Wireless Device Authentication Using Acoustic Hardware Fingerprints
暂无分享,去创建一个
[1] Tzi-cker Chiueh,et al. Sequence Number-Based MAC Address Spoof Detection , 2005, RAID.
[2] Ramarathnam Venkatesan,et al. Dhwani: secure peer-to-peer acoustic NFC , 2013, SIGCOMM.
[3] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[4] Jie Xiong,et al. SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.
[5] Martin Eian,et al. The modeling and comparison of wireless network denial of service attacks , 2011, MobiHeld '11.
[6] Thomas L. Szabo,et al. Time domain wave equations for lossy media obeying a frequency power law , 1994 .
[7] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[8] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2010, IEEE Transactions on Mobile Computing.
[9] Nikita Borisov,et al. Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components , 2014, CCS.
[10] Xiang-Yang Li,et al. Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information , 2012, 2013 Proceedings IEEE INFOCOM.
[11] Xiangyu Liu,et al. Acoustic Fingerprinting Revisited: Generate Stable Device ID Stealthily with Inaudible Sound , 2014, CCS.
[12] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[13] Srinivasan Seshan,et al. 802.11 user fingerprinting , 2007, MobiCom '07.
[14] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[15] Richard Sharp,et al. Audio networking: the forgotten wireless technology , 2005, IEEE Pervasive Computing.
[16] Erik Tews,et al. Practical attacks against WEP and WPA , 2009, WiSec '09.
[17] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.