ShieldScatter: Improving IoT Security with Backscatter Assistance
暂无分享,去创建一个
Tao Jiang | Wei Wang | Qian Zhang | Jun Qu | Zhiqing Luo
[1] Tao Jiang,et al. Securing On-Body IoT Devices By Exploiting Creeping Wave Propagation , 2018, IEEE Journal on Selected Areas in Communications.
[2] Marco Gruteser,et al. Detecting Identity Spoofs in IEEE 802.11e Wireless Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[3] Peng Ning,et al. Enhanced wireless channel authentication using time-synched link signature , 2012, 2012 Proceedings IEEE INFOCOM.
[4] Joshua R. Smith,et al. FM Backscatter: Enabling Connected Cities and Smart Fabrics , 2017, NSDI.
[5] Sachin Katti,et al. Localizing Low-power Backscatter Tags Using Commodity WiFi , 2017, CoNEXT.
[6] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[7] Yao Liu,et al. Where are you from?: confusing location distinction using virtual multipath camouflage , 2014, MobiCom.
[8] Xiaohui Liang,et al. Wanda: Securely introducing mobile devices , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[9] Jie Xiong,et al. SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.
[10] Jue Wang,et al. Dude, where's my card?: RFID positioning that works with multipath and non-line of sight , 2013, SIGCOMM.
[11] Peng Ning,et al. Is link signature dependable for wireless security? , 2013, 2013 Proceedings IEEE INFOCOM.
[12] R. Steele,et al. Mobile Radio Communications , 1999 .
[13] Wade Trappe,et al. ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.
[14] Mohammad Rostami,et al. Enabling Practical Backscatter Communication for On-body Sensors , 2016, SIGCOMM.
[15] Sachin Katti,et al. SpotFi: Decimeter Level Localization Using WiFi , 2015, SIGCOMM.
[16] Philip Chan,et al. Toward accurate dynamic time warping in linear time and space , 2007, Intell. Data Anal..
[17] Christian Gehrmann,et al. Manual authentication for wireless devices , 2004 .
[18] Xiang-Yang Li,et al. Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information , 2012, 2013 Proceedings IEEE INFOCOM.
[19] Joshua R. Smith,et al. Wi-fi backscatter , 2014, SIGCOMM 2015.
[20] Lajos Hanzo,et al. Mobile Radio Communications: Second and Third Generation Cellular and WATM Systems: 2nd , 1999 .
[21] Piotr Indyk,et al. Efficient and reliable low-power backscatter networks , 2012, CCRV.
[22] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[23] Prasant Mohapatra,et al. Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas , 2011, NDSS.
[24] Sneha Kumar Kasera,et al. Advancing wireless link signatures for location distinction , 2008, MobiCom '08.
[25] Peng Ning,et al. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.
[26] Ross A. Knepper,et al. RF-compass: robot object manipulation using RFIDs , 2013, MobiCom.
[27] David Wetherall,et al. Ambient backscatter: wireless communication out of thin air , 2013, SIGCOMM.
[28] Lei Yang,et al. Tagoram: real-time tracking of mobile RFID tags to high precision using COTS devices , 2014, MobiCom.
[29] KatabiDina,et al. Efficient and reliable low-power backscatter networks , 2012 .
[30] Prasant Mohapatra,et al. Good Neighbor : Secure Pairing of Nearby Wireless Devices by Multiple Antennas ∗ , 2011 .
[31] Josef Kittler,et al. Financial Cryptography and Data Security , 2012, Lecture Notes in Computer Science.
[32] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[33] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[34] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.