Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
  • Published Date
Displaying 1351 - 1375 of 2294

Non-Coherent Amplify-and-Forward Generalized Likelihood Ratio Test Receiver

November 30, 2008
Author(s)
Michael R. Souryal
This paper proposes a simple non-coherent amplify-and-forward receiver for the relay channel and evaluates its diversity performance for Rayleigh fading channels. We use the generalized likelihood ratio test to obtain the decision rule in closed form

Security Challenges in Seamless Mobility - How to ``Handover'' the Keys?

November 30, 2008
Author(s)
Katrin Hoeper, Lidong Chen, Antonio Izquierdo Manzanares, Nada T. Golmie
In this paper, we discuss key management challenges for seamless handovers across heterogeneous wireless networks. We focus on fast access authentication protocols that allow expedited network entry by utilizing existing keying material from previous

Bluetooth Security: Protecting Wireless Networks and Devices

November 20, 2008
Author(s)
Shirley M. Radack
This bulletin summarizes information disseminated in NIST Special Publication (SP) 800-121, Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology, which was written by Karen Scarfone of NIST and by John Padgette

Call Admission Control for Mobile Agent Based Handoff in Wireless Mesh Networks

November 17, 2008
Author(s)
Yi Qian, Bo Rong, Kejie Lu, Michel Kadoch
Wireless mesh network (WMN) has emerged recently as a promising technology for next-generation wireless networking. In WMN, it is important to provide an efficient handoff scheme, due to the frequent user mobility. To address this issue, we propose a

Performance Evaluation of a Secure Mac Protocol for Vehicular Networks

November 17, 2008
Author(s)
Yi Qian, Kejie Lu, Nader Moayeri
The main benefit of vehicular communication is seen in active safety systems that increase passenger safety by exchanging warning messages between vehicles. Other applications and private services are also permitted in order to lower the cost and to

Performance of A Novel Topology Control Scheme for Future Wireless Mesh Networks

November 17, 2008
Author(s)
Yi Qian, Kejie Lu, Tao Zhang, Shengli Fu, Ayat Jafari
In this paper, we address the topology control issues for future wireless mesh networks (WMNs). In particular, we propose a novel topology control scheme that attempts to maximize the overall throughput in the network and that takes into account traffic

Using the EAP Framework for Fast Media Independent Handover Authentication

November 17, 2008
Author(s)
Antonio Izquierdo Manzanares, Nada T. Golmie, Katrin Hoeper, Lidong Chen
In this paper we compare different authentication techniques that may be used in order to reduce the time and resources required to perform a handover, namely, re-authentication and pre-authentication. We provide a detailed analysis of each mechanism, and

Timely Effective Handover Mechanism in Heterogeneous Wireless Networks

November 13, 2008
Author(s)
Sang J. Yoo, David E. Cypher, Nada T. Golmie
Next-generation wireless networks should be able to coordinate and integrate different communication systems. It has been a challenging problem to support a seamless handover in these diverse wireless network environments. Link level triggers can provide

An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule

October 22, 2008
Author(s)
Matthew A. Scholl, Kevin Stine, Joan Hash, Pauline Bowen, L A. Johnson, Carla Dancy Smith, Daniel Steinberg
Special Publication 800-66 Rev. 1, An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, which discusses security considerations and resources that may provide value when implementing

Security Considerations in the System Development Life Cycle

October 16, 2008
Author(s)
Richard L. Kissel, Kevin M. Stine, Matthew A. Scholl, Hart Rossman, J Fahlsing, Jessica Gulick
The purpose of this guideline is to assist agencies in building security into their IT development processes. This should result in more cost-effective, risk-appropriate security control identification, development, and testing. This guide focuses on the

Directional Antenna for Multipath Ad Hoc Routing

October 15, 2008
Author(s)
Hamid Gharavi, Bin Hu
Multipath routing can be effectively used to maximize the utilization of network resources for real-time traffic. In mobile ad-hoc network environments, this approach can suffer from co-channel interference due to the simultaneous transmission of packets

Efficient Error Concealment for the Whole-frame Loss Based on H.264/AVC

October 15, 2008
Author(s)
Hamid Gharavi, Bo Yan
For low bit-rate video communications, each video frame usually fills the payload of a single network packet. In this situation, the loss of a packet may result in loosing the entire video frame. Currently, most existing error concealment algorithms can

Technical Guide to Information Security Testing and Assessment

September 30, 2008
Author(s)
Murugiah P. Souppaya, Karen A. Scarfone
The purpose of this document is to assist organizations in planning and conducting technical information security tests and examinations, analyzing findings, and developing mitigation strategies. The guide provides practical recommendations for designing

Allan Variance of Time Series Models of Measurement Data

September 22, 2008
Author(s)
Nien F. Zhang
The uncertainty of the mean of autocorrelated measurements from a stationary process has been discussed in the literature. However, when the measurements are from a non-stationary process, how to assess their uncertainty remains unresolved. Allan variance

QOS-Aware Channel Scanning for IEEE 802.11 Wireless LAN

September 15, 2008
Author(s)
Nada T. Golmie, Sang-Jo Yoo
Channel scanning is an important aspect of seamless handovers since it is required in order to find a target point of attachment (PoA). In the IEEE 802.11 WLAN, scanning of other channels causes service disruptions with the current AP so that the provided

A Robust Model-Based Approach to Indoor Positioning Using Signal Strength

September 9, 2008
Author(s)
Kamran Sayrafian, Dominik Kasper
A simple technique to estimate the position of a mobile node inside a building is based on the Received Signal Strength (RSS). In previous publications, we investigated the effectiveness of using circular array antennas and beamforming in order to enable
Was this page helpful?