Channel-Based Detection of Sybil Attacks in Wireless Networks
暂无分享,去创建一个
Larry J. Greenstein | Liang Xiao | Wade Trappe | Narayan B. Mandayam | N. Mandayam | W. Trappe | L. Greenstein | Liang Xiao
[1] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[2] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[3] Larry J. Greenstein,et al. A Physical-Layer Technique to Enhance Authentication for Mobile Terminals , 2008, 2008 IEEE International Conference on Communications.
[4] Larry J. Greenstein,et al. MIMO-assisted channel-based authentication in wireless networks , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[5] Jeffrey G. Andrews,et al. Broadband wireless access with WiMax/802.16: current performance benchmarks and future potential , 2005, IEEE Communications Magazine.
[6] Lutz H.-J. Lampe,et al. Performance Analysis and Enhancement of Multiband OFDM for UWB Communications , 2007, IEEE Transactions on Wireless Communications.
[7] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[8] Milton Abramowitz,et al. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .
[9] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[10] William A. Arbaugh,et al. An Initial Security Analysis of the IEEE 802.1X Standard , 2002 .
[11] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[12] Richard P. Martin,et al. Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[13] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[14] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[15] W. C. Jakes,et al. Microwave Mobile Communications , 1974 .
[16] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[17] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[18] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[19] Brian W. Kernighan,et al. WISE design of indoor wireless systems: practical computation and optimization , 1995 .
[20] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.
[21] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[22] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[23] Sushil Jajodia,et al. Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[24] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[25] Donggang Liu,et al. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.
[26] Irene A. Stegun,et al. Handbook of Mathematical Functions. , 1966 .
[27] J.E. Mazo,et al. Digital communications , 1985, Proceedings of the IEEE.
[28] William A. Arbaugh,et al. Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.
[29] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..