Proceedings of the Seventh ACM International Workshop on Challenged Networks 2012
DOI: 10.1145/2348616.2348623
|View full text |Cite
|
Sign up to set email alerts
|

Enabling ad-hoc-style communication in public WLAN hot-spots

Abstract: Opportunistic networking between mobile devices relies on the capabilities of those devices to establish ad-hoc communication among each other. While the two dominant wireless interface technologies, IEEE 802.11 wireless LAN and Bluetooth, offer such capabilities in theory, limitations of the protocol specification, chipsets, and operating systems in mobile devices render those features largely unusable in practice. Researchers have recognized these shortcomings and devised mechanisms in which mobile devices a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…This captive portal log can be retrieved from a local database or some backend service. Its records are made when a network applies captive portal which traps internet's traffic so that only validated clients can access [31]. These captive portals are generally employed in public Wi-Fi hotspots.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…This captive portal log can be retrieved from a local database or some backend service. Its records are made when a network applies captive portal which traps internet's traffic so that only validated clients can access [31]. These captive portals are generally employed in public Wi-Fi hotspots.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It informs typically users about the internet access sponsor, probable limitations as well as the possible mode of payment, and the terms and conditions should be accepted by the users [32]. Further, it prompts the users to input their credentials, and traffic is dropped until a network user is authenticated [31]. Every time a user enters his/her username and password in the captive portal, the action is being recorded in the captive portal database.…”
Section: Literature Reviewmentioning
confidence: 99%