Device Fingerprinting in Wireless Networks: Challenges and Opportunities
暂无分享,去创建一个
Walid Saad | Rong Zheng | Zhu Han | Qiang Xu | Qiang Xu | W. Saad | Rong Zheng | Zhu Han
[1] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[2] Dennis Goeckel,et al. Identifying Wireless Users via Transmitter Imperfections , 2011, IEEE Journal on Selected Areas in Communications.
[3] Raheem A. Beyah,et al. A Passive Approach to Wireless NIC Identification , 2006, 2006 IEEE International Conference on Communications.
[4] R.T. Johnk,et al. Electromagnetic signatures of WLAN cards and network security , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[5] Sergey Bratus,et al. Active behavioral fingerprinting of wireless devices , 2008, WiSec '08.
[6] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[7] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[8] Ulrike Meyer,et al. A man-in-the-middle attack on UMTS , 2004, WiSe '04.
[9] Ke Gao,et al. A passive approach to wireless device fingerprinting , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[10] Irwin O. Kennedy,et al. Feature extraction approaches to RF fingerprinting for device identification in femtocells , 2010, Bell Labs Technical Journal.
[11] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[12] Michel Barbeau,et al. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.
[13] James Gross,et al. PHY layer authentication via drifting oscillators , 2014, 2014 IEEE Global Communications Conference.
[14] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2010, IEEE Transactions on Mobile Computing.
[15] Desmond Loh Chin Choong,et al. Identifying unique devices through wireless fingerprinting , 2008, WiSec '08.
[16] Jie Yang,et al. Detecting sybil attacks inwireless and sensor networks using cluster analysis , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[17] Xianbin Wang,et al. Robust physical layer authentication using inherent properties of channel impulse response , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[18] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[19] Larry J. Greenstein,et al. A Physical-Layer Technique to Enhance Authentication for Mobile Terminals , 2008, 2008 IEEE International Conference on Communications.
[20] James T. Yu,et al. An Analysis of DoS Attacks on Wireless LAN , 2006, Wireless and Optical Communications.
[21] Sepideh Dolatshahi,et al. Identification of wireless users via power amplifier imperfections , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[22] Chi-Chun Lo,et al. An Interference-Based Prevention Mechanism Against WEP Attack for 802.11B Network , 2004, Net-Con.
[23] Jitendra K. Tugnait,et al. A channel-based hypothesis testing approach to enhance user authentication in wireless networks , 2010, 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010).
[24] Phivos Mylonas,et al. Real-Life Paradigms of Wireless Network Security Attacks , 2011, 2011 15th Panhellenic Conference on Informatics.
[25] Raheem A. Beyah,et al. Passive classification of wireless NICs during active scanning , 2007, International Journal of Information Security.
[26] Rong Zheng,et al. Device fingerprinting to enhance wireless security using nonparametric Bayesian method , 2011, 2011 Proceedings IEEE INFOCOM.
[27] Haipeng Shen,et al. Characterizing the duration and association patterns of wireless access in a campus , 2005 .
[28] Zhu Han,et al. Sensing-Transmission Edifice Using Bayesian Nonparametric Traffic Clustering in Cognitive Radio Networks , 2014, IEEE Transactions on Mobile Computing.
[29] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[30] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[31] Ahmed Helmy,et al. Mining behavioral groups in large wireless LANs , 2006, MobiCom '07.
[32] Raheem A. Beyah,et al. Passive Classification of Wireless NICs during Rate Switching , 2008, EURASIP J. Wirel. Commun. Netw..
[33] Chrisil Arackaparambil,et al. On the reliability of wireless fingerprinting using clock skews , 2010, WiSec '10.
[34] Damon McCoy,et al. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting , 2006, USENIX Security Symposium.
[35] Michel Barbeau,et al. Detecting Impersonation Attacks in Future Wireless and Mobile Networks , 2005, MADNES.
[36] J.A. Copeland,et al. Using Active Scanning to Identify Wireless NICs , 2006, 2006 IEEE Information Assurance Workshop.
[37] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[38] K. J. Ray Liu,et al. Extrinsic Channel-Like Fingerprint Embedding for Authenticating MIMO Systems , 2011, IEEE Transactions on Wireless Communications.
[39] Xianbin Wang,et al. A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).
[40] Brian M. Sadler,et al. MIMO Authentication via Deliberate Fingerprinting at the Physical Layer , 2011, IEEE Transactions on Information Forensics and Security.
[41] Odysseas G. Koufopavlou,et al. Mobile Communications World: Security Implementations Aspects - A State of the Art , 2003, Comput. Sci. J. Moldova.
[42] Christoph Neumann,et al. An Empirical Study of Passive 802.11 Device Fingerprinting , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[43] Jonathan P. Ellch. Fingerprinting 802.11 devices , 2006 .
[44] Chang-Tien Lu,et al. On Passive Wireless Device Fingerprinting using Infinite Hidden Markov Random Field , 2012 .
[45] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..