Guaranteeing spoof-resilient multi-robot networks
暂无分享,去创建一个
Swarun Kumar | Daniela Rus | Dina Katabi | Stephanie Gil | Mark Mazumder | D. Rus | D. Katabi | Swarun Kumar | Stephanie Gil | Mark Mazumder
[1] Yih-Chun Hu,et al. Lightweight source authentication and path validation , 2014, SIGCOMM.
[2] Houcem Gazzah,et al. Cramer-Rao bounds for antenna array design , 2006, IEEE Transactions on Signal Processing.
[3] Emilio Frazzoli,et al. Distributed and Adaptive Algorithms for Vehicle Routing in a Stochastic and Dynamic Environment , 2009, ArXiv.
[4] Sonia Martínez,et al. Coverage control for mobile sensing networks , 2002, IEEE Transactions on Robotics and Automation.
[5] Ting Wang,et al. Analysis on perfect location spoofing attacks using beamforming , 2013, 2013 Proceedings IEEE INFOCOM.
[6] JooSeok Song,et al. A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks , 2014, 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS).
[7] Petre Stoica,et al. MUSIC, maximum likelihood, and Cramer-Rao bound , 1989, IEEE Transactions on Acoustics, Speech, and Signal Processing.
[8] Maxim Likhachev,et al. Planning for landing site selection in the aerial supply delivery , 2011, 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[9] Helmut Klausing,et al. Feasibility of a Synthetic Aperture Radar with Rotating Antennas (ROSAR) , 1989, 1989 19th European Microwave Conference.
[10] Swarun Kumar,et al. Adaptive communication in multi-robot systems using directionality of signal strength , 2015, Int. J. Robotics Res..
[11] Eylem Ekici,et al. A Localization-Based Anti-Sensor Network System , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[12] Allan Tomlinson,et al. Modelling malicious entities in a robotic swarm , 2013, 2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC).
[13] Emilio Frazzoli,et al. Adaptive and Distributed Algorithms for Vehicle Routing in a Stochastic and Dynamic Environment , 2009, IEEE Transactions on Automatic Control.
[14] Jie Xiong,et al. SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.
[15] Christian Wietfeld,et al. AirShield: A system-of-systems MUAV remote sensing architecture for disaster response , 2009, 2009 3rd Annual IEEE Systems Conference.
[16] Mehrzad Malmirchegini,et al. On the Spatial Predictability of Communication Channels , 2012, IEEE Transactions on Wireless Communications.
[17] Mac Schwager,et al. Optimal coverage for multiple hovering robots with downward facing cameras , 2009, 2009 IEEE International Conference on Robotics and Automation.
[18] David Wetherall,et al. Tool release: gathering 802.11n traces with channel state information , 2011, CCRV.
[19] J. Sobana,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .
[20] Timothy W. McLain,et al. Decentralized Cooperative Aerial Surveillance Using Fixed-Wing Miniature UAVs , 2006, Proceedings of the IEEE.
[21] Candice King,et al. Fundamentals of wireless communications , 2013, 2014 67th Annual Conference for Protective Relay Engineers.
[22] Houcem Gazzah,et al. Directive antenna arrays for 3D source localization , 2003, 2003 4th IEEE Workshop on Signal Processing Advances in Wireless Communications - SPAWC 2003 (IEEE Cat. No.03EX689).
[23] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[24] Lynne E. Parker,et al. Distributed Algorithms for Multi-Robot Observation of Multiple Moving Targets , 2002, Auton. Robots.
[25] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[26] Peter Druschel,et al. Peer-to-peer systems , 2010, Commun. ACM.
[27] Michael D. Zoltowski,et al. Signal Subspace Techniques for Source Localization with Circular Sensor Arrays , 1994 .
[28] Michael A. Goodrich,et al. UAV intelligent path planning for Wilderness Search and Rescue , 2009, 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[29] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[30] Swarun Kumar,et al. Accurate indoor localization with zero start-up cost , 2014, MobiCom.
[31] Xin Liu,et al. Passport: Secure and Adoptable Source Authentication , 2008, NSDI.
[32] Swarun Kumar,et al. Interference alignment by motion , 2013, MobiCom.
[33] Michalis Faloutsos,et al. Coping with packet replay attacks in wireless networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[34] Mac Schwager,et al. Decentralized, Adaptive Coverage Control for Networked Robots , 2009, Int. J. Robotics Res..
[35] Gilbert Laporte,et al. Solving a Family of Multi-Depot Vehicle Routing and Location-Routing Problems , 1988, Transp. Sci..
[36] Monson H. Hayes,et al. Statistical Digital Signal Processing and Modeling , 1996 .
[37] Candice King,et al. Fundamentals of wireless communications , 2013, 2013 IEEE Rural Electric Power Conference (REPC).
[38] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[39] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[40] W. Brown. Synthetic Aperture Radar , 1967, IEEE Transactions on Aerospace and Electronic Systems.
[41] Yue Liu,et al. The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities , 2014, IEEE Transactions on Mobile Computing.
[42] Jue Wang,et al. Dude, where's my card?: RFID positioning that works with multipath and non-line of sight , 2013, SIGCOMM.
[43] John N. Tsitsiklis,et al. Introduction to Probability , 2002 .
[44] Swarun Kumar,et al. LTE radio analytics made easy and accessible , 2014 .
[45] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[46] Allan Tomlinson,et al. Threats to the Swarm: Security Considerations for Swarm Robotics , 2009 .
[47] Richard M. Murray,et al. Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.
[48] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[49] Swarun Kumar,et al. Guaranteeing spoof-resilient multi-robot networks , 2015, Auton. Robots.
[50] Mehran Mesbahi,et al. Identification and Infiltration in Consensus-type Networks* *This work has been supported by AFOSR FA9550-09-1-0091. , 2009 .
[51] Antonio Alfredo Ferreira Loureiro,et al. Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[52] Tom Fawcett,et al. ROC Graphs: Notes and Practical Considerations for Researchers , 2007 .
[53] George J. Pappas,et al. Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.
[54] Jie Yang,et al. Practical user authentication leveraging channel state information (CSI) , 2014, AsiaCCS.