Effective UAV and Ground Sensor Authentication
暂无分享,去创建一个
Xiaojiang Du | Chenglong Fu | E. Paul Ratazzi | Xuening Xu | E. Ratazzi | Xiaojiang Du | Chenglong Fu | Xuening Xu
[1] I. S. Moskowitz,et al. Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.
[2] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[3] Stefano Chessa,et al. A Novel Approach to Indoor RSSI Localization by Automatic Calibration of the Wireless Propagation Model , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.
[4] Zhiqiang He,et al. A Classifier Method for Detection of Covert Channels over LTE , 2017, 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).
[5] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[6] Ming Li,et al. BANA: Body Area Network Authentication Exploiting Channel Characteristics , 2012, IEEE Journal on Selected Areas in Communications.
[7] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[8] Carla E. Brodley,et al. IP covert timing channels: design and detection , 2004, CCS '04.
[9] Mohsen Guizani,et al. A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[10] Liang Xiao,et al. Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.
[11] Bilal Erman Bilgin,et al. Performance evaluations of ZigBee in different smart grid environments , 2012, Comput. Networks.
[12] Kemal Akkaya,et al. A novel storage covert channel on wearable devices using status bar notifications , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[13] Luke Deshotels,et al. Inaudible Sound as a Covert Channel in Mobile Devices , 2014, WOOT.
[14] Eyal de Lara,et al. Ensemble: cooperative proximity-based authentication , 2010, MobiSys '10.
[15] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[16] Guevara Noubir,et al. An autonomic and permissionless Android covert channel , 2017, WISEC.
[17] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..