Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks
暂无分享,去创建一个
[1] Gerhard P. Hancke,et al. Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization , 2016, Comput. Networks.
[2] Claudio Soriente,et al. Using audio in secure device pairing , 2009, Int. J. Secur. Networks.
[3] Claudio Soriente,et al. HAPADEP: Human-Assisted Pure Audio Device Pairing , 2008, ISC.
[4] Si Chen,et al. ${\ssr{PriWhisper}}$ : Enabling Keyless Secure Acoustic Communication for Smartphones , 2014, IEEE Internet of Things Journal.
[5] Srdjan Capkun,et al. Investigation of Signal and Message Manipulations on the Wireless Channel , 2011, ESORICS.
[6] Peng Ning,et al. No time to demodulate - fast physical layer verification of friendly jamming , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[7] B. J. Silva,et al. Machine-to-Machine: Possible applications in industrial networks , 2013, 2013 IEEE International Conference on Industrial Technology (ICIT).
[8] Tadayoshi Kohno,et al. Securing RFIDs by Randomizing the Modulation and Channel , 2015, NSDI.
[9] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[10] Srdjan Capkun,et al. On Limitations of Friendly Jamming for Confidentiality , 2013, 2013 IEEE Symposium on Security and Privacy.
[11] Matthias Hollick,et al. Lockpicking physical layer key exchange: weak adversary models invite the thief , 2015, WISEC.
[12] Gerhard P. Hancke,et al. Using NFC-enabled phones for remote data acquisition and digital control , 2011, IEEE Africon '11.
[13] Olivier Savry,et al. A cross layer approach to preserve privacy in RFID ISO/IEC 15693 systems , 2012, 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA).
[14] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[15] Jacques Reverdy,et al. RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? , 2007, CHES.
[16] Gerhard P. Hancke,et al. Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality , 2015, WISTP.
[17] Gerhard P. Hancke. Distance-bounding for RFID: Effectiveness of ‘terrorist fraud’ in the presence of bit errors , 2012, 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA).
[18] Radha Poovendran,et al. A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power , 2013, RFIDSec Asia.
[19] Rong Jin,et al. SecNFC: Securing inductively-coupled Near Field Communication at physical layer , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[20] Gerhard P. Hancke,et al. Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[21] Kevin Fu,et al. They can hear your heartbeats: non-invasive security for implantable medical devices , 2011 .
[22] IlJu Ko,et al. Data-Sharing Method for Multi-Smart Devices at Close Range , 2015, Mob. Inf. Syst..
[23] Gerhard P. Hancke,et al. A Zigbee-Based Animal Health Monitoring System , 2015, IEEE Sensors Journal.
[24] Ramarathnam Venkatesan,et al. Dhwani: secure peer-to-peer acoustic NFC , 2013, SIGCOMM.
[25] J. Robert Stuart,et al. Noise: Methods for Estimating Detectability and Threshold , 1994 .
[26] Gerhard P. Hancke,et al. An efficient distributed localisation algorithm for wireless sensor networks: based on smart reference-selection method , 2013, Int. J. Sens. Networks.
[27] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[28] Guangjie Han,et al. Analysis of Energy-Efficient Connected Target Coverage Algorithms for Industrial Wireless Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.