Secure Motion Verification using the Doppler Effect
暂无分享,去创建一个
Jens B. Schmitt | Vincent Lenders | Matthias Schäfer | Patrick Leu | J. Schmitt | Patrick Leu | Matthias Schäfer | Vincent Lenders
[1] Ivan Martinovic,et al. OpenSky: A swiss army knife for air traffic security research , 2015, 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC).
[2] Srdjan Capkun,et al. Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[3] Loukas Lazos,et al. Verifying ADS-B navigation information through Doppler shift measurements , 2015, 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC).
[4] Yiu-Tong Chan,et al. Passive localization from Doppler-shifted frequency measurements , 1992, IEEE Trans. Signal Process..
[5] R. H. D. Townsend,et al. FAST CALCULATION OF THE LOMB–SCARGLE PERIODOGRAM USING GRAPHICS PROCESSING UNITS , 2010, 1007.1658.
[6] Edward Lester,et al. Benefits and incentives for ADS-B equipage in the National Airspace System , 2007 .
[7] Ralf Heidger,et al. Secure ADS-B usage in ATC tracking , 2014, 2014 Tyrrhenian International Workshop on Digital Communications - Enhanced Surveillance of Aircraft and Vehicles (TIWDC/ESAV).
[8] Bart Preneel,et al. Location verification using secure distance bounding protocols , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[9] Bruno Sinopoli,et al. Is your commute driving you crazy?: a study of misbehavior in vehicular platoons , 2015, WISEC.
[10] Pravin Varaiya,et al. Smart cars on smart roads: problems of control , 1991, IEEE Trans. Autom. Control..
[11] Ivan Martinovic,et al. Experimental Analysis of Attacks on Next Generation Air Traffic Communication , 2013, ACNS.
[12] Jens B. Schmitt,et al. Secure Track Verification , 2015, 2015 IEEE Symposium on Security and Privacy.
[13] David A. Wagner,et al. Secure verification of location claims , 2003, WiSe '03.
[14] Andrei Costin,et al. Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices , 2012 .
[15] Ivan Martinovic,et al. On the Security of the Automatic Dependent Surveillance-Broadcast Protocol , 2013, IEEE Communications Surveys & Tutorials.
[16] Xenofon D. Koutsoukos,et al. RF doppler shift-based mobile sensor tracking and navigation , 2010, TOSN.
[17] A. Smith,et al. Methods to Provide System-Wide ADS-B Back-Up, Validation and Security , 2006, 2006 ieee/aiaa 25TH Digital Avionics Systems Conference.
[18] Srdjan Capkun,et al. Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.
[19] Anthony J. Weiss,et al. Localization of Narrowband Radio Emitters Based on Doppler Frequency Shifts , 2008, IEEE Transactions on Signal Processing.
[20] Rui Pinheiro,et al. On Perception and Reality in Wireless Air Traffic Communication Security , 2016, IEEE Transactions on Intelligent Transportation Systems.
[21] Yoram Bresler,et al. Doppler-based motion estimation for wide-band sources from single passive sensor measurements , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[22] Srdjan Capkun,et al. ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[23] Nathan van de Wouw,et al. Design and experimental evaluation of cooperative adaptive cruise control , 2011, 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC).