Analysis on perfect location spoofing attacks using beamforming
暂无分享,去创建一个
[1] Sunghun Kim,et al. Robust Localization with Unknown Transmission Power for Cognitive Radio , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[2] Richard P. Martin,et al. Attack Detection in Wireless Localization , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[3] Richard P. Martin,et al. Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[4] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[5] Prashant Krishnamurthy,et al. Modeling of indoor positioning systems based on location fingerprinting , 2004, IEEE INFOCOM 2004.
[6] Ioannis N. Psaromiligkos,et al. Received signal strength based location estimation of a wireless LAN client , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[7] R. Michael Buehrer,et al. Location Spoofing Attack Detection in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[8] Indrakshi Ray,et al. Towards a location-based mandatory access control model , 2006, Comput. Secur..
[9] Xiaoyan Li. Designing localization algorithms robust to signal strength attacks , 2011, 2011 Proceedings IEEE INFOCOM.
[10] Ernesto Damiani,et al. Supporting location-based conditions in access control policies , 2006, ASIACCS '06.
[11] Nikos D. Sidiropoulos,et al. Transmit beamforming for physical-layer multicasting , 2006, IEEE Transactions on Signal Processing.
[12] Zhi-Quan Luo,et al. Semidefinite Relaxation of Quadratic Optimization Problems , 2010, IEEE Signal Processing Magazine.
[13] Srinivasan Seshan,et al. Access Point Localization Using Local Signal Strength Gradient , 2009, PAM.
[14] R. Vescovo. Pattern synthesis with null constraints for circular arrays of equally spaced isotropic elements , 1996 .
[15] Markus Breitenbach,et al. The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[16] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[17] V. Padmanabhan,et al. Enhancements to the RADAR User Location and Tracking System , 2000 .