ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing
|
|
|
- Jean Stevens
- 10 years ago
- Views:
Transcription
1 ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing Jun Rekimoto, Takashi Miyaki, and Michimune Kohno Interaction Laboratory, Sony Computer Science Laboratories, Inc Higashigotanda, Shinagawa-ku, Tokyo Japan Abstract. This paper describes a method for establishing ad hoc and infrastructuremode wireless network connections based on physical proximity. Users can easily establish secure wireless connections between two digital devices by putting them in close proximity to each other and pressing the connection button. The devices identify each other by measuring each other s signal strength. We designed a set of protocols to support secure connections between digital devices by using a proximity communication mode to exchange session keys. We also introduce a dummy point that is analogous to a wireless access point but handles proximity-mode communication. The dummy point represents physical locations of digital devices and supports context-sensitive network communications. 1 Introduction Digital appliances based on wireless networks are becoming increasingly popular, and the operation of such appliances differs from the operation of conventional devices based on wired networks. Users of wireless appliances frequently change network connections depending on their needs and typically should be able to perform the following operations: exchange digital pictures between two digital cameras by dynamically creating an ad hoc wireless connection between the two cameras. They should be able to see the screens of both devices to interactively decide which pictures to copy from one device to the other. They also need to transmit files securely so unauthorized users cannot intercept their files. connect a digital device to the Internet in a public place in order to share files with other users. This file sharing should be protected from other users at the same hotspot. use wireless mobile game devices to dynamically establish ad hoc wireless connections in order to play games on the network. dynamically connect a PDA to a projector (for example, during presentations) without knowing the IP address and login password of the projector. upload pictures from a cellular phone to a public wall display. To do these things, users must be able to establish and change network connections quickly. We therefore need to (1) develop a method to identify target devices Users should be able to identify devices they want to connect to without explicitly specifying them by IP addresses or other symbolic references.
2 (2) provide communication security Established wireless connections must be secure in the sense that users should be able to connect to the correct devices and that communication on these connections should be protected to prevent the interception of files by a third party. While traditional networking largely relies on specifying destination devices by (IP) addresses and using passwords for authentication, the management of nearby wireless devices can be based on the physical relationship between them. The establishment of network connections, for example, can be based on the proximity of devices. Devices can also be connected via a wireless connection by pointing to a target device (e.g., a TV set) with a mobile device (e.g., a PDA). In both cases, once a wireless connection has been established, device location is no longer restricted (i.e., the devices do not have to remain in proximity and the user does not need to keep pointing at the target device). The sensors and user operations required in some previously developed systems based on this idea are outlined in Figure 1 [7, 6]. These systems establish wireless connections by using communication devices with a limited range, such as an RFID tag/reader, or directional communication methods such as infrared beaming. These devices and methods, however, are not always suitable for all mobile devices. In this paper we describe a simpler method that uses standard wireless cards and establishes wireless connections by measuring the signal strength of received packets. Sensor Type User Operation Required Sensors / Devices RFID[7] put devices in proximity RFID tag / reader Infrared[7] pointing to device A with device B infrared transmitter-receiver SyncTap[6] Synchronous user operations buttons etc. (e.g., synchronized pressing and releasing of buttons) Fig. 1. User operations and sensors for establishing wireless connections between devices. 2 ProxNet: establishing wireless connections based on proximity Proximity mode mutually checks signal strength Normal wireless mode no location restriction secure communication Fig. 2. Establishing a wireless connection by measuring the signal strength Figure 2 shows the idea behind our proposed method. Unlike other location-sensing methods based on wireless signal strength [1], our method determines only the relative distance between devices. The proximity of two devices can be determined because the strength of a signal one receives from the other is inversely proportional of the square of the distance between them.
