메뉴 건너뛰기




Volumn 10, Issue 3, 2005, Pages 265-274

Wireless hotspots: Current challenges and future directions

Author keywords

Deployment; Performance

Indexed keywords

DEPLOYENT; INTERNET APPLICATIONS; INTERNET SERVICE PROVIDERS (ISP);

EID: 23944457406     PISSN: 1383469X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11036-005-6421-5     Document Type: Article
Times cited : (30)

References (59)
  • 1
    • 33645438084 scopus 로고    scopus 로고
    • IEEE 802.1X pre-authentication
    • July
    • B. Aboba, IEEE 802.1X pre-authentication, Presentation to 802.11 WGi (July 2002).
    • (2002) 802.11 WGi
    • Aboba, B.1
  • 6
    • 84860981885 scopus 로고    scopus 로고
    • Aruba Networks. www.arubanetworks.com.
  • 8
    • 0034845152 scopus 로고    scopus 로고
    • Secure wireless internet access in public places
    • June
    • P. Bahl, A. Balachandran and S. Venkatachary, Secure wireless internet access in public places, in: Proc. IEEE ICC'01 (June 2001) pp. 3271-3275.
    • (2001) Proc. IEEE ICC'01 , pp. 3271-3275
    • Bahl, P.1    Balachandran, A.2    Venkatachary, S.3
  • 9
    • 0033872896 scopus 로고    scopus 로고
    • RADAR: An in-building RF-based user location and tracking system
    • April
    • P. Bahl and V. N. Padmanabhan, RADAR: An in-building RF-based user location and tracking system, in: Proc. IEEE INFOCOM'00 (April 2000).
    • (2000) Proc. IEEE INFOCOM'00
    • Bahl, P.1    Padmanabhan, V.N.2
  • 10
    • 1642270095 scopus 로고    scopus 로고
    • MultiNet: Connecting to Multiple IEEE 802.11 networks using a single wireless card
    • Microsoft Research (July)
    • V. Bahl, P. Bahl and R. Chandra, MultiNet: Connecting to Multiple IEEE 802.11 networks using a single wireless card, Technical Report MSR-TR-2003-46, Microsoft Research (July 2003).
    • (2003) Technical Report , vol.MSR-TR-2003-46
    • Bahl, V.1    Bahl, P.2    Chandra, R.3
  • 12
    • 0036041531 scopus 로고    scopus 로고
    • Characterizing user behavior and network performance in a public wireless lan
    • June
    • A. Balachandran, G.M. Voelker, P. Bahl and P.V. Rangan, Characterizing user behavior and network performance in a public wireless lan, in : Proc. ACM SIGMETRICS'02 (June 2002) pp. 195-205.
    • (2002) Proc. ACM SIGMETRICS'02 , pp. 195-205
    • Balachandran, A.1    Voelker, G.M.2    Bahl, P.3    Rangan, P.V.4
  • 13
    • 84976582475 scopus 로고    scopus 로고
    • Characterizing mobility and network usage in a corporate wireless local-area network
    • May
    • M. Balazinska and P. Castro, Characterizing mobility and network usage in a corporate wireless local-area network, in: Proc. MobiSys'03, (May 2003) pp. 303-316.
    • (2003) Proc. MobiSys'03 , pp. 303-316
    • Balazinska, M.1    Castro, P.2
  • 14
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions
    • Aug.
    • J. Bellardo and S. Savage, 802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions, in: Proc. USENIX Security Symposium, (Aug. 2003).
    • (2003) Proc. USENIX Security Symposium
    • Bellardo, J.1    Savage, S.2
  • 18
    • 1642351303 scopus 로고    scopus 로고
    • An overview of smart card security
    • Aug.
    • S.-C. Chan, An overview of smart card security, White Paper (Aug. 1997).
    • (1997) White Paper
    • Chan, S.-C.1
  • 19
    • 84860981891 scopus 로고    scopus 로고
    • Cometa Networks, www.cometanetworks.com.
  • 24
    • 0036983673 scopus 로고    scopus 로고
    • Cellular access control and charging for mobile operator wireless local area networks
    • H. Haverinen, J. Mikkonen and T. Takamki, Cellular access control and charging for mobile operator wireless local area networks, in: IEEE Wireless Communications 9(6) (2002).
    • (2002) IEEE Wireless Communications , vol.9 , Issue.6
    • Haverinen, H.1    Mikkonen, J.2    Takamki, T.3
  • 26
    • 1642362694 scopus 로고    scopus 로고
    • Wi-Fi, wherefore art thou?
    • April
    • G. Hyman. Wi-Fi, Wherefore Art Thou? Wireless Online (April 2002).
    • (2002) Wireless Online
    • Hyman, G.1
  • 28
    • 84860984569 scopus 로고    scopus 로고
    • P802.11 May
    • IEEE, P802.11 http://grouper.ieee.org/groups/802/11 (May 2000).
    • (2000)
  • 31
    • 0036953761 scopus 로고    scopus 로고
    • A power control mac protocol for ad hoc networks
    • Sept.
    • E.-S. Jung and N. Vaidya, A power control mac protocol for ad hoc networks, in: Proc. ACM MobiCom'02 (Sept. 2002).
    • (2002) Proc. ACM MobiCom'02
    • Jung, E.-S.1    Vaidya, N.2
  • 32
    • 0036957872 scopus 로고    scopus 로고
    • Characterizing usage of a campus-wide wireless network
    • March
