Physical layer identification of LoRa devices using constellation trace figure
暂无分享,去创建一个
Sheng Wang | Yi Huang | Linning Peng | Yu Jiang | Lu Zhang | Aiqun Hu | Linning Peng | A. Hu | Yu Jiang | Sheng Wang | Yi Huang | Lu Zhang
[1] Changting Shi. A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security , 2018 .
[2] Wanchun Dou,et al. Dynamic Mobile Crowdsourcing Selection for Electricity Load Forecasting , 2018, IEEE Access.
[3] Xuyun Zhang,et al. An Exception Handling Approach for Privacy-Preserving Service Recommendation Failure in a Cloud Environment , 2018, Sensors.
[4] Xuyun Zhang,et al. Privacy-Aware Data Publishing and Integration for Collaborative Service Recommendation , 2018, IEEE Access.
[5] Thomas H. Clausen,et al. A Study of LoRa: Long Range & Low Power Networks for the Internet of Things , 2016, Sensors.
[6] Tien Dang Vo-Huu,et al. Fingerprinting Wi-Fi Devices Using Software Defined Radios , 2016, WISEC.
[7] Nuno Pereira,et al. Formal security analysis of LoRaWAN , 2019, Comput. Networks.
[8] Danny Hughes,et al. Exploring the Security Vulnerabilities of LoRa , 2017, 2017 3rd IEEE International Conference on Cybernetics (CYBCON).
[9] Jidong Wang,et al. An Enhanced Key Management Scheme for LoRaWAN , 2018, Cryptogr..
[10] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[11] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[12] Xuyun Zhang,et al. A computation offloading method over big data for IoT-enabled cloud-edge computing , 2019, Future Gener. Comput. Syst..
[13] Tao Huang,et al. An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks , 2019, J. Netw. Comput. Appl..
[14] Utz Roedig,et al. LoRa for the Internet of Things , 2016, EWSN.
[15] Wei Li,et al. A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things , 2019 .
[16] M. Mahato,et al. Internet of Things (IoT): Research, Architectures and Applications , 2018 .
[17] Petar Solic,et al. LoRaWAN — A low power WAN protocol for Internet of Things: A review and opportunities , 2017, 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech).
[18] Ali Dehghantanha,et al. Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[19] Yan Yan,et al. A differential constellation trace figure based device identification method for ZigBee nodes , 2016, 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP).
[20] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[21] Xuyun Zhang,et al. A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data , 2017, IEEE Journal on Selected Areas in Communications.
[22] Flauzac Olivier,et al. New Security Architecture for IoT Network , 2015, ANT/SEIT.
[23] Mohsen Guizani,et al. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.
[24] Seung-Hoon Hwang,et al. A survey on LPWA technology: LoRa and NB-IoT , 2017, ICT Express.
[25] Qiang He,et al. Time-aware distributed service recommendation with privacy-preservation , 2019, Inf. Sci..
[26] Xuyun Zhang,et al. A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems , 2019, World Wide Web.
[27] J. Tait,et al. Challenges and opportunities. , 1996, Journal of psychiatric and mental health nursing.
[28] Xuyun Zhang,et al. An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles , 2019, Future Gener. Comput. Syst..
[29] Lukas Simon Laufenberg. Impersonating LoRaWAN gateways using Semtech Packet Forwarder , 2019, ArXiv.
[30] Wim Lamotte,et al. Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning , 2017, WISEC.
[31] Duo Liu,et al. A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT , 2019, Computers, Materials & Continua.
[32] Haipeng Li,et al. Routing Protocol in VANETs Equipped with Directional Antennas: Topology-Based Neighbor Discovery and Routing Analysis , 2018, Wirel. Commun. Mob. Comput..
[33] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[34] Qiang He,et al. An IoT-Oriented data placement method with privacy preservation in cloud environment , 2018, J. Netw. Comput. Appl..
[35] Jinjun Chen,et al. A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment , 2018, Future Gener. Comput. Syst..
[36] Lianyong Qi,et al. Privacy-Aware Multidimensional Mobile Service Quality Prediction and Recommendation in Distributed Fog Environment , 2018, Wirel. Commun. Mob. Comput..
[37] Antonio F. Gómez-Skarmeta,et al. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach , 2018, Sensors.
[38] Marek Neruda,et al. The issue of LPWAN technology coexistence in IoT environment , 2016, 2016 17th International Conference on Mechatronics - Mechatronika (ME).
[39] Stefano Tomasin,et al. Security Analysis of LoRaWAN Join Procedure for Internet of Things Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).