Guaranteeing spoof-resilient multi-robot networks

[1]  Swarun Kumar,et al.  Adaptive communication in multi-robot systems using directionality of signal strength , 2015, Int. J. Robotics Res..

[2]  Swarun Kumar,et al.  Accurate indoor localization with zero start-up cost , 2014, MobiCom.

[3]  Swarun Kumar,et al.  LTE radio analytics made easy and accessible , 2014 .

[4]  Yih-Chun Hu,et al.  Lightweight source authentication and path validation , 2014, SIGCOMM.

[5]  Jie Yang,et al.  Practical user authentication leveraging channel state information (CSI) , 2014, AsiaCCS.

[6]  JooSeok Song,et al.  A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks , 2014, 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS).

[7]  Yue Liu,et al.  The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities , 2014, IEEE Transactions on Mobile Computing.

[8]  Candice King,et al.  Fundamentals of wireless communications , 2013, 2014 67th Annual Conference for Protective Relay Engineers.

[9]  George J. Pappas,et al.  Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.

[10]  Allan Tomlinson,et al.  Modelling malicious entities in a robotic swarm , 2013, 2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC).

[11]  Jie Xiong,et al.  SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.

[12]  Swarun Kumar,et al.  Interference alignment by motion , 2013, MobiCom.

[13]  Jue Wang,et al.  Dude, where's my card?: RFID positioning that works with multipath and non-line of sight , 2013, SIGCOMM.

[14]  Ting Wang,et al.  Analysis on perfect location spoofing attacks using beamforming , 2013, 2013 Proceedings IEEE INFOCOM.

[15]  Ayman I. Kayssi,et al.  Malicious Node Detection in Wireless Sensor Networks , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[16]  Mehrzad Malmirchegini,et al.  On the Spatial Predictability of Communication Channels , 2012, IEEE Transactions on Wireless Communications.

[17]  Maxim Likhachev,et al.  Planning for landing site selection in the aerial supply delivery , 2011, 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[18]  Michalis Faloutsos,et al.  Coping with packet replay attacks in wireless networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[19]  David Wetherall,et al.  Tool release: gathering 802.11n traces with channel state information , 2011, CCRV.

[20]  Peter Druschel,et al.  Peer-to-peer systems , 2010, Commun. ACM.

[21]  Allan Tomlinson,et al.  Threats to the Swarm: Security Considerations for Swarm Robotics , 2009 .

[22]  M. Goodrich,et al.  UAV intelligent path planning for Wilderness Search and Rescue , 2009, 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[23]  Mehran Mesbahi,et al.  Identification and Infiltration in Consensus-type Networks* *This work has been supported by AFOSR FA9550-09-1-0091. , 2009 .

[24]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[25]  Mac Schwager,et al.  Optimal coverage for multiple hovering robots with downward facing cameras , 2009, 2009 IEEE International Conference on Robotics and Automation.

[26]  Christian Wietfeld,et al.  AirShield: A system-of-systems MUAV remote sensing architecture for disaster response , 2009, 2009 3rd Annual IEEE Systems Conference.

[27]  Emilio Frazzoli,et al.  Adaptive and Distributed Algorithms for Vehicle Routing in a Stochastic and Dynamic Environment , 2009, IEEE Transactions on Automatic Control.

[28]  Mac Schwager,et al.  Decentralized, Adaptive Coverage Control for Networked Robots , 2009, Int. J. Robotics Res..

[29]  Xin Liu,et al.  Passport: Secure and Adoptable Source Authentication , 2008, NSDI.

[30]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[31]  Eylem Ekici,et al.  A Localization-Based Anti-Sensor Network System , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[32]  Timothy W. McLain,et al.  Decentralized Cooperative Aerial Surveillance Using Fixed-Wing Miniature UAVs , 2006, Proceedings of the IEEE.

[33]  D. Shen,et al.  Fundamentals of Wireless Communications , 2006 .

[34]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[35]  Andreas F. Molisch,et al.  Wireless Communications , 2005 .

[36]  Richard M. Murray,et al.  Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.

[37]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[38]  Antonio Alfredo Ferreira Loureiro,et al.  Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[39]  Houcem Gazzah,et al.  Directive antenna arrays for 3D source localization , 2003, 2003 4th IEEE Workshop on Signal Processing Advances in Wireless Communications - SPAWC 2003 (IEEE Cat. No.03EX689).

[40]  F. Bullo,et al.  Coverage control for mobile sensing networks , 2002, IEEE Transactions on Robotics and Automation.

[41]  L. Parker Distributed Algorithms for Multi-Robot Observation of Multiple Moving Targets , 2002, Auton. Robots.

[42]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[43]  Monson H. Hayes,et al.  Statistical Digital Signal Processing and Modeling , 1996 .

[44]  Armin W. Doerry,et al.  Synthetic Aperture Radar , 1992, Inverse Synthetic Aperture Radar Imaging with MATLAB® Algorithms.

[45]  Helmut Klausing,et al.  Feasibility of a Synthetic Aperture Radar with Rotating Antennas (ROSAR) , 1989, 1989 19th European Microwave Conference.

[46]  Petre Stoica,et al.  MUSIC, maximum likelihood, and Cramer-Rao bound , 1989, IEEE Transactions on Acoustics, Speech, and Signal Processing.

[47]  Gilbert Laporte,et al.  Solving a Family of Multi-Depot Vehicle Routing and Location-Routing Problems , 1988, Transp. Sci..

[48]  A. Field,et al.  Communications , 1963, The Journal of Asian Studies.

[49]  Divya Divya,et al.  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2016 .

[50]  Jie Yang,et al.  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.

[51]  Emilio Frazzoli,et al.  Distributed and Adaptive Algorithms for Vehicle Routing in a Stochastic and Dynamic Environment , 2009, ArXiv.

[52]  Tom Fawcett,et al.  ROC Graphs: Notes and Practical Considerations for Researchers , 2007 .

[53]  Houcem Gazzah,et al.  Cramer-Rao bounds for antenna array design , 2006, IEEE Transactions on Signal Processing.

[54]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[55]  D. Bertsekas,et al.  Introduction to Probability , 2002 .

[56]  Michael D. Zoltowski,et al.  Signal Subspace Techniques for Source Localization with Circular Sensor Arrays , 1994 .