Radio Propagation Characteristics-based Spoofing Attack Prevention on Wireless Connected Devices
暂无分享,去创建一个
[1] Xue Liu,et al. Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[2] Darko Musicki,et al. Mobile Emitter Geolocation and Tracking Using TDOA and FDOA Measurements , 2010, IEEE Transactions on Signal Processing.
[3] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[4] Minyue Fu,et al. Distributed Localization for 2-D Sensor Networks With Bearing-Only Measurements Under Switching Topologies , 2016, IEEE Transactions on Signal Processing.
[5] Wenyuan Xu,et al. HlcAuth: Key-free and Secure Communications via Home-Limited Channel , 2018, AsiaCCS.
[6] Kevin Fu,et al. Design challenges for secure implantable medical devices , 2012, DAC Design Automation Conference 2012.
[7] Miao Xu,et al. Lightweight secure communication protocols for in-vehicle sensor networks , 2013, CyCAR '13.
[8] Shinsuke Hara,et al. Experimental Performance Comparison of RSSI- and TDOA-Based Location Estimation Methods , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[9] Friedrich Jondral,et al. A low cost TDOA localization system: Setup, challenges and results , 2013, 2013 10th Workshop on Positioning, Navigation and Communication (WPNC).
[10] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[11] Hua Zeng,et al. The Effect of the Vehicle Body on EM Propagation in Tire Pressure Monitoring Systems , 2012, IEEE Transactions on Antennas and Propagation.
[12] Jizhong Zhao,et al. Replay-resilient Physical-layer Authentication for Battery-free IoT Devices , 2017, HotWireless '17.
[13] Chao Gao,et al. Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System , 2017, IEEE Internet of Things Journal.
[14] Rashid Rashidzadeh,et al. Secure authentication and access mechanism for IoT wireless sensors , 2017, 2017 IEEE International Symposium on Circuits and Systems (ISCAS).
[15] David G. Michelson,et al. RSSI-Based Distributed Self-Localization for Wireless Sensor Networks Used in Precision Agriculture , 2015, IEEE Transactions on Wireless Communications.
[16] Mihail L. Sichitiu,et al. Physical authentication through localization in wireless local area networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[17] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[18] Srdjan Capkun,et al. Proximity-based access control for implantable medical devices , 2009, CCS.
[19] Ozan K. Tonguz,et al. Zigbee-based intra-car wireless sensor networks: a case study , 2007, IEEE Wireless Communications.
[20] Alex Orailoglu,et al. Ensuring system security through proximity based authentication , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).
[21] R. Michael Buehrer,et al. On the value of collaboration in anchorless robot self-localization , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[22] B. R. Badrinath,et al. Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[23] Wenyuan Xu,et al. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.
[24] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[25] Ali Abdi,et al. On the estimation of the K parameter for the Rice fading distribution , 2001, IEEE Communications Letters.
[26] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[27] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[28] Deepak Prashar,et al. Performance Analysis of Secure Localization Techniques in Wireless Sensor Network , 2016, ICTCS.
[29] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[30] M. Ylianttila,et al. Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications , 2015, IEEE Access.
[31] Sheng Liu,et al. Study on Electromagnetic Wave Propagation Characteristics in Rotating Environments and Its Application in Tire Pressure Monitoring , 2012, IEEE Transactions on Instrumentation and Measurement.
[32] Rekha Jain,et al. Wireless Sensor Network -A Survey , 2013 .
[33] Prasant Mohapatra,et al. Good Neighbor : Secure Pairing of Nearby Wireless Devices by Multiple Antennas ∗ , 2011 .
[34] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[35] Haruichi Kanaya,et al. Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics , 2017, 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[36] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.