial Switching on a Wireless Grid”. In Proceedings of the ACM SIG-COMM 2005 Workshop on experimental approaches to wireless networkdesign and analysis (E-WIND-05), Philadelphia, PA, USA, August 2005.http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-RamKau.pdf.

[59] Krishna Ramachandran, Kevin Almeroth, and Elizabeth Belding-Royer.“A Novel Framework for the Management of Large-scale Wireless NetworkTestbeds”. In Proceedings of the First Workshop on Wireless Network Mea-surements, Trentino, Italy, April 2005. http://www.winmee.org/papers/WiNMee Ramachandran.pdf.

[60] Joshua Robinson, Konstantina Papagiannaki, Christophe Diot, XingangGuo, and Lakshman Krishnamurthy. “Experimenting with a Multi-RadioMesh Networking Testbed”. In Proceedings of the First Workshop on Wire-less Network Measurements, Trentino, Italy, April 2005. http://www.winmee.org/papers/WiNMee Robinson.pdf.

[61] Maya Rodrig, Charles Reis, Ratul Mahajan, David Wetherall, and JohnZahorian. “Measurement-based Characterization of 802.11 in a HotspotSetting”. In Proceedings of the ACM SIGCOMM 2005 Workshop on ex-perimental approaches to wireless network design and analysis (E-WIND-05), Philadelphia, PA, USA, August 2005. http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-RodRei.pdf.

[62] David Schwab and Rick Bunt. “Characterising the Use of a Campus Wire-less Network”. In Proceedings of the 23rd Annual Joint Conference of theIEEE Computer and Communications Societies (INFOCOM), pages 862–870, Hong Kong, China, March 2004. IEEE. http://www.ieee-infocom.org/2004/Papers/18 1.PDF.

[63] Vinay Sridhara, Hwee-Chul Shin, and Stephan Bohacek. “Observations andModels of Time-Varying Channel Gain in Crowded Areas”. In Proceedingsof the Second Workshop on Wireless Network Measurements, Boston, MA,USA, April 2006. http://www.winmee.org/papers/03-04.pdf.

18

[64] Tony Sun, Guang Yang, Ling-Jyh Chen, M.Y. Sanadidi, and MarioGerla. “A Measurement Study of Path Capacity in 802.11b-basedWireless Networks”. In Proceedings of the International Workshopon Wireless Traffic Measurements and Modeling, pages 31–37, Seat-tle, WA, USA, June 2005. http://www.sigmobile.org/mobisys/2005/witmemo05/tech/full papers/sun tony/sun tony.pdf.

[65] Yuan Sun, Irfan Sheriff, Elizabeth M. Belding-Royer, and Kevin C.Almeroth. “An Experimental Study of Multimedia Traffic Performancein Mesh Networks”. In Proceedings of the International Workshopon Wireless Traffic Measurements and Modeling, pages 25–30, Seat-tle, WA, USA, June 2005. http://www.sigmobile.org/mobisys/2005/witmemo05/tech/full papers/sun yuan/sun yuan.pdf.

[66] Diane Tang and Mary Baker. “Analysis of a Local-Area Wire-less Network”. In Proceedings of the Sixth Annual Interna-tional Conference on Mobile Computing and Networking (Mobi-Com), pages 1–10, Boston, MA, USA, August 2000. ACM Press.rlhttp://www.acm.org/pubs/citations/proceedings/comm/345910/p1-tang/. They traced users in the Stanford CS WaveLAN network, andmeasured many characteristics of the traffic.

[67] John Thelen, Daan Goense, and Koen Langendoen. “Radio Wave Propa-gation in Potato Fields”. In Proceedings of the First Workshop on WirelessNetwork Measurements, Trentino, Italy, April 2005. http://www.winmee.org/papers/WiNMee Thelen.pdf.

[68] Nitin Vaidya, Jennifer Bernhard, Venugopal Veeravalli, P. R. Kumar, andRavi Iyer. “Illinois Wireless Wind Tunnel: A Testbed for ExperimentalEvaluation of Wireless Networks”. In Proceedings of the ACM SIGCOMM2005 Workshop on experimental approaches to wireless network design andanalysis (E-WIND-05), Philadelphia, PA, USA, August 2005. http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-VaiBer.pdf.

