Geo-Spatial Location Spoofing Detection for Internet of Things
暂无分享,去创建一个
Lawrence Wai-Choong Wong | Ido Nevat | Derek Leong | Jing Yang Koh | I. Nevat | L. Wong | Derek Leong
[1] S Lanzisera,et al. Radio Frequency Time-of-Flight Distance Measurement for Low-Cost Wireless Sensor Localization , 2011, IEEE Sensors Journal.
[2] R.L. Moses,et al. Locating the nodes: cooperative localization in wireless sensor networks , 2005, IEEE Signal Processing Magazine.
[3] Srdjan Capkun,et al. Integrity Regions: Authentication through Presence in Wireless Networks , 2010, IEEE Trans. Mob. Comput..
[4] Sarvesh Bhardwaj,et al. Secure and Robust Localization in a Wireless Ad Hoc Environment , 2009, IEEE Transactions on Vehicular Technology.
[5] E. S. Pearson,et al. On the Problem of the Most Efficient Tests of Statistical Hypotheses , 1933 .
[6] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[7] Mikhail Nesterenko,et al. Secure Location Verification Using Radio Broadcast , 2004, IEEE Transactions on Dependable and Secure Computing.
[8] A. Ramesh,et al. DISCOVERY AND VERIFICATION OF NEIGHBOR POSITIONS IN MOBILE AD HOC NETWORKS , 2014 .
[9] Yong Guan,et al. Lightweight Location Verification Algorithms for Wireless Sensor Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[10] Moe Z. Win,et al. Ranging With Ultrawide Bandwidth Signals in Multipath Environments , 2009, Proceedings of the IEEE.
[11] Theodore S. Rappaport,et al. Wireless Communications: Principles and Practice (2nd Edition) by , 2012 .
[12] Shihao Yan,et al. Optimal Information-Theoretic Wireless Location Verification , 2012, IEEE Transactions on Vehicular Technology.
[13] Shihao Yan,et al. Location Verification Systems for VANETs in Rician Fading Channels , 2014, IEEE Transactions on Vehicular Technology.
[14] S. Kay. Fundamentals of statistical signal processing: estimation theory , 1993 .
[15] Ismail Güvenç,et al. A Survey on TOA Based Wireless Localization and NLOS Mitigation Techniques , 2009, IEEE Communications Surveys & Tutorials.
[16] Jihyuk Choi,et al. Secure Location Verification Using Simultaneous Multilateration , 2012, IEEE Transactions on Wireless Communications.
[17] Po Yang. PRLS-INVES: A General Experimental Investigation Strategy for High Accuracy and Precision in Passive RFID Location Systems , 2015, IEEE Internet of Things Journal.
[18] Marco Fiore,et al. Verification and Inference of Positions in Vehicular Networks through Anonymous Beaconing , 2014, IEEE Transactions on Mobile Computing.
[19] Gianluca Dini,et al. On the Feasibility of Overshadow Enlargement Attack on IEEE 802.15.4a Distance Bounding , 2014, IEEE Communications Letters.
[20] Nicola Basilico,et al. Security Games for Node Localization through Verifiable Multilateration , 2014, IEEE Transactions on Dependable and Secure Computing.
[21] Alfred O. Hero,et al. Relative location estimation in wireless sensor networks , 2003, IEEE Trans. Signal Process..
[22] Shihao Yan,et al. An information theoretic Location Verification System for wireless networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[23] Ragib Hasan,et al. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices , 2016, IEEE Transactions on Emerging Topics in Computing.
[24] D. Rubin. INFERENCE AND MISSING DATA , 1975 .
[25] Marcin Poturalski,et al. The cicada attack: Degradation and denial of service in IR ranging , 2010, 2010 IEEE International Conference on Ultra-Wideband.
[26] Moe Z. Win,et al. A Machine Learning Approach to Ranging Error Mitigation for UWB Localization , 2012, IEEE Transactions on Communications.
[27] Tarek F. Abdelzaher,et al. Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.
[28] Erol Gelenbe,et al. Signalling storms in 3G mobile networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[29] Patrick P. C. Lee,et al. On the detection of signaling DoS attacks on 3G/WiMax wireless networks , 2009, Comput. Networks.
[30] E. S. Pearson,et al. On the Problem of the Most Efficient Tests of Statistical Hypotheses , 1933 .
[31] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[32] Shihao Yan,et al. Timing information in wireless communications and optimal location verification frameworks , 2014, 2014 Australian Communications Theory Workshop (AusCTW).
[33] Srdjan Capkun,et al. Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.
[34] Erol Gelenbe,et al. Mitigating for Signalling Attacks in UMTS Networks , 2014, ISCIS.