3 Our method has two communication modes: a proximity mode in which both devices check the signal strength of incoming wireless packets, and a normal wireless mode. When users want to establish a network connection between two wireless devices, they put these devices close to each other and press the connection button on one of these devices. The first device then transmits a wireless packet containing the initiator s address and a dynamically generated public key. The second device receives this packet, and it acknowledges receipt of the packet only when the signal strength of this packet is greater than a predefined threshold. The acknowledging packet contains the responder s address and a one-time session key that will be used to establish a wireless connection. Because this acknowledging packet is encrypted by the public key sent from the first device, only the first device can access the information in it. The first device then checks the signal strength of the acknowledging packet and establishes a normal wireless connection if it is greater than the threshold.. We implemented this method by using an Intersil PRISM b wireless chip with our modified version of the Host AP Linux wireless driver [4]. The Host AP device driver supports a monitor mode that allows applications to monitor wireless packets transmitted by other devices. This mode also supports the monitoring of signal and noise levels (RSSI information) on each packet. While the original monitor mode is receive-only and does not support packet transmission, our modified driver allows the monitor mode to both receive and transmit packets. This modified driver makes it possible for devices listen to transmissions from other devices, recognize connection requests, check signal strength, and then use the normal wireless mode. Because this device driver modification does not require any hardware changes, it can potentially be used with a variety of wireless devices without requiring special hardware or sensors. It should also be possible to apply this method to wireless networks other than , such as Bluetooth. 3 Communication Protocols The actual protocols are shown in Figure 3. There are two modes for establishing network connections: the ad hoc mode, in which the devices establish wireless connections themselves, and the infrastructure mode, in which the devices communicate through an access point. Ad hoc Mode To establish an ad hoc mode wireless connection, two devices must share the same network identifier (e.g., ESSID) and a session key (e.g., WEP key). This information is exchanged in the proximity mode (Figure 3-a). In this mode, the signal strength of the received packets is measured on both sides. Once the information needed for establishing an ad hoc connection has been exchanged, the two devices start normal wireless communication. The WEP key and ESSID are dynamically generated for each session, and users do not need to manually enter them. Infrastructure Mode and the Dummy point An operation similar to the one in the ad hoc mode could be used in the infrastructure mode: users could put mobile devices close to an access point and exchange the necessary information. This operation is not always practical, however, because access points are often located in physically inaccessible places (e.g., near the ceiling).
4 User Presses the Connect button generate public key Pk and private key Sk. Signal strength check decrypt Ze by Sk, get SSID, WEP,IP1, IP2 start an ad-hoc mode connection with SSID and WEP. request Pk Proximity mode reply Ze probe req + SSID Normal wireless mode Signal strength check Generate SSID, WEP as onetime session key. Assign IP addresses (IP1, IP2) Ze = encrypt(pk, z) where z = SSID, WEP, IP1, IP2 accept connection request. move onto the normal wireless mode. User Presses the Connect button generate public key Pk and private key Sk. signal strength check decrypt Ze by Sk, get SSID, WEP DPID connect to the access point with SSID & WEP client request Pk Proximity mode reply Ze Normal mode dummy point access point signal strength check get SSID and WEP of the access point. DPID is the identifier for the dummy point. Ze = encrypt(pk, z) where z = SSID, WEP, DPID (a) ad hoc mode (b) infrastructure mode Fig. 3. ProxNet protocols for ad hoc and infrastructure-mode wireless connections. Fig. 4. Dummy point examples: (left: dummy-point modules based on a single board Linux. right: a handheld dummy point) We therefore introduce a dummy point, which is a wireless device that supports only proximity-based communication. For example, a dummy point can be placed on a meeting table to enable users to connect their mobile devices (e.g., wireless notebook PCs) to the access point in that room. Users do that by putting their mobile devices close to the dummy point, and the dummy point responds to the request packets from the mobile devices by sending information needed to establish an infrastructure-mode wireless connection (e.g., the ESSID and the WEP key for the access point). Then the mobile devices connect to the access point (Figure 3-b). The physical form of the dummy point can vary, and a hand-held dummy point (Figure 4, right) can be used. At an Internet cafe, for example, a manager can put a dummy point like this close to a notebook PC in order to invite it into the cafe s wireless environment. The dummy point can also support context-sensitive communication. We can place more than one dummy point in any environment, and each dummy point can represent a location or a corresponding object. When a user starts a wireless connection by using a dummy point placed next to a printer, for example, the default output device would be automatically set to that printer. Similarly, a wall-sized public display can have a corresponding dummy point. People can upload data by establishing a wireless connection with the corresponding dummy point.