[69] S. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose, and D. Towsley.“Facilitating Access Point Selection in IEEE 802.11 Wireless Networks”.In Proceedings of the 2005 Internet Measurement Conference, pages 293–298, Berkeley, CA, USA, October 2005. http://www.usenix.org/events/imc05/tech/full papers/vasudevan/vasudevan.pdf.

[70] Kristen Woyach, Daniele Puccinelli, and Martin Haenggi. “Sensorless Sens-ing in Wireless Networks: Implementation and Measurements”. In Proceed-ings of the Second Workshop on Wireless Network Measurements, Boston,MA, USA, April 2006. http://www.winmee.org/papers/01-02.pdf.

[71] Zhibin Wu, Sachin Ganu, Ivan Seskar, and Dipankar Raychaudhuri. “Ex-perimental Investigation of PHY Layer Rate Control and Frequency Selec-tion in 802.11-based Ad-Hoc Networks”. In Proceedings of the ACM SIG-COMM 2005 Workshop on experimental approaches to wireless network

19

design and analysis (E-WIND-05), Philadelphia, PA, USA, August 2005.http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-WuGan.pdf.

[72] Sanlin Xu, Kim Blackmore, and Haley Jones. “Mobility Assessment forMANETs Requiring Persistent Links”. In Proceedings of the InternationalWorkshop on Wireless Traffic Measurements and Modeling, pages 39–44,Seattle, WA, USA, June 2005. http://www.sigmobile.org/mobisys/2005/witmemo05/tech/full papers/xu/xu.pdf.

[73] Mark Yarvis, Konstantina Papagiannaki, and W. Steven Conner. “Charac-terization of 802.11 Wireless Networks in the Home”. In Proceedings of theFirst Workshop on Wireless Network Measurements, Trentino, Italy, April2005. http://www.winmee.org/papers/WiNMee Yarvis.pdf.

[74] Jihwang Yeo, Suman Banerjee, and Ashok Agrawala. “Measuring Traffic onthe Wireless Medium: Experience and Pitfalls”. Technical Report CS-TR4421, Department of Computer Science, University of Maryland, December2002. http://www.cs.umd.edu/∼jyeo/TR.pdf.

[75] Jihwang Yeo, Moustafa Youssef, and Ashok Agrawala. “A Frameworkfor Wireless LAN Monitoring and its Applications”. In Proceedings ofthe Third ACM Workshop on Wireless Security (WiSe’04), pages 70–79,Philadelphia, PA, USA, October 2004. http://www.cs.umd.edu/∼jyeo/publications/wise.pdf.

[76] Jihwang Yeo, Moustafa Youssef, Tristan Henderson, and Ashok Agrawala.“An Accurate Technique for Measuring the Wireless Side of Wire-less Networks”. In Proceedings of the International Workshop onWireless Traffic Measurements and Modeling, pages 13–18, Seattle,WA, USA, June 2005. http://www.sigmobile.org/mobisys/2005/witmemo05/tech/full papers/yeo/yeo.pdf.

misc papers

[1] Aditya Akella, Glenn Judd, Srinivasan Seshan, and Peter Steenkiste.“Self-management in chaotic wireless deployments”. In Proceedings ofthe Eleventh Annual International Conference on Mobile Computing andNetworking, pages 185–199, Cologne, Germany, August 2005. http://doi.acm.org/10.1145/1080829.1080849.

[2] Mansoor Alicherry, Randeep Bhatia, and Li (Erran) Li. “Joint channel as-signment and routing for throughput optimization in multi-radio wirelessmesh networks”. In Proceedings of the Eleventh Annual International Con-ference on Mobile Computing and Networking, pages 58–72, Cologne, Ger-many, August 2005. http://doi.acm.org/10.1145/1080829.1080836. Idid not see this talk.

