An Analysis of the Privacy Threat in Vehicular Ad Hoc Networks due to Radio Frequency Fingerprinting
暂无分享,去创建一个
[1] Radha Poovendran,et al. AMOEBA: Robust Location Privacy Scheme for VANET , 2007, IEEE Journal on Selected Areas in Communications.
[2] Frank Kargl,et al. Pseudonym Schemes in Vehicular Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[3] Kui Ren,et al. Wireless Physical-Layer Identification: Modeling and Validation , 2015, IEEE Transactions on Information Forensics and Security.
[4] David W. Matolak,et al. Vehicle–Vehicle Channel Models for the 5-GHz Band , 2008, IEEE Transactions on Intelligent Transportation Systems.
[5] Pascal Lorenz,et al. Wireless communication technologies for ITS applications [Topics in Automotive Networking] , 2010, IEEE Communications Magazine.
[6] Bryan Nousain,et al. Wavelet Fingerprinting of Radio-Frequency Identification (RFID) Tags , 2012, IEEE Transactions on Industrial Electronics.
[7] Robert F. Mills,et al. Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[8] Michael A. Temple,et al. Intrinsic Physical-Layer Authentication of Integrated Circuits , 2012, IEEE Transactions on Information Forensics and Security.
[9] J. Kittler. Feature selection and extraction , 1978 .
[10] Yunxin Li,et al. An Overview of the DSRC/WAVE Technology , 2010, QSHINE.
[11] Sheldon A. Munns,et al. RF-DNA Fingerprinting for Airport WiMax Communications Security , 2010, 2010 Fourth International Conference on Network and System Security.
[12] Jakob Hasse,et al. Forensic identification of GSM mobile phones , 2013, IH&MMSec '13.
[13] Hakima Chaouchi,et al. Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing , 2016, Mob. Inf. Syst..
[14] Luca Delgrossi,et al. IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[15] Nello Cristianini,et al. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .
[16] Fredrik Tufvesson,et al. Characterization of Vehicle-to-Vehicle Radio Channels from Measurements at 5.2 GHz , 2009, Wirel. Pers. Commun..
[17] Walid Saad,et al. Device Fingerprinting in Wireless Networks: Challenges and Opportunities , 2015, IEEE Communications Surveys & Tutorials.
[18] Lorenzo Rubio,et al. Analysis of Small-Scale Fading Distributions in Vehicle-to-Vehicle Communications , 2016, Mob. Inf. Syst..
[19] M.A. Ingram,et al. Six time- and frequency- selective empirical channel models for vehicular wireless LANs , 2007, IEEE Vehicular Technology Magazine.
[20] Kevin W. Sowerby,et al. Radio-frequency fingerprinting for mitigating primary user emulation attack in low-end cognitive radios , 2014, IET Commun..
[21] Guillermo Acosta-Marum,et al. Wave: A tutorial , 2009, IEEE Communications Magazine.
[22] Ricardo Neisse,et al. A Model-Based Security Toolkit for the Internet of Things , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.