5 4 Applications Fig. 5. Applications of ProxNet networking. Sharing files by using an ad hoc wireless connection (Figure 5, left) Two mobile devices start an ad hoc- mode network connection and exchange files. Users first establish a connection by putting two devices close to each other and pressing the connection button on one of them. Once the connection has been established, users do not need to stay close to each other. By sharing the screens of their devices, users can interactively decide which files to transmit. This cannot be done in file transmission using physical media such as memory cards. Setting up a network game session (Figure 5, middle) A network game can be set up by putting two devices close to each other. Users can also create connections dynamically during a game session. For example, a user can start a game in a single-user mode but then share this game with other players on the network. Transferring information between mobile devices and public wall displays (Figure 5, right) People working in the same office can share information by uploading it to a public wall-mounted display. They approach this display and put their mobile devices close to the dummy point attached to it. Then they can upload digital picture files onto the public display or get files from the display. Similarly, users making a presentation can display presentation materials from a mobile device by first approaching a dummy point placed near the presentation screen. This method can also be used with digital devices without user interfaces. A file server or a network router, for example, can be controlled from mobile devices in this way. 5 Related Work Pick-and-Drop [5] and mediablocks [10] are systems using physical manipulation to support digital data transfer among various devices. While these systems were designed primarily for one-shot data transfer using physical objects, our method supports continuous wireless network connections between devices. Our method also supports secure communication. Several other systems use range-limited communication channels, such as those provided by infrared beaming or used by radio-frequency identification (RFID) tag reader/writes, for associating wireless devices [9, 7, 8]. Our method uses wireless communication in two ways one is for normal wireless communication and the other is for sensing signal strength (i.e., for measuring a range).
6 The measuring of signal strength has been used for network security management in various applications, such as wireless keys for automobiles or login keys for computers. In these applications, however, only the signal strength of the key is measured. Our method supports a two-way measuring of signal strength for better security. Another way to recognize spontaneous device associations is by using synchronicity [3, 6, 2]. For example, if two devices were tied together and moved together, the movements of both devices would be quite similar. Devices with acceleration sensors would be able to exchange acceleration information to find matching devices [3]. Similarly, if a user performs synchronized inputs, such as pressing buttons on two devices, this information can be used for finding device pairs [6]. These synchronicity approaches and our proximity-sensing approach are complementary and can be used in combination. For example, the selection of candidate devices to be associated can first be based on signal strength, and then an actual pair can be determined by synchronicity. 6 Conclusion We developed a method for establishing secure wireless connections between mobile devices by measuring the strength of signals between them. The method supports ad hoc and infrastructure modes, and the same operations can be performed in both modes. This method uses normal wireless chipsets without additional hardware and is applicable to a wide range of wireless devices. References 1. P. Bahl and V. Padmanabhan. RADAR: An In-Building RFBasedUser Location and Tracking System. In IEEE Computer and Communications Societies (INFOCOM 2000), pp , Ken Hinckley. Synchronous gestures for multiple users and computers. In ACM User Interface Software and Technologies (UIST 2003), pp , L. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H. Gellersen. Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. In Ubicomp 2001, pp Springer-Verlag, Jouni Malinen. Host ap driver for intersil prism2/2.5/ Jun Rekimoto. Pick-and-Drop: A Direct Manipulation Technique for Multiple Computer Environments. In Proceedings of UIST 97, pp , October Jun Rekimoto. Synctap: An interaction technique for mobile networking. In Proc. of MO- BILE HCI 2003, Jun Rekimoto, Yuji Ayatsuka, Michimune Kohno, and Haruo Oba. Proximal Interactions : A direct manipulation technique for wireless networking. In Proc. of INTERACT 2003, Colin Swindells, Kori M. Inkpen, John C. Dill, and Melanie Tory. That one there! pointing to establish device identity. In Symposium on User Interface Software and Technology (UIST 02), pp , Peter Tandler, Thorsten Prante, Christian Muller-Tomfelde, Norbert Streitz, and Ralf Steinmetz. Connectables: dynamic coupling of displays for the flexible creation of shared workspaces. In Proceedings of the 14th annual ACM symposium on User interface software and technology (UIST 2001), pp , Brygg Ullmer, Hiroshi Ishii, and Dylan Glas. mediablocks: Physical containers, transports, and controls for online media. In SIGGRAPH 98 Proceedings, pp , 1998.