20

[3] Rudi Belotti, Corsin Decurtins, Moira C. Norrie, Beat Signer, and Ljil-jana Vukelja. “Experimental platform for mobile information systems”.In Proceedings of the Eleventh Annual International Conference on Mo-bile Computing and Networking, pages 258–269, Cologne, Germany, August2005. http://doi.acm.org/10.1145/1080829.1080856. The key scenariois mobile tourist documents using interactive paper and a special pen... theuser carries printed guides and maps, clicks on the paper and hears anaudio feedback.

[4] John Bicket, Daniel Aguayo, Sanjit Biswas, and Robert Morris. “Archi-tecture and evaluation of an unplanned 802.11b mesh network”. In Pro-ceedings of the Eleventh Annual International Conference on Mobile Com-puting and Networking, pages 31–42, Cologne, Germany, August 2005.http://doi.acm.org/10.1145/1080829.1080833. RoofNet. Award forbest student paper. I did not see this talk.

[5] Erez Biton, Danny Sade, Dan Shklarsky, Mota Zussman, and Gil Zuss-man. “Challenge: CeTV and Ca-Fi— cellular and Wi-Fi over CATV”.In Proceedings of the Eleventh Annual International Conference on MobileComputing and Networking, pages 148–155, Cologne, Germany, August2005. http://doi.acm.org/10.1145/1080829.1080845. carrying cellularand WiFi signals over a cable backbone network, to provide better cellularservice, eg, in people’s homes.

[6] Jehoshua Bruck, Jie Gao, and Anxiao (Andrew) Jiang. “MAP: medial axisbased geometric routing in sensor networks”. In Proceedings of the EleventhAnnual International Conference on Mobile Computing and Networking,pages 88–102, Cologne, Germany, August 2005. http://doi.acm.org/10.1145/1080829.1080839. I did not see this talk.

[7] Rajiv Chakravorty, Sulabh Agarwal, Suman Banerjee, and Ian Pratt.“MoB: a mobile bazaar for wide-area wireless services”. In Proceed-ings of the Eleventh Annual International Conference on Mobile Com-puting and Networking, pages 228–242, Cologne, Germany, August 2005.http://doi.acm.org/10.1145/1080829.1080854. They design a systemto encourage and enable collaborative networking and information-sharingusing an open-market approach and a reputation system. Goal is to developa mechanism to encourage collaboration through reptuation and financialincentives.

[8] Michele Garetto, Jingpu Shi, and Edward W. Knightly. “Modeling mediaaccess in embedded two-flow topologies of multi-hop wireless networks”.In Proceedings of the Eleventh Annual International Conference on MobileComputing and Networking, pages 200–214, Cologne, Germany, August2005. http://doi.acm.org/10.1145/1080829.1080851.

[9] Ravi Jain, Dan Lelescu, and Mahadevan Balakrishnan. “Model T: an em-pirical model for user registration patterns in a campus wireless LAN”.

21

In Proceedings of the Eleventh Annual International Conference on MobileComputing and Networking, pages 170–184, Cologne, Germany, August2005. http://doi.acm.org/10.1145/1080829.1080848. Focus is on theregistration patterns (eg, association to APs or registration with mobile-IPagents). Fits between empirical statistics gathered from measurements andthe theoretical models people dream up – goal is to represent abstract mo-bility patterns with a few parameters, and to be able to generate synthetictraces. They claim a succint, tunable, and constructive model in whichthere are few parameters, easily tunable, and generates real traces. Modelvalidation involves comparing a test subset of the data to synthetic tracesthat are generated from parameters derived from a training subset of thedata. They clustered APs according to inter-AP transition probabilities,and found that the cluster sizes fit a Weibull distribution. Within a cluster,the probability distribution is very skewed and they also use Weibull fits.They also have a model of the number of popular APs within a cluster,and for how long people stay within a cluster, and for how people choose anew cluster to visit. They have six metrics for comparing generated traceswith real traces. They have not yet addressed the need for joint time-spacedistributions, nor have they examinedor addressed temporal variations inthe data. Questioner pointed out that tuning the parameters could be riskybecause even with only a few parameters you could lead to strange results.

