Guaranteeing spoof-resilient multi-robot networks

[1]  D. Rus,et al.  Guaranteeing spoof-resilient multi-robot networks , 2015, Autonomous Robots.

[2]  Swarun Kumar,et al.  Adaptive communication in multi-robot systems using directionality of signal strength , 2015, Int. J. Robotics Res..

[3]  Yue Liu,et al.  The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities , 2014, IEEE Transactions on Mobile Computing.

[4]  Swarun Kumar,et al.  Accurate indoor localization with zero start-up cost , 2014, MobiCom.

[5]  Swarun Kumar,et al.  LTE radio analytics made easy and accessible , 2014 .

[6]  Yih-Chun Hu,et al.  Lightweight source authentication and path validation , 2014, SIGCOMM.

[7]  JooSeok Song,et al.  A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks , 2014, 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS).

[8]  Jie Yang,et al.  Practical user authentication leveraging channel state information (CSI) , 2014, AsiaCCS.

[9]  Candice King,et al.  Fundamentals of wireless communications , 2013, 2014 67th Annual Conference for Protective Relay Engineers.

[10]  J. Sobana,et al.  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .

[11]  Candice King,et al.  Fundamentals of wireless communications , 2013, 2013 IEEE Rural Electric Power Conference (REPC).

[12]  George J. Pappas,et al.  Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.

[13]  Allan Tomlinson,et al.  Modelling malicious entities in a robotic swarm , 2013, 2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC).

[14]  Jie Xiong,et al.  SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.

[15]  Swarun Kumar,et al.  Interference alignment by motion , 2013, MobiCom.

[16]  Jue Wang,et al.  Dude, where's my card?: RFID positioning that works with multipath and non-line of sight , 2013, SIGCOMM.

[17]  Ting Wang,et al.  Analysis on perfect location spoofing attacks using beamforming , 2013, 2013 Proceedings IEEE INFOCOM.

[18]  Mehrzad Malmirchegini,et al.  On the Spatial Predictability of Communication Channels , 2012, IEEE Transactions on Wireless Communications.

[19]  Maxim Likhachev,et al.  Planning for landing site selection in the aerial supply delivery , 2011, 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[20]  Michalis Faloutsos,et al.  Coping with packet replay attacks in wireless networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[21]  David Wetherall,et al.  Tool release: gathering 802.11n traces with channel state information , 2011, CCRV.

[22]  Emilio Frazzoli,et al.  Adaptive and Distributed Algorithms for Vehicle Routing in a Stochastic and Dynamic Environment , 2009, IEEE Transactions on Automatic Control.

[23]  Peter Druschel,et al.  Peer-to-peer systems , 2010, Commun. ACM.

[24]  Allan Tomlinson,et al.  Threats to the Swarm: Security Considerations for Swarm Robotics , 2009 .

[25]  Michael A. Goodrich,et al.  UAV intelligent path planning for Wilderness Search and Rescue , 2009, 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[26]  Mehran Mesbahi,et al.  Identification and Infiltration in Consensus-type Networks* *This work has been supported by AFOSR FA9550-09-1-0091. , 2009 .

[27]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[28]  Mac Schwager,et al.  Optimal coverage for multiple hovering robots with downward facing cameras , 2009, 2009 IEEE International Conference on Robotics and Automation.

[29]  Christian Wietfeld,et al.  AirShield: A system-of-systems MUAV remote sensing architecture for disaster response , 2009, 2009 3rd Annual IEEE Systems Conference.

[30]  Mac Schwager,et al.  Decentralized, Adaptive Coverage Control for Networked Robots , 2009, Int. J. Robotics Res..

[31]  Emilio Frazzoli,et al.  Distributed and Adaptive Algorithms for Vehicle Routing in a Stochastic and Dynamic Environment , 2009, ArXiv.

[32]  Xin Liu,et al.  Passport: Secure and Adoptable Source Authentication , 2008, NSDI.

[33]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[34]  Eylem Ekici,et al.  A Localization-Based Anti-Sensor Network System , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[35]  Tom Fawcett,et al.  ROC Graphs: Notes and Practical Considerations for Researchers , 2007 .

[36]  Timothy W. McLain,et al.  Decentralized Cooperative Aerial Surveillance Using Fixed-Wing Miniature UAVs , 2006, Proceedings of the IEEE.

[37]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[38]  Houcem Gazzah,et al.  Cramer-Rao bounds for antenna array design , 2006, IEEE Transactions on Signal Processing.

[39]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[40]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[41]  Richard M. Murray,et al.  Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.

[42]  Antonio Alfredo Ferreira Loureiro,et al.  Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[43]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[44]  Sonia Martínez,et al.  Coverage control for mobile sensing networks , 2002, IEEE Transactions on Robotics and Automation.

[45]  Houcem Gazzah,et al.  Directive antenna arrays for 3D source localization , 2003, 2003 4th IEEE Workshop on Signal Processing Advances in Wireless Communications - SPAWC 2003 (IEEE Cat. No.03EX689).

[46]  Lynne E. Parker,et al.  Distributed Algorithms for Multi-Robot Observation of Multiple Moving Targets , 2002, Auton. Robots.

[47]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[48]  F. Bullo,et al.  Coverage control for mobile sensing networks , 2002, Proceedings 2002 IEEE International Conference on Robotics and Automation (Cat. No.02CH37292).

[49]  John N. Tsitsiklis,et al.  Introduction to Probability , 2002 .

[50]  Monson H. Hayes,et al.  Statistical Digital Signal Processing and Modeling , 1996 .

[51]  Michael D. Zoltowski,et al.  Signal Subspace Techniques for Source Localization with Circular Sensor Arrays , 1994 .

[52]  Helmut Klausing,et al.  Feasibility of a Synthetic Aperture Radar with Rotating Antennas (ROSAR) , 1989, 1989 19th European Microwave Conference.

[53]  Petre Stoica,et al.  MUSIC, maximum likelihood, and Cramer-Rao bound , 1989, IEEE Transactions on Acoustics, Speech, and Signal Processing.

[54]  Gilbert Laporte,et al.  Solving a Family of Multi-Depot Vehicle Routing and Location-Routing Problems , 1988, Transp. Sci..

[55]  W. Brown Synthetic Aperture Radar , 1967, IEEE Transactions on Aerospace and Electronic Systems.