SyncTap: An Interaction Technique for Mobile Networking
SyncTap: An Interaction Technique for Mobile Networking Jun Rekimoto, Yuji Ayatsuka, and Michimune Kohno Interaction Laboratory, Sony Computer Science Laboratories, Inc. 3-14-13 Higashigotanda, Shinagawa-ku,
InfoPoint: A Device that Provides a Uniform User Interface to Allow Appliances to Work Together over a Network
InfoPoint: A Device that Provides a Uniform User Interface to Allow Appliances to Work Together over a Network Naohiko Kohtake 1, Jun Rekimoto 2 and Yuichiro Anzai 1 1 Department of Computer Science, Keio
Wireless Security: Secure and Public Networks Kory Kirk
Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Sparsh (Touch the cloud)
Sparsh (Touch the cloud) Happy 1, Pragti 2, Dr. Niranjan Bhattacharyya 3 1 B.Tech Student of Computer Science & Engineering, Bhagwan Parshuram Institute of Technology, GGSIPU, Delhi, India, 2 B.Tech Student
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
Chapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
IEEE 802.11b WLAN PC Card
IEEE 802.11b WLAN PC Card User s Guide Version: 1.3 August 2001 Please install the Utility/Driver first before inserting the PCMCIA Card. FCC Class B Radio Frequency Interference Statement The manufacturer
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
Discovering Computers 2008. Chapter 9 Communications and Networks
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
Wireless 802.11g CF Card User Manual
Wireless 802.11g CF Card User Manual Version 1.0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether electronic,
Networking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples
Networking General networking Networking overview A network is a collection of devices such as computers, printers, Ethernet hubs, wireless access points, and routers connected together for communication
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
Wireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2007, 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 2.0
54M/150M/300Mbps USB WIRELESS ADAPTER User s Manual Version 2.0 1. Introduction User s Manual Thank you for purchasing the IEEE 802.11b/g or 802.11n. This Wireless Adapter is easy to use and easy to setup.
54M/150M/300Mbps USB WIRELESS ADAPTER. User s Manual Version 1.8
54M/150M/300Mbps USB WIRELESS ADAPTER User s Manual Version 1.8 Introduction User s Manual Thank you for purchasing the IEEE 802.11b/g or 802.11n. This Wireless Adapter is easy to use and easy to setup.
CONNECTING THE RASPBERRY PI TO A NETWORK
CLASSROOM CHALLENGE CONNECTING THE RASPBERRY PI TO A NETWORK In this lesson you will learn how to connect the Raspberry Pi computer to a network with both a wired and a wireless connection. To complete
AXIS 207W Network Camera Technical Information
A few things that should help you get the AXIS 207W connected to your network. It s not always easy to install new products on your network and this document describes some of the things you may need to
Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser
Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser 1 Karan Sandeep Bhandari, 2 Vishnu Baliram Mandole, 3 Akash Dattatray Munde, 4 Sachin B. Takmare Bharati Vidyapeeth
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
NWA1120 Series. User s Guide. Quick Start Guide. Wireless LAN Ceiling Mountable PoE Access Point. Default Login Details
NWA1120 Series Wireless LAN Ceiling Mountable PoE Access Point Version 1.00 Edition 1, 08/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com
Configuring the WT-4 for ftp (Ad-hoc Mode)
En Configuring the WT-4 for ftp (Ad-hoc Mode) Mac OS X Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Mac OS X (10.5.2) ftp server for transmission
PCMCIA Wireless LAN Card User s Manual
PCMCIA Wireless LAN Card User s Manual Rev 1.0 Regulatory compliance FCC Warning This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
Wireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
Wireless Router Quick Start Guide Rev. 1.0a Model: WR300NQ
Wireless Router Quick Start Guide Rev. 1.0a Model: WR300NQ 1 Step One: Hardware Connection 1. If you have xdsl Broadband internet access, connect your hardware as shown in the following diagram: 2. If
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys
Go Wireless. Open up new possibilities for work and play
Go Wireless Open up new possibilities for work and play Start with 3 pieces A typical home or small-office wireless LAN requires only 3 pieces of hardware. With these 3 pieces, you re ready to get started!
