Wireless Physical-Layer Identification: Modeling and Validation
暂无分享,去创建一个
Kui Ren | Wenhao Wang | Bocheng Zhu | Zhi Sun | Sixu Piao | K. Ren | Zhi Sun | B. Zhu | Wenhao Wang | Sixu Piao
[1] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[2] Srdjan Capkun,et al. Physical-layer identification of UHF RFID tags , 2010, MobiCom.
[3] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[4] J. Stevenson Kenney,et al. Predicting spectral regrowth of nonlinear power amplifiers , 2002, IEEE Trans. Commun..
[5] Robert F. Mills,et al. Using Spectral Fingerprints to Improve Wireless Network Security , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[6] M. Steer,et al. The impact of RF front-end characteristics on the spectral regrowth of communications signals , 2005, IEEE Transactions on Microwave Theory and Techniques.
[7] Dennis Goeckel,et al. RF fingerprinting of users who actively mask their identities with artificial distortion , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[8] Massimo D'Apuzzo,et al. Modeling DAC Output Waveforms , 2010, IEEE Transactions on Instrumentation and Measurement.
[9] Michel Barbeau,et al. Detecting rogue devices in bluetooth networks using radio frequency fingerprinting , 2006, Communications and Computer Networks.
[10] Ian F. Akyildiz,et al. Wireless Sensor Networks: Akyildiz/Wireless Sensor Networks , 2010 .
[11] Michael A. Temple,et al. Sensitivity Analysis of Burst Detection and RF Fingerprinting Classification Performance , 2009, 2009 IEEE International Conference on Communications.
[12] Michel Barbeau,et al. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.
[13] U. Pesovic,et al. Implementation of IEEE 802.15.4 transceiver on software defined radio platform , 2012, 2012 20th Telecommunications Forum (TELFOR).
[14] Srdjan Capkun,et al. Physical-Layer Identification of Wireless Devices , 2011 .
[15] Hideki Ochiai,et al. Characterization of power spectral density for nonlinearly amplified OFDM signals based on cross-correlation coefficient , 2014, EURASIP J. Wirel. Commun. Netw..
[16] Ming-Wei Liu,et al. Specific Emitter Identification using Nonlinear Device Estimation , 2008, 2008 IEEE Sarnoff Symposium.
[17] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[18] Srdjan Capkun,et al. Transient-based identification of wireless sensor nodes , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[19] Zhu Han,et al. Physical Layer Security for Two Way Relay Communications with Friendly Jammers , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[20] Witold Kinsner,et al. Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.
[21] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[22] Dennis Goeckel,et al. Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion , 2015, IEEE Transactions on Wireless Communications.
[23] S. Ur Rehman,et al. The analysis of RF fingerprinting for low-end wireless receivers with application to IEEE 802.11a , 2012, 2012 International Conference on Selected Topics in Mobile and Wireless Networking.
[24] Robert Y. Levine,et al. Training-set-based performance measures for data-adaptive decisioning systems , 1992, Optics & Photonics.
[25] Mohamed-Slim Alouini,et al. Digital Communication Over Fading Channels: A Unified Approach to Performance Analysis , 2000 .
[26] Risto Wichman,et al. Receiver-side nonlinearities mitigation using an extended iterative decision-based technique , 2011, Signal Process..
[27] Witold Kinsner,et al. A radio transmitter fingerprinting system ODO-1 , 1996, Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering.
[28] Srdjan Capkun,et al. Physical-layer Identification of RFID Devices , 2009, USENIX Security Symposium.
[29] Christian Fager,et al. Successive Cancellation of Power Amplifier Distortion for Multiuser Detection , 2010, 2010 IEEE 72nd Vehicular Technology Conference - Fall.
[30] Kevin W. Sowerby,et al. RF fingerprint extraction from the energy envelope of an instantaneous transient signal , 2012, 2012 Australian Communications Theory Workshop (AusCTW).
[31] Dennis Goeckel,et al. Identifying Wireless Users via Transmitter Imperfections , 2011, IEEE Journal on Selected Areas in Communications.
[32] Ravi Kishore Kodali,et al. DDC and DUC filters in SDR platforms , 2013, 2013 15th International Conference on Advanced Computing Technologies (ICACT).
[33] Chin-Liang Wang,et al. Receiver Cancellation of Nonlinear Power Amplifier Distortion in SDMA-OFDM Systems , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[34] Mohamed-Slim Alouini,et al. On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.
[35] K. M. Gharaibeh,et al. Nonlinear Distortion in Wireless Systems: Modeling and Simulation with MATLAB , 2011 .
[36] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2010, IEEE Transactions on Mobile Computing.
[37] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.
[38] Rong Zheng,et al. On Identifying Primary User Emulation Attacks in Cognitive Radio Systems Using Nonparametric Bayesian Classification , 2012, IEEE Transactions on Signal Processing.
[39] Zhu Han,et al. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks , 2011, IEEE Transactions on Information Forensics and Security.
[40] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.