Physical layer assisted security for mobile OFDM networks
暂无分享,去创建一个
[1] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[2] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[3] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[4] William H. Press,et al. Numerical recipes , 1990 .
[5] William A. Arbaugh,et al. Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..
[6] David R. Cheriton,et al. Scalable location-based security in wireless networks , 2006 .
[7] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[8] Sinem Coleri Ergen,et al. Channel estimation techniques based on pilot arrangement in OFDM systems , 2002, IEEE Trans. Broadcast..
[9] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[10] John Terry,et al. OFDM Wireless LANs: A Theoretical and Practical Guide , 2001 .
[11] Andrew B. Johnson. Simulation of digital transmission over mobile channels at 300 kb/s , 1991, IEEE Trans. Commun..
[12] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[13] Vinko Erceg,et al. Channel Models for Fixed Wireless Applications , 2001 .
[14] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[15] Santhanakrishnan Anand,et al. On the Secrecy Capacity of Fading Cognitive Wireless Networks , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[16] E. Ratazzi,et al. COOPERATIVE COMMUNICATIONS FOR WIRELESS INFORMATION ASSURANCE: SECURE COOPERATIVE COMMUNICATIONS AND TESTBED DEVELOPMENT , 2007 .
[17] Xiaohua Li,et al. Cooperative Communications for Wireless Information Assurance , 2005 .
[18] Ueli Maurer,et al. Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.
[19] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[20] H. Vincent Poor,et al. Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.
[21] Jesse Walker,et al. Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .
[22] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[23] Didem Kivanc-Tureli,et al. EPSON: Enhanced Physical Security in OFDM Networks , 2009, 2009 IEEE International Conference on Communications.