[10] Murali Kodialam and Thyaga Nandagopal. “Characterizing the capacityregion in multi-radio multi-channel wireless mesh networks”. In Proceedingsof the Eleventh Annual International Conference on Mobile Computing andNetworking, pages 73–87, Cologne, Germany, August 2005. http://doi.acm.org/10.1145/1080829.1080837. I did not see this talk.

[11] Santosh Kumar, Ten H. Lai, and Anish Arora. “Barrier coverage with wire-less sensors”. In Proceedings of the Eleventh Annual International Con-ference on Mobile Computing and Networking, pages 284–298, Cologne,Germany, August 2005. Ohio State University. http://doi.acm.org/10.1145/1080829.1080859. Specific scenario is border-monitoring with sen-sor network, though very theoretical. They identify two types of borders:rectangles (abstraction of southern US border) and circles (like a perimeterof a facility). They define ”crossing paths” to be a path that crosses fromone side (eg south) to other side (north). They define ”k barrier covered” ifevery crossing path is covered by at least k sensors and detect all crossingpaths. They note that this is a subset of k-blanket covered. Q1: given aset of sensors how to determine whether k-barrier coverage property exists.They reduce to similar known algorithms. They also note that this prop-erty cannot be globally determined. Q2: what is the minimum number ofsensors to provide k coverage, if you have full choice of location? Q3: if sen-sors deployed randomly, how many needed to achieve k coverage with highprobability? Q4: determine if k-barrier covered *with high probability*.I asked him about false positives, since his approach will also detect non-crossing paths... so can you determine whether you have sufficient coverage

22

to distinguish crossing from non-crossing paths? he had not considered it.I asked him whether, if the network is not k-barrier covered, can he tellme where I am missing coverage? No idea. Finally, it is clear that thisapproach depends critically on the assumption that all sensors have equaland circular coverage region.

[12] Pradeep Kyasanur and Nitin H. Vaidya. “Capacity of multi-channel wirelessnetworks: impact of number of channels and interfaces”. In Proceedings ofthe Eleventh Annual International Conference on Mobile Computing andNetworking, pages 43–57, Cologne, Germany, August 2005. http://doi.acm.org/10.1145/1080829.1080835. I did not see this talk.

[13] Xiang-Yang Li, Wen-Zhan Song, and Weizhao Wang. “A unified energy-efficient topology for unicast and broadcast”. In Proceedings of the EleventhAnnual International Conference on Mobile Computing and Networking,pages 1–15, Cologne, Germany, August 2005. http://doi.acm.org/10.1145/1080829.1080831. I did not see this talk.

[14] Allen Miu, Hari Balakrishnan, and Can Emre Koksal. “Improving lossresilience with multi-radio diversity in wireless networks”. In Proceedingsof the Eleventh Annual International Conference on Mobile Computing andNetworking, pages 16–30, Cologne, Germany, August 2005. http://doi.acm.org/10.1145/1080829.1080832. I did not see this talk.

[15] Mehul Motani, Vikram Srinivasan, and Pavan S. Nuggehalli. “Peo-pleNet: engineering a wireless virtual social network”. In Proceedingsof the Eleventh Annual International Conference on Mobile Computingand Networking, pages 243–257, Cologne, Germany, August 2005. http://doi.acm.org/10.1145/1080829.1080855. A peer-to-peer system forcommunicating information collected by some mobile users for matchingqueries by other mobile users. I really don’t see why this is not simplysolved by existing p2p sharing systems.

[16] Vinod Muthusamy, Milenko Petrovic, and Hans-Arno Jacobsen. “Effects ofrouting computations in content-based routing networks with mobile datasources”. In Proceedings of the Eleventh Annual International Conferenceon Mobile Computing and Networking, pages 103–116, Cologne, Germany,August 2005. http://doi.acm.org/10.1145/1080829.1080840. I did notsee this talk.

