Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[3] Wenyuan Xu,et al. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.
[4] Shinsuke Hara,et al. Experimental Performance Comparison of RSSI- and TDOA-Based Location Estimation Methods , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[5] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[6] Mihail L. Sichitiu,et al. Physical authentication through localization in wireless local area networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[7] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[8] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[9] Darko Musicki,et al. Mobile Emitter Geolocation and Tracking Using TDOA and FDOA Measurements , 2010, IEEE Transactions on Signal Processing.
[10] B. R. Badrinath,et al. Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[11] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[12] Alex Orailoglu,et al. Ensuring system security through proximity based authentication , 2017, 2017 22nd Asia and South Pacific Design Automation Conference (ASP-DAC).