1) No configuration is necessary in ZDMC nor in RescueNet Field Data Configuration.
The intent of this document is to provide the reader with the following information pertaining to uploading case files from the X Series to TabletPCR and: General Safety Tips regarding the setup and uploading
D-Link DAP-1360 Repeater Mode Configuration
D-Link DAP-1360 Repeater Mode Configuration Outline 1. Package Contents 2. System Requirements 3. Hardware Overview Connections LED s WPS LED/Button 4. Default Settings 5. Configuring your LAN Adapter
Bluetooth wireless technology basics
Bluetooth wireless technology basics Abstract... 2 Introduction... 2 How Bluetooth wireless technology works... 3 BWT network topologies... 4 BWT security... 5 Establishing BWT connections... 6 Activating
LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM
LP-348 LP-Yagy2415 LP-1518 LP-5P LP-510G/550G 54M Wireless Adapter PCMCIA/PCI User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a
COPY EOS 70D (W) Wi-Fi Function Instruction Manual INSTRUCTION MANUAL
EOS 70D (W) Wi-Fi Function Instruction Manual E INSTRUCTION MANUAL What You Can Do Using the Wireless LAN Functions This camera s wireless LAN functions let you perform a range of tasks wirelessly, from
Configuring connection settings
Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90
Configuring the USB Wireless Adapter with GXV3140
Configuring the USB Wireless Adapter with GXV3140 1.1 How to Enable Wifi Features 1.1.1 Configuring using the web configuration interface Type the IP address of the GXV3140 (as shown on the phone LCD screen,
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
The CIX VFR Club Flight Training Notes Exercise. Configuring a Router to Host a Multiplayer Session
(INCLUDING THE INSTRUCTOR MODE) Flight Simulator includes a Multiplayer function which allows players to join in group flying sessions. There are Internet servers set up for doing just this, but many people
Configuring the WT-4 for ftp (Ad-hoc Mode)
En Configuring the WT-4 for ftp (Ad-hoc Mode) Windows XP Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Windows XP Professional SP2 ftp server
Wireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Figure 1. The Motorola SB4200 cable modem
Setting Up a Home Wireless Network What You Need If you're still using a dial-up modem to access the Internet, it's time to consider broadband. Depending on where you live, you can either opt for a cable
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
Designing U- Texture
Software Architecture for Self-organizable Universal Boards Ryo Ohsawa 1, Naohiko Kohtake 1, Kazunori Takashio 1, and Hideyuki Tokuda 1 Graduate School of Media and Governance, Keio University 5322 Endo,
Wireless Network Policy
Wireless Network Policy Purpose Guide the deployment and integrity of wireless networking on the Kettering University campus to ensure reliable, compatible, and secure operation Protect the security of
BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE
BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE 12/11/2012 Index 1 INTRODUCTION... 1-1 2 FACTORY DEFAULT SETTINGS... 2-1 3 CPE BASIC OPERATIONS... 3-1 3.1 PASSWORD MODIFICATION...