[17] Georges Nogueira, Bruno Baynat, and Pierre Eisenmann. “An analyticalmodel for the dimensioning of a GPRS/EDGE network with a capacityconstraint on a group of cells”. In Proceedings of the Eleventh Annual In-ternational Conference on Mobile Computing and Networking, pages 215–227, Cologne, Germany, August 2005. http://doi.acm.org/10.1145/1080829.1080852.

[18] Bhaskaran Raman and Kameswari Chebrolu. “Design and evaluation of anew MAC protocol for long-distance 802.11 mesh networks”. In Proceedings

23

of the Eleventh Annual International Conference on Mobile Computing andNetworking, pages 156–169, Cologne, Germany, August 2005. http://doi.acm.org/10.1145/1080829.1080847. The propose a two-phase (2P)protocol for MAC in a mesh network, where nodes alternate between asending phase and a receivign phase... the network nodes self-synchronizeand self-color so that it’s clear which link shuold be in which state at whichtime.

[19] Ram Ramanathan. “Challenges: a radically new architecture for next gen-eration mobile ad hoc networks”. In Proceedings of the Eleventh AnnualInternational Conference on Mobile Computing and Networking, pages 132–139, Cologne, Germany, August 2005. http://doi.acm.org/10.1145/1080829.1080843. Interesting idea to add physical-layer relay to MANET,rather than using store-and-forward... each node pipelines packets throughfrom input to output rather than doing routing at IP layer. Full mechanismrequires a hybrid of course. Needs three or four channels and at least tworadios per node. They propose to use software radios. Have a new DARPAgrant. New network layering includes physical relay layer, path access con-trol layer, and transport layer, replacing the traditional four: physical,medium access control, routing, and transport layer. They also use coop-eration among neighboring nodes to relay the same content simultaneouslyand thus generate coherent, stronger signal.

[20] Jamie Van Randwyk, Dimitry Averin, Ryan P. Custer, Jason Franklin,Franklin Hemingway, Dominique Kilman, Erik J. Lee, Mark Lodato, Da-mon McCoy, Kristen Pelon, Amanda Stephano, Parisa Tabriz, and Eric D.Thomas. “Intrusion Detection and Monitoring for Wireless Networks”.Technical Report SAND2005-7408, Sandia National Laboratories, Novem-ber 2005. http://infoserve.sandia.gov/sand doc/2005/057408.pdf.This report actually includes several other papers inside it, includingthomas:loc-auth.

[21] Yi Shi, Y. Thomas Hou, Hanif D. Sherali, and Scott F. Midkiff. “Cross-layer optimization for routing data traffic in UWB-based sensor networks”.In Proceedings of the Eleventh Annual International Conference on MobileComputing and Networking, pages 299–312, Cologne, Germany, August2005. http://doi.acm.org/10.1145/1080829.1080860.

[22] The SAFECOM Program - Department of Homeland Security. “Statementof Requirements for Public Safety Wireless Communications & Interop-erability (Version 1.1)”, January 2006. http://www.safecomprogram.gov/NR/rdonlyres/7F0D3C08-A425-4E78-9CF8-7D03724BFAFF/0/SoRv11022206.pdf.

[23] Wei Wang, Vikram Srinivasan, and Kee-Chaing Chua. “Using mobile relaysto prolong the lifetime of wireless sensor networks”. In Proceedings ofthe Eleventh Annual International Conference on Mobile Computing andNetworking, pages 270–283, Cologne, Germany, August 2005. http://

24

doi.acm.org/10.1145/1080829.1080858. With resource-rich (unlimitedpower) mobile relay nodes they can dramtically extend network lifetime,Controlled mobility is important for best allocation of resources. Currentlytheir scheme is centralized – they need distributed routing and mobilityalgorithms. They also need to develop ideas for collaboration of multiplerelays.

[24] Sheng Zhong, Li (Erran) Li, Yanbin Grace Liu, and Yang (Richard) Yang.“On designing incentive-compatible routing and forwarding protocols inwireless ad-hoc networks: an integrated approach using game theoreticaland cryptographic techniques”. In Proceedings of the Eleventh Annual In-ternational Conference on Mobile Computing and Networking, pages 117–131, Cologne, Germany, August 2005. http://doi.acm.org/10.1145/1080829.1080841. I did not see this talk.