    • D. Kotz and K. Essien, Characterizing usage of a campus-wide wireless network, in: Proc. ACM MobiCom'02, (March 2002) pp. 107-118.
    • (2002) Proc. ACM MobiCom'02 , pp. 107-118
    • Kotz, D.1    Essien, K.2
  • 33
    • 0036374224 scopus 로고    scopus 로고
    • The effect of first-hop wireless bandwidth allocation on end-to-end network performance
    • May
    • L. Qiu, P. Bahl and A. Adya, The effect of first-hop wireless bandwidth allocation on end-to-end network performance, in: Proc. NOSSDAV'02 (May 2002).
    • (2002) Proc. NOSSDAV'02
    • Qiu, L.1    Bahl, P.2    Adya, A.3
  • 34
    • 0000205494 scopus 로고    scopus 로고
    • The design and implementation of HomeRF: A radio-frequency wireless networking standard for the connected home
    • Nov.
    • J. Lansford and P. Bahl. The design and implementation of HomeRF: A radio-frequency wireless networking standard for the connected home, in: Proceedings of the IEEE (Nov. 2000).
    • (2000) Proceedings of the IEEE
    • Lansford, J.1    Bahl, P.2
  • 35
    • 0030609299 scopus 로고    scopus 로고
    • Fair scheduling in wireless packet networks
    • Aug.
    • S. Lu, V. Bhargavan and R. Srikant, Fair scheduling in wireless packet networks, in: Proc. ACM Sigcomm'97 (Aug. 1997) pp. 63-74.
    • (1997) Proc. ACM Sigcomm'97 , pp. 63-74
    • Lu, S.1    Bhargavan, V.2    Srikant, R.3
  • 37
    • 0013046241 scopus 로고    scopus 로고
    • An initial security analysis of the IEEE 802.1x standard
    • University of Maryland (Feb.)
    • A. Mishra and W. A. Arbaugh, An initial security analysis of the IEEE 802.1x standard, technical report CS-TR-4328, University of Maryland (Feb. 2002).
    • (2002) Technical Report , vol.CS-TR-4328
    • Mishra, A.1    Arbaugh, W.A.2
  • 38
    • 84860978524 scopus 로고    scopus 로고
    • Mobilian, http://www.mobilian.com.
  • 39
    • 1642344850 scopus 로고    scopus 로고
    • A one-time password system
    • May
    • N. Haller and C. Metz, A one-time password system, IETF RFC 1938 (May 1996).
    • (1996) IETF RFC , vol.1938
    • Haller, N.1    Metz, C.2
  • 40
    • 1642408078 scopus 로고
    • Netbar-Carnegie Mellon's solution to authenticated access for mobile machines
    • August
    • E.A. Napjus, Netbar-Carnegie Mellon's solution to authenticated access for mobile machines, White Paper (August 1989).
    • (1989) White Paper
    • Napjus, E.A.1
  • 41
    • 0033280768 scopus 로고    scopus 로고
    • New high-rate wireless LAN standards
    • R.V. Nee, New high-rate wireless LAN standards, IEEE Communications Magazine (1999) 82-88.
    • (1999) IEEE Communications Magazine , pp. 82-88
    • Nee, R.V.1
  • 42
    • 0031673294 scopus 로고    scopus 로고
    • Packet fair queuing algorithms for wireless networks with location-dependent errors
    • March
    • E. Ng, I. Stoica and H. Zhang, Packet fair queuing algorithms for wireless networks with location-dependent errors, in: Proc. IEEE Infocom'98 (March 1998).
    • (1998) Proc. IEEE Infocom'98
    • Ng, E.1    Stoica, I.2    Zhang, H.3
  • 43
  • 45
    • 0003312487 scopus 로고    scopus 로고
    • Remote authentication dial-in user service (RADIUS)
    • April
    • C. Rigney, A.C. Rubens, W.A. Simpson and S. Willens, Remote authentication dial-in user service (RADIUS), IETF RFC 2138 (April 1997).
    • (1997) IETF RFC , vol.2138
    • Rigney, C.1    Rubens, A.C.2    Simpson, W.A.3    Willens, S.4
  • 49
    • 84860984570 scopus 로고    scopus 로고
    • Seattle Wireless, www.seattlewireless.com.
  • 51
    • 84860989529 scopus 로고    scopus 로고
    • T-Mobile, www.tmobile.com.
  • 52
    • 84860984567 scopus 로고    scopus 로고
    • July
    • TOGEWAnet AG, http://www.togewanet.com (July 2002).
    • (2002)
  • 53
    • 84860978523 scopus 로고    scopus 로고
    • Vivato Systems, www.vivato.net.
  • 54
    • 0004104571 scopus 로고    scopus 로고
    • Unsafe at any key size: An analysis of the wep encapsulation
    • IEEE 802.11 Committee (March)
    • J. Walker, Unsafe at any key size: An analysis of the wep encapsulation, Technical Report 036288E, IEEE 802.11 Committee (March 2000).
    • (2000) Technical Report 036288E
    • Walker, J.1
  • 58
    • 0003538156 scopus 로고    scopus 로고
    • Authenticating aperiodic connections to the campus network
    • U. C. Berkeley (June)
    • D.L. Wasley, Authenticating aperiodic connections to the campus network, Technical Report WPR005, U. C. Berkeley (June 1996).
    • (1996) Technical Report , vol.WPR005
    • Wasley, D.L.1
  • 59
    • 84860984568 scopus 로고    scopus 로고
    • Wayport, www.wayport.net.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.