Analysis of open source drivers for ieee 802.11 wlans
M Vipin, S Srikanth,
"International Conference on Wireless Communication and Sensor Computing",
Abstract : The purpose of this study is to analyze the open source IEEE 802.11 wireless local area network (WLAN) stack implementation for further enhancement and implementations. We discuss the IEEE 802.11 WLAN implementation in the latest Linux kernel. This includes a functional breakdown of the driver and the overall flow of information via functions. We also survey the specific implementation methods used in the WLAN Linux stack. We compare the legacy driver implementation with the newer Linux kernel implementation. For reference, the Atheros network device driver is taken as an example to discuss the WLAN structure, stack and driver implementation.
Building reliable and fault resilient mobile ad hoc networks
M Vipin, K Sankar, AV Sarad,
"International Conference on Signal Processing, Communications and Networking",
Abstract : The nodes in a mobile ad hoc network (MANET) have limited processing power, memory and transmission range. The mobile nodes may dynamically enter or leave the ad hoc network. To improve the resilience of the ad-hoc networks to mobility, node and link failure, we propose an algorithm involving binary trees and a special form of cycles in the network graph subject to constraints in topology and use this information to re-route packets from source to destination when interconnecting links or nodes fail.
A time and storage efficient solution to remote fileintegrity check
AV Sarad, K Sankar, M Vipin,
"Fourth International Conference on Information Assurance and Security",
Abstract : Checking the integrity of a file on a remote untrusted or compromised server is to be achieved with minimal computational and storage requirements on part of a healthy verifier. Existing solutions are time and storage intensive. A fast protocol comprising of maximum period linear congruence generators and linear feedback shift registers with compact storage requirements is proposed.
A multi way tree for token based authentication
M Vipin, AV Sarad, K Sankar,
"International Conference on Computer Science and Software Engineering",
Abstract : Tokens are popular in two factor authentication, where the first authentication credential is a fixed secret key s1 associated with the user and the second authentication credential is a dynamic secret key s2 generated by the token assigned to the user. Popular hardware tokens use a synchronized clock T along with a static secret key encoded into the token to generate a one time secret s2. The contribution of the paper is to eliminate this clock synchronization with the authentication server S and to detect unauthorized login attempts when an intruder is in possession of s1 or s2 but not both, with a high degree of certainty.