Implications of radio fingerprinting on the security of sensor networks
暂无分享,去创建一个
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[3] George V. Moustakides. Performance of CUSUM tests for detecting changes in continuous time processes , 2002, Proceedings IEEE International Symposium on Information Theory,.
[4] W. Kinsner,et al. Multifractal modelling of radio transmitter transients for classification , 1997, IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings.
[5] T. Lindh,et al. Signal Discrimination Based on Power Spectrum of Filter Response , 2002 .
[6] Michel Barbeau,et al. DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .
[7] Thia Kirubarajan,et al. Estimation with Applications to Tracking and Navigation: Theory, Algorithms and Software , 2001 .
[8] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[9] Reginald Victor Jones,et al. Most Secret War , 1978 .
[10] Levente Buttyán,et al. Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.
[11] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[12] Milos Doroslovacki,et al. Automatic radio station detection by clustering power spectrum components , 2002, ICASSP.
[13] Claude Castelluccia,et al. Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.
[14] Mani Mina,et al. Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.
[15] Michel Barbeau,et al. Intrusion detection and radio frequency fingerprinting in mobile and wireless networks , 2003 .
[16] N. Serinken,et al. Characteristics of radio transmitter fingerprints , 2001 .
[17] O. Ureten,et al. Detection of radio transmitter turn-on transients , 1999 .
[18] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[19] Radha Poovendran,et al. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.
[20] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[21] Ralph D. Hippenstiel,et al. Wavelet Based Transmitter Identification , 1996, Fourth International Symposium on Signal Processing and Its Applications.
[22] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[23] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[24] Bodhi Priyantha,et al. The Cricket indoor location system , 2005 .
[25] Yalcin Payal. Identification of Push-To-Talk Transmitters Using Wavelets. , 1995 .
[26] Jesse Hansen. Selected Approaches to Estimation of Signal Phase , 2003 .
[27] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[28] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[29] A. Viterbi. CDMA: Principles of Spread Spectrum Communication , 1995 .
[30] 马克斯·B·弗雷德里克. Cellular telephone anti-fraud system , 1994 .
[31] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[32] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.