Movie Cube. User s Guide to Wireless Function
Movie Cube User s Guide to Wireless Function Table of Contents 1. WLAN USB Adapter Connection...3 2. Wireless Setup...4 2.1 Infrastructure (AP)...5 2.2 Peer to Peer (Ad Hoc)...7 2.3 Settings for PC...8
Wireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
A Division of Cisco Systems, Inc. Wireless A/G. USB Network Adapter. User Guide WIRELESS WUSB54AG. Model No.
A Division of Cisco Systems, Inc. WIRELESS Wireless A/G USB Network Adapter User Guide Model No. WUSB54AG Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered
Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual
Wireless LAN Access Point IEEE 802.11g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents...2 1.2 Features...2 1.3 Specifications...2 1.4 Physical Description...3 Chapter
Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:
IMPORTANT! This Guide refers to the following Products: Securing Your Wireless Network Please read the following carefully; Synopsis: This Guide is designed to help you if you have a Wireless Network that
Step-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
ICP DAS WF-2571 FAQ. FAQ Version 1.0. ICP DAS Co., Ltd. 2014-12-23
ICP DAS WF-2571 FAQ FAQ Version 1.0 ICP DAS Co., Ltd. 2014-12-23 Table of Contents Q1: WF-2571 doesn t work at Ad-Hoc mode. What should I do?... 3 Q2: WF-2571 doesn t work at AP mode. What should I do?...
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. User Guide. Access Point with Power Over Ethernet WIRELESS WAP54GP. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with Power Over Ethernet User Guide Model No. WAP54GP Copyright and Trademarks Specifications are subject to change without
Configuring the WT-4 for Upload to a Computer (Ad-hoc Mode)
En Configuring the WT-4 for Upload to a Computer (Ad-hoc Mode) This document provides basic instructions on configuring the WT-4 wireless transmitter and a computer for transmission over an ad-hoc (peer-to-peer)
BEC 6200WZL. 4G/LTE Cellular Broadband Router. Quick Start Guide
BEC 6200WZL 4G/LTE Cellular Broadband Router Quick Start Guide 1 BEC 6200WZL 4G/LTE Cellular Broadband Router PLEASE READ THE QUICK START GUIDE AND FOLLOW THE STEPS CAREFULLY. THIS QUICK START GUIDE WILL
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Mobile System Technologies Certification Program
Mobile System Technologies Certification Program This is the Mobile Computing Promotion Consortium s (MCPC) official certification program for engineers who wish to obtain deeper knowledge of and experience
Chapter 1 Basic Introduction to Computers. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 1 Basic Introduction to Computers Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Explain why computer literacy is vital to success in today s world Define
Plc Based Monitoring and Controlling System Using Wi-Fi Device
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 4, Ver. II (Jul - Aug. 2014), PP 29-34 Plc Based Monitoring and Controlling System
BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2
BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:
CHAPTER 2: USING THE CAMERA WITH THE APP
TABLE OF CONTENTS OVERVIEW... 1 Front of your camera... 1 Back of your camera... 2 ACCESSORIES... 3 CHAPTER 1: Navigating the Mobile Application... 4 Device List: How to Use this Page... 4 My Messages:
Mobile and Sensor Systems
Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous
Security. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
Wireless-N. User Guide. PCI Adapter WMP300N (EU) WIRELESS. Model No.
