A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks
暂无分享,去创建一个
[1] Guy Pujolle,et al. A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.
[2] Patel Manishkumar Manilal. Security Attacks in Wireless Sensor Networks , 2019 .
[3] Mohamed El-Tanany,et al. Analytical modeling and simulation of phase noise interference in OFDM-based digital television terrestrial broadcasting systems , 2001, IEEE Trans. Broadcast..
[4] Lajos Hanzo,et al. Physical-layer authentication for wireless security enhancement: current challenges and future developments , 2016, IEEE Communications Magazine.
[5] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[6] Xiaojiang Du,et al. Adaptive cell relay routing protocol for mobile ad hoc networks , 2006, IEEE Transactions on Vehicular Technology.
[7] Caidan Zhao,et al. A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks , 2010, 2010 International Conference on Communications and Mobile Computing.
[8] Xiaojiang Du,et al. Designing efficient routing protocol for heterogeneous sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..
[9] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[10] Xiang Wang,et al. Specific Emitter Identification Based on Nonlinear Dynamical Characteristics , 2016, Canadian Journal of Electrical and Computer Engineering.
[11] Jeffrey H. Reed,et al. Specific Emitter Identification for Cognitive Radio with Application to IEEE 802.11 , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[12] Sepideh Dolatshahi,et al. Identification of wireless users via power amplifier imperfections , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[13] Michel Barbeau,et al. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.
[14] A. Demir,et al. Phase noise in oscillators: a unifying theory and numerical methods for characterization , 2000 .
[15] Wei-Chung Teng,et al. A defense against clock skew replication attacks in wireless sensor networks , 2014, J. Netw. Comput. Appl..
[16] Mohsen Guizani,et al. Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.
[17] Yves Grandvalet,et al. Y.: SimpleMKL , 2008 .
[18] Xiaojiang Du,et al. Implementation and performance analysis of SNMP on a TLS/TCP base , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).
[19] Chun-Shien Lu,et al. Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.
[20] Caidan Zhao,et al. Anti-PUE Attack Base on the Transmitter Fingerprint Identification in Cognitive Radio , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[21] Manish M. Patel,et al. Security attacks in wireless sensor networks: A survey , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).
[22] Michael P. Howarth,et al. A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.
[23] Hsiao-Hwa Chen,et al. Secrecy wireless information and power transfer: challenges and opportunities , 2015, IEEE Wireless Communications.
[24] Kevin W. Sowerby,et al. Radio-frequency fingerprinting for mitigating primary user emulation attack in low-end cognitive radios , 2014, IET Commun..
[25] Riccardo Rubino. Wireless device identification from a phase noise prospective , 2010 .
[26] Dennis Goeckel,et al. Wireless Device Identification Based on RF Oscillator Imperfections , 2015, IEEE Trans. Inf. Forensics Secur..
[27] Xiaojiang Du,et al. Permission-combination-based scheme for Android mobile malware detection , 2014, 2014 IEEE International Conference on Communications (ICC).