A survey: Spoofing attacks in physical layer security
暂无分享,去创建一个
[1] A. Bachorek,et al. Enabling authentic transmissions in WSNs — turning jamming against the attacker , 2008, 2008 4th Workshop on Secure Network Protocols.
[2] Kevin Fu,et al. They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.
[3] Kouichi Sakurai,et al. A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.
[4] Pardeep Kumar,et al. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.
[5] Ryan W. Thomas,et al. A Bayesian Game Analysis of Emulation Attacks in Dynamic Spectrum Access Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[6] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[7] Larry J. Greenstein,et al. Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.
[8] Ting Wang,et al. Analysis on perfect location spoofing attacks using beamforming , 2013, 2013 Proceedings IEEE INFOCOM.
[9] Meng Wu,et al. A secure authentication scheme for integration of cellular networks and MANETs , 2008, 2008 International Conference on Neural Networks and Signal Processing.
[10] Song Han,et al. Cognitive radio network security: A survey , 2012, J. Netw. Comput. Appl..
[11] Zhu Han,et al. Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.
[12] Richard P. Martin,et al. The limits of localization using signal strength: a comparative study , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[13] H. T. Kung,et al. Determining RF angle of arrival using COTS antenna arrays: A field evaluation , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[14] Petri Mähönen,et al. Understanding conditions that lead to emulation attacks in dynamic spectrum access , 2011, IEEE Communications Magazine.
[15] Xianbin Wang,et al. A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).
[16] J. Sobana,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .
[17] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[18] Jie Xiong,et al. SecureAngle: improving wireless security using angle-of-arrival information , 2010, Hotnets-IX.
[19] Zhu Han,et al. Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.
[20] Richard P. Martin,et al. Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[21] 李辉,et al. TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .
[22] K.J.R. Liu,et al. Signal processing techniques in network-aided positioning: a survey of state-of-the-art positioning designs , 2005, IEEE Signal Processing Magazine.
[23] Shamik Sengupta,et al. Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach , 2012, IET Commun..
[24] Sneha Kumar Kasera,et al. Advancing wireless link signatures for location distinction , 2008, MobiCom '08.
[25] Rosdiadee Nordin,et al. Recent Advances in Wireless Indoor Localization Techniques and System , 2013, J. Comput. Networks Commun..
[26] Hüseyin Arslan,et al. Impersonation attack identification for secure communication , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[27] S. Anand,et al. An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[28] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[29] Mario Gerla,et al. Physical layer security in wireless smart grid , 2012, IEEE Communications Magazine.