Radio Frequency Fingerprinting for Intrusion Detection in Wireless Networks

Compounds having the formula in which R1 is lower alkyl or lower alkoxy, R2 is lower alkoxy or methylthio-substituted lower alkoxy, and R3 is R4 and R5 are lower alkyl, m is 1 or 2 and n is 0 or an integer from 1 to 4. The compound have utility as insecticides and acaricides.

[1]  Rolph E. Anderson,et al.  Multivariate Data Analysis: Text and Readings , 1979 .

[2]  Witold Kinsner,et al.  Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.

[3]  Tim Bass,et al.  Intrusion detection systems and multisensor data fusion , 2000, CACM.

[4]  Michel Barbeau,et al.  Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.

[5]  Chatschik Bisdikian,et al.  Bluetooth Revealed , 2000 .

[6]  E. Bolinder The Fourier integral and its applications , 1963 .

[7]  W. Kinsner,et al.  Multifractal modelling of radio transmitter transients for classification , 1997, IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings.

[8]  O. Ureten,et al.  Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .

[9]  Harold H. Szu,et al.  Novel identification of intercepted signals from unknown radio transmitters , 1995, Defense, Security, and Sensing.

[10]  S. Mallat A wavelet tour of signal processing , 1998 .

[11]  Michel Barbeau,et al.  DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .

[12]  Panu Somervuo,et al.  Self-Organizing Maps and Learning Vector Quantization for Feature Sequences , 1999, Neural Processing Letters.

[13]  O. Ureten,et al.  Detection of radio transmitter turn-on transients , 1999 .

[14]  N. Serinken,et al.  Characteristics of radio transmitter fingerprints , 2001 .

[15]  John G. Proakis,et al.  Digital signal processing (3rd ed.): principles, algorithms, and applications , 1996 .

[16]  M. Riezenman Cellular security: better, but foes still lurk , 2000 .

[17]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[18]  D. F. Specht,et al.  Probabilistic neural networks for classification, mapping, or associative memory , 1988, IEEE 1988 International Conference on Neural Networks.

[19]  Charles W. Champ,et al.  A multivariate exponentially weighted moving average control chart , 1992 .

[20]  Johan Zuidweg Next Generation Intelligent Networks , 2002 .

[21]  R. K. Shyamasundar,et al.  Introduction to algorithms , 1996 .

[22]  O. H. Tekbas,et al.  Improvement of transmitter identification system for low SNR transients , 2004 .

[23]  Andrew Hunter,et al.  Feature Selection Using Probabilistic Neural Networks , 2000, Neural Computing & Applications.

[24]  Ralph D. Hippenstiel,et al.  Wavelet Based Transmitter Identification , 1996, Fourth International Symposium on Signal Processing and Its Applications.

[25]  Byrav Ramamurthy,et al.  Agent based intrusion detection and response system for wireless LANs , 2003, IEEE International Conference on Communications, 2003. ICC '03..