2,4 GHz WIRELESS Wireless-N PCI Adapter User Guide Model No. WMP300N (EU) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of
Setting Up Your Wireless Network
Setting Up Your Wireless Network 1 TABLE OF CONTENTS Wireless Tips... 3 Terminology... 4 Motorola 2247... 5 Logging In:... 5 Changing the SSID/network name... 6 Westell Model 7500... 12 Configuration of
WRE2205. User s Guide. Quick Start Guide. Wireless N300 Range Extender. Default Login Details. Version 1.00 Edition 1, 06/2012
WRE2205 Wireless N300 Range Extender Version 1.00 Edition 1, 06/2012 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.2 User Name admin Passwordwww.zyxel.com 1234 Copyright
Nokia E61i Configuring connection settings
Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
Beginners Guide to Mobile Technology
Beginners Guide to Mobile Technology A Transformyx Whitepaper I. MOBILE TECHNOLOGY Mobile computing allows people to use IT without being tied to a single location. Any business with staff that work away
WAITER: A Wearable Personal Healthcare and Emergency Aid System
Sixth Annual IEEE International Conference on Pervasive Computing and Communications WAITER: A Wearable Personal Healthcare and Emergency Aid System Wanhong Wu 1, Jiannong Cao 1, Yuan Zheng 1, Yong-Ping
How To Set up and Configure the WNA-100 Wireless Network Adapter
How To Set up and Configure the WNA-100 Wireless Network Adapter Section 1: Set up and Connect the Adapter to a Computer, Then Configure the Computer to Communicate With the Adapter Before the adapter
Chapter 6 Telecommunications, Networks, and Wireless. Computing
Chapter 6 Telecommunications, Networks, and Wireless Computing Essay Questions: 1. Define a hub, switch, and a router. 2. List the challenges associated with managing contemporary telecommunications and
Step-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.
STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address
Title: How do I configure the wireless printer without a network cable and install the printer driver in Windows? NOTE: For successful wireless setup, you MUST know your network security settings. STEP
Tube-U(G) Long-Range Outdoor IEEE 802.11g USB Adapter User s Guide
Tube-U(G) Long-Range Outdoor IEEE 802.11g USB Adapter User s Guide Alfa Network, Inc. Page 1 Table of Content Over view... 3 Unpacking information... 3 Introduction to the Tube-U(G) outdoor USB Adapter...
Development of Industrial Intrusion Detection and Monitoring Using Internet of Things P. Gokul Sai Sreeram 1, Chandra Mohan Reddy Sivappagari 2
Development of Industrial Intrusion Detection and Monitoring Using Internet of Things P. Gokul Sai Sreeram 1, Chandra Mohan Reddy Sivappagari 2 Abstract The need for deployment of security systems rapidly
Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson
Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Internet of Things The Internet of Things (IoT) is a computing
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
Digitus DN-13007 / DN-13008 / DN-13018
Digitus DN-13007 / DN-13008 / DN-13018 USB 2.0 Hi-Speed MFP Server Quick Installation Guide 1. Introduction This document describes the steps for installing and configuring Digitus DN-13007/DN-13008/DN-13018
DSL-2600U. User Manual V 1.0
DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with RangeBooster User Guide Model No. WMP54GR Copyright and Trademarks Specifications are subject to change without notice.
Pre-lab and In-class Laboratory Exercise 10 (L10)
ECE/CS 4984: Wireless Networks and Mobile Systems Pre-lab and In-class Laboratory Exercise 10 (L10) Part I Objectives and Lab Materials Objective The objectives of this lab are to: Familiarize students
Performance Measurement of Wireless LAN Using Open Source
Performance Measurement of Wireless LAN Using Open Source Vipin M Wireless Communication Research Group AU KBC Research Centre http://comm.au-kbc.org/ 1 Overview General Network Why Network Performance
The Wireless LAN (Local Area Network) USB adapter can be operated in one of the two following networking configurations :
SAGEM Wi-Fi 11g USB ADAPTER Quick Start Guide About this guide This Quick Start Guide describes how to install and operate your SAGEM Wi-Fi 11g USB ADAPTER. Please read this manual before you install the
Step-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1
WAP3205 v2. User s Guide. Quick Start Guide. Wireless N300 Access Point. Default Login Details. Version 1.00 Edition 2, 10/2015
WAP3205 v2 Wireless N300 Access Point Version 1.00 Edition 2, 10/2015 Quick Start Guide User s Guide Default Login Details Web Address http://zyxelsetup Password www.zyxel.com 1234 Copyright 2014 ZyXEL
OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
NetComm Wireless NP920 Dual Band WiFi USB Adapter. User Guide
NetComm Wireless NP920 Dual Band WiFi USB Adapter User Guide Contents Preface... 3 Important Safety Instructions... 3 Introduction... 4 Overview... 4 Features... 4 Package Contents... 5 Minimum System
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
