TickSEC: A Novel Reconfigurable Platform for WiFi Physical Layer Security
暂无分享,去创建一个
Tao Wang | Zhiwei Li | Jun Liu | Haoyang Wu | Xiaoguang Li | Boyan Ding
[1] Jie Yang,et al. Practical user authentication leveraging channel state information (CSI) , 2014, AsiaCCS.
[2] Brian W. Kernighan,et al. WISE design of indoor wireless systems: practical computation and optimization , 1995 .
[3] Ahmed Khattab,et al. Demonstration Abstract: WARP – A Flexible Platform for Clean-Slate Wireless Medium Access Protocol Design , 2008 .
[4] Prasant Mohapatra,et al. Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller , 2013, IEEE Transactions on Mobile Computing.
[5] J. Sobana,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .
[6] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[7] Shaojie Tang,et al. KEEP: Fast secret key extraction protocol for D2D communication , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).
[8] Xianbin Wang,et al. Robust physical layer authentication using inherent properties of channel impulse response , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[9] Eric Blossom,et al. GNU radio: tools for exploring the radio frequency spectrum , 2004 .
[10] Eyal de Lara,et al. Ensemble: cooperative proximity-based authentication , 2010, MobiSys '10.
[11] Qian Xu,et al. Experimental Study on Key Generation for Physical Layer Security in Wireless Communications , 2016, IEEE Access.
[12] Larry J. Greenstein,et al. PHY-Authentication Protocol for Spoofing Detection in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[13] Yang Wang,et al. Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.
[14] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[15] Tao Wang,et al. The Tick Programmable Low-Latency SDR System , 2018, GETMBL.
[16] Xianbin Wang,et al. A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).
[17] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.