Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
暂无分享,去创建一个
J. Sobana | V. Arul | B. Keerthana | R. Mekala | J. Sobana | V. Arul | B. Keerthana | R. Mekala
[1] Eylem Ekici,et al. A Localization-Based Anti-Sensor Network System , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[2] M. Kayton,et al. Global positioning system: signals, measurements, and performance [Book Review] , 2002, IEEE Aerospace and Electronic