Identification of Wireless Devices of Users Who Actively Fake Their RF Fingerprints With Artificial Data Distortion
暂无分享,去创建一个
[1] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[2] Steven Kay,et al. Modern Spectral Estimation: Theory and Application , 1988 .
[3] Sepideh Dolatshahi,et al. Identification of wireless users via power amplifier imperfections , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[4] Dominique Schreurs,et al. RF Power Amplifier Behavioral Modeling: Preface , 2008 .
[5] Srdjan Capkun,et al. Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[6] N. Serinken,et al. Characteristics of radio transmitter fingerprints , 2001 .
[7] H. Tang,et al. Some physical layer issues of wide-band cognitive radio systems , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[8] J. Raz,et al. A simple generalised crossvalidation method of span selection for periodogram smoothing , 2001 .
[9] Dominique Schreurs,et al. RF Power Amplifier Behavioral Modeling: Contents , 2008 .
[10] Michel Barbeau,et al. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.
[11] L. E. Langley,et al. Specific emitter identification (SEI) and classical parameter fusion technology , 1993, Proceedings of WESCON '93.
[12] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[13] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[14] Keith E. Nolan,et al. Radio Transmitter Fingerprinting: A Steady State Frequency Domain Approach , 2008, 2008 IEEE 68th Vehicular Technology Conference.
[15] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[16] R. Hassun,et al. Effective evaluation of link quality using error vector magnitude techniques , 1997, Proceedings of 1997 Wireless Communications Conference.
[17] Michel Barbeau,et al. DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .
[18] Farinaz Koushanfar,et al. Robust stable radiometric fingerprinting for wireless devices , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.
[19] Jeyanthi Hall,et al. Detection of rogue devices in wireless networks , 2006 .
[20] O. Ureten,et al. Detection of radio transmitter turn-on transients , 1999 .
[21] M. Isaksson,et al. A comparative analysis of behavioral models for RF power amplifiers , 2006, IEEE Transactions on Microwave Theory and Techniques.
[22] Rong Zheng,et al. Device fingerprinting to enhance wireless security using nonparametric Bayesian method , 2011, 2011 Proceedings IEEE INFOCOM.
[23] Dennis Goeckel,et al. Identifying Wireless Users via Transmitter Imperfections , 2011, IEEE Journal on Selected Areas in Communications.
[24] Charles W. Therrien,et al. Probability and Random Processes for Electrical and Computer Engineers , 2011 .
[25] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[26] J.C. Pedro,et al. A comparative overview of microwave and wireless power-amplifier behavioral modeling approaches , 2005, IEEE Transactions on Microwave Theory and Techniques.
[27] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[28] O. H. Tekbas,et al. An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions , 2004, Canadian Journal of Electrical and Computer Engineering.
[29] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.