Security in Visible Light Communication : Novel Challenges and Opportunities
暂无分享,去创建一个
Daniele Puccinelli | Thiemo Voigt | Christian Rohner | Shahid Raza | S. Raza | T. Voigt | D. Puccinelli | C. Rohner
[1] Guobin Shen,et al. Epsilon: A Visible Light Based Positioning System , 2014, NSDI.
[2] N. Asokan,et al. Secure device pairing based on a visual channel , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[3] Peter I. Corke,et al. Data muling over underwater wireless sensor networks using an autonomous underwater vehicle , 2006, Proceedings 2006 IEEE International Conference on Robotics and Automation, 2006. ICRA 2006..
[4] Dominic O'Brien,et al. Demonstration of high-speed data transmission using MIMO-OFDM visible light communications , 2010, 2010 IEEE Globecom Workshops.
[5] Bengt Ahlgren,et al. Spontnet: experiences in configuring and securing small ad hoc networks , 2002, Proceedings 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications.
[6] Chunming Hu,et al. Enhancing reliability to boost the throughput over screen-camera links , 2014, MobiCom.
[7] Yosuke Kurihara,et al. Study of visible light communication system using RGB LED lights , 2011, SICE Annual Conference 2011.
[8] Sang Hyuk Son,et al. JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.
[9] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[10] Lutz H.-J. Lampe,et al. Physical-layer security for indoor visible light communications , 2014, 2014 IEEE International Conference on Communications (ICC).
[11] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[12] Cong Wang,et al. SBVLC: Secure barcode-based visible light communication for smartphones , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[13] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[14] Guobin Shen,et al. Pharos: enable physical analytics through visible light based indoor localization , 2013, HotNets.
[15] Adi Shamir,et al. How to share a secret , 1979, CACM.
[16] Gang Chen,et al. Line-of-sight visible light communication system design and demonstration , 2010, 2010 7th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP 2010).
[17] K. Langer,et al. 513 Mbit/s Visible Light Communications Link Based on DMT-Modulation of a White LED , 2010, Journal of Lightwave Technology.
[18] Stefan Schmid,et al. LED-to-LED visible light communication networks , 2013, MobiHoc '13.
[19] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[20] Murat Yuksel,et al. LIGHTNETs: Smart LIGHTing and Mobile Optical Wireless NETworks — A Survey , 2013, IEEE Communications Surveys & Tutorials.
[21] Dominic C. O'Brien,et al. Multiple input multiple output systems for optical wireless: challenges and possibilities , 2006, SPIE Optics + Photonics.
[22] H. Haas,et al. A 3-Gb/s Single-LED OFDM-Based Wireless VLC Link Using a Gallium Nitride $\mu{\rm LED}$ , 2014, IEEE Photonics Technology Letters.
[23] Gang Zhou,et al. DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[24] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[25] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[26] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[27] Harald Haas,et al. Visible light communication using OFDM , 2006, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006..
[28] Ronald L. Rivest,et al. Chaffing and Winnowing: Confidentiality without Encryption , 2012 .
[29] Kaigui Bian,et al. Strata: layered coding for scalable visual communication , 2014, MobiCom.
[30] Guoliang Xing,et al. COBRA: color barcode streaming for smartphone systems , 2012, MobiSys '12.
[31] Jin Young Kim,et al. Mitigation Technique for Receiver Performance Variation of Multi-Color Channels in Visible Light Communication , 2011, Sensors.
[32] Svilen Dimitrov,et al. Clipping Noise in OFDM-Based Optical Wireless Communication Systems , 2012, IEEE Transactions on Communications.
[33] Xia Zhou,et al. Human Sensing Using Visible Light Communication , 2015, MobiCom.
[34] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[35] Jens B. Schmitt,et al. Detection of reactive jamming in DSSS-based wireless networks , 2013, WiSec '13.
[36] Steve Hanna. Configuring Security Parameters in Small Devices , 2002 .
[37] Harald Haas,et al. Optical Spatial Modulation , 2011, IEEE/OSA Journal of Optical Communications and Networking.