Wireless Device Identification Based on RF Oscillator Imperfections
暂无分享,去创建一个
[1] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[2] A.A. Tomko,et al. Physical-Layer Intrusion Detection in Wireless Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[3] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[4] O. H. Tekbas,et al. An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions , 2004, Canadian Journal of Electrical and Computer Engineering.
[5] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[6] Keith E. Nolan,et al. Radio Transmitter Fingerprinting: A Steady State Frequency Domain Approach , 2008, 2008 IEEE 68th Vehicular Technology Conference.
[7] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[8] Michel Barbeau,et al. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.
[9] Jeyanthi Hall,et al. Detection of rogue devices in wireless networks , 2006 .
[10] Amit Mehrotra,et al. Noise analysis of phase-locked loops , 2000, IEEE/ACM International Conference on Computer Aided Design. ICCAD - 2000. IEEE/ACM Digest of Technical Papers (Cat. No.00CH37140).
[11] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[12] O. Ureten,et al. Bayesian detection of Wi-Fi transmitter RF fingerprints , 2005 .
[13] Steffen Bittner,et al. Tutorial on Discrete Time Phase Noise Modeling for Phase Locked Loops , 2008 .
[14] Mani Mina,et al. Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.
[15] A. Demir,et al. Phase noise in oscillators: a unifying theory and numerical methods for characterization , 2000 .
[16] L. E. Langley,et al. Specific emitter identification (SEI) and classical parameter fusion technology , 1993, Proceedings of WESCON '93.
[17] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[18] Dennis Goeckel,et al. Identifying Wireless Users via Transmitter Imperfections , 2011, IEEE Journal on Selected Areas in Communications.
[19] Mohamed El-Tanany,et al. Analytical modeling and simulation of phase noise interference in OFDM-based digital television terrestrial broadcasting systems , 2001, IEEE Trans. Broadcast..
[20] A. Gualtierotti. H. L. Van Trees, Detection, Estimation, and Modulation Theory, , 1976 .
[21] M.M. Buddhikot,et al. Passive Steady State RF Fingerprinting: A Cognitive Technique for Scalable Deployment of Co-Channel Femto Cell Underlays , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[22] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[23] Tim Schenk,et al. RF Imperfections in High-rate Wireless Systems , 2008 .
[24] Tim Schenk,et al. RF Imperfections in High-rate Wireless Systems: Impact and Digital Compensation , 2008 .
[25] T. W. Anderson,et al. On the Asymptotic Distribution of the Autocorrelations of a Sample from a Linear Stochastic Process , 1964 .
[26] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[27] Sepideh Dolatshahi,et al. Identification of wireless users via power amplifier imperfections , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[28] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[29] Michel Barbeau,et al. DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .
[30] Farinaz Koushanfar,et al. Robust stable radiometric fingerprinting for wireless devices , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[31] N. Serinken,et al. Characteristics of radio transmitter fingerprints , 2001 .
[32] Aftab Ahmad. Data Communication Principles , 2002, Springer US.
[33] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.
[34] Oktay Üreten,et al. Bayesian detection of radio transmitter turn-on transients , 1999, NSIP.
[35] Rong Zheng,et al. Device fingerprinting to enhance wireless security using nonparametric Bayesian method , 2011, 2011 Proceedings IEEE INFOCOM.