Secure Location Verification: Why You Want Your Verifiers to Be Mobile
暂无分享,去创建一个
Jens B. Schmitt | Vincent Lenders | Matthias Schäfer | Carolina Nogueira | J. Schmitt | Matthias Schäfer | Vincent Lenders | Carolina Nogueira
[1] Jihyuk Choi,et al. Secure Location Verification Using Simultaneous Multilateration , 2012, IEEE Transactions on Wireless Communications.
[2] David Hestenes,et al. Generalized homogeneous coordinates for computational geometry , 2001 .
[3] Jens B. Schmitt,et al. Secure Track Verification , 2015, 2015 IEEE Symposium on Security and Privacy.
[4] Srdjan Capkun,et al. Secure Localization with Hidden and Mobile Base Stations , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[5] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[6] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[7] Srdjan Capkun,et al. Securing position and distance verification in wireless networks , 2004 .
[8] Srdjan Capkun,et al. On the requirements for successful GPS spoofing attacks , 2011, CCS '11.
[9] P. Howland. Editorial: Passive radar systems , 2005 .
[10] Jens B. Schmitt,et al. Secure Motion Verification using the Doppler Effect , 2016, WISEC.
[11] Bart Preneel,et al. Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[12] Srdjan Capkun,et al. Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.
[13] Rui Pinheiro,et al. On Perception and Reality in Wireless Air Traffic Communication Security , 2016, IEEE Transactions on Intelligent Transportation Systems.
[14] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[15] Gianluca Dini,et al. The verifier bee: A path planner for drone-based secure location verification , 2015, 2015 IEEE 16th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[16] Yih-Chun Hu,et al. Secure and precise location verification using distance bounding and simultaneous multilateration , 2009, WiSec '09.
[17] Srdjan Capkun,et al. Realization of RF Distance Bounding , 2010, USENIX Security Symposium.
[18] Cédric Lauradoux,et al. Distance Bounding Protocols on TH-UWB Radios , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[19] Ivan Martinovic,et al. Secure Location Verification with a Mobile Receiver , 2016, CPS-SPC '16.
[20] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[21] Ivan Martinovic,et al. Lightweight Location Verification in Air Traffic Surveillance Networks , 2015, CPSS@ASIACSS.