Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks
暂无分享,去创建一个
Yao Liu | Tao Wang | Haojin Zhu | Song Fang | Wenbo Shen | Haojin Zhu | Wenbo Shen | Yao Liu | Song Fang | Tao Wang
[1] Peng Ning,et al. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures , 2010, 2010 IEEE Symposium on Security and Privacy.
[2] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[3] Jie Xiong,et al. SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.
[4] Peng Ning,et al. Is link signature dependable for wireless security? , 2013, 2013 Proceedings IEEE INFOCOM.
[5] Andrea Goldsmith,et al. Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).
[6] Peng Ning,et al. Enhanced wireless channel authentication using time-synched link signature , 2012, 2012 Proceedings IEEE INFOCOM.
[7] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[8] Aggelos Kiayias,et al. On passive inference attacks against physical-layer key extraction? , 2011, EUROSEC '11.
[9] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[10] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[11] Alex B. Gershman,et al. Training-based MIMO channel estimation: a study of estimator tradeoffs and optimal training signals , 2006, IEEE Transactions on Signal Processing.
[12] Per Ola Börjesson,et al. OFDM channel estimation by singular value decomposition , 1996, Proceedings of Vehicular Technology Conference - VTC.
[13] Sneha Kumar Kasera,et al. Advancing wireless link signatures for location distinction , 2008, MobiCom '08.
[14] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.
[15] Rupul Safaya,et al. A Multipath Channel Estimation Algorithm using a Kalman filter , 2022 .
[16] Peng Ning,et al. Poster: mimicry attacks against wireless link signature , 2011, CCS '11.
[17] K. Shanmugan,et al. Random Signals: Detection, Estimation and Data Analysis , 1988 .