An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems
暂无分享,去创建一个
Qi Xiong | Ying-Chang Liang | Kwok Hung Li | Yi Gong | K. H. Li | Ying-Chang Liang | Qi Xiong | Yi Gong
[1] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[2] J. Sobana,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .
[3] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[4] Xiangyun Zhou,et al. Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.
[5] Zhu Han,et al. On the impact of network-state knowledge on the Feasibility of secrecy , 2013, 2013 IEEE International Symposium on Information Theory.
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Xianbin Wang,et al. Robust physical layer authentication using inherent properties of channel impulse response , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[8] Wade Trappe,et al. Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships , 2007, IEEE Transactions on Information Forensics and Security.
[9] Erik G. Larsson,et al. Scaling Up MIMO: Opportunities and Challenges with Very Large Arrays , 2012, IEEE Signal Process. Mag..
[10] Björn E. Ottersten,et al. Detection of pilot contamination attack using random training and massive MIMO , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[11] Andrey Garnaev,et al. The eavesdropping and Jamming Dilemma in multi-channel communications , 2013, 2013 IEEE International Conference on Communications (ICC).
[12] Xiangyun Zhou,et al. A Semiblind Two-Way Training Method for Discriminatory Channel Estimation in MIMO Systems , 2014, IEEE Transactions on Communications.
[13] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[14] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[15] Qi Xiong,et al. Achieving Secrecy of MISO Fading Wiretap Channels via Jamming and Precoding With Imperfect Channel State Information , 2014, IEEE Wireless Communications Letters.
[16] Athina P. Petropulu,et al. Ergodic Secrecy Rate for Multiple-Antenna Wiretap Channels With Rician Fading , 2011, IEEE Transactions on Information Forensics and Security.
[17] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[18] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[19] Larry J. Greenstein,et al. Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.
[20] D. Hinkley. On the ratio of two correlated normal random variables , 1969 .
[21] Yonghong Zeng,et al. Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Trans. Wirel. Commun..
[22] Sennur Ulukus,et al. Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.
[23] Larry J. Greenstein,et al. PHY-Authentication Protocol for Spoofing Detection in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.