[25] Yujie Zhu and Raghupathy Sivakumar. “Challenges: communicationthrough silence in wireless sensor networks”. In Proceedings of the EleventhAnnual International Conference on Mobile Computing and Networking,pages 140–147, Cologne, Germany, August 2005. http://doi.acm.org/10.1145/1080829.1080844. Very interesting idea – rather than commu-nicating a value by encoding and transmitting it, simply transmit a startsignal, wait for receiver to count to the desired value, then transmit a stopsignal. The details get more complicated, but this results in a significantenergy savings at the expense of a significant drop in throughput.

qos papers

[1] Albert Banchs, Arturo Azcorra, Carlos Garcıa, and Ruben Cuevas. “Ap-plications and Challenges of the 802.11e EDCA Mechanism: An Exper-imental Study”. IEEE Network, 19(4):52–58, July/August 2005. http://www.it.uc3m.es/cgarcia/articulos/IEEEnetwork jul05.pdf.

[2] D. J. Leith and P. Clifford. “Using the 802.11e EDCF to Achieve TCPUpload Fairness over WLAN Links”. In Proceedings of WiOpt 2005, Rivadel Garda, Italy, April 2005. http://www.hamilton.ie/publications/wiopt05-tcp.pdf.

[3] D. J. Leith, P. Clifford, and A. Ng. “TCP Fairness in 802.11e WLANs”.IEEE Communications Letters, 2005. To appear, http://www.hamilton.ie/net/commsletters tcp.pdf.

[4] Anthony C. H. Ng, David Malone, and Douglas Leith. “Experimental Evalu-ation of TCP Performance and Fairness in an 802.11e Test-bed”. In Proceed-ings of the ACM SIGCOMM 2005 Workshop on experimental approachesto wireless network design and analysis (E-WIND-05), Philadelphia, PA,USA, August 2005. http://www.acm.org/sigs/sigcomm/sigcomm2005/paper-NgMal.pdf.

25

[5] Qiang Ni and Thierry Turletti. “QoS Support for IEEE 802.11 Wire-less LAN”. In Wireless LANs and Bluetooth. Nova Science Publishers,New York, NY, USA, 2005. http://www-sop.inria.fr/planete/qni/802.11QoS qni.pdf.

voip papers

[1] Salman A. Baset and Henning Schulzrinne. “An Analysis of the SkypePeer-to-Peer Internet Telephony Protocol”. Technical Report CUCS-039-04, Columbia University, September 2004. http://www.cs.columbia.edu/∼library/TR-repository/reports/reports-2004/cucs-039-04.pdf.

[2] Vladimir Brik, Arunesh Mishra, and Suman Banerjee. “Eliminating Hand-off Latencies in 802.11 WLANs Using Multiple Radios: Applications, Ex-perience, and Evaluation”. In Proceedings of the 2005 Internet Measure-ment Conference, pages 299–304, Berkeley, CA, USA, October 2005. http://www.imconf.net/imc-2005/papers/imc05efiles/brik/brik.pdf.

[3] Ram Dantu and Prakash Kolan. “Detecting Spam in VoIP Networks”. InProceedings of the Steps to Reducing Unwanted Traffic on the Internet Work-shop, pages 31–37, Cambridge, MA, July 2005. http://www.usenix.org/events/sruti05/tech/dantu.html.

[4] Voice over IP Security Alliance. “VoIP Security and Privacy Threat Tax-onomy”, October 2005. http://www.voipsa.org/Activities/taxonomy.php. [dfk] Section 8 is most useful, covering intentional disruption or denialof service.

[5] T.J. Walsh and D.R. Kuhn. “Challenges in securing voice over IP”. IEEESecurity and Privacy, 3(3):44–49, May 2005. http://ieeexplore.ieee.org/iel5/8013/31002/01439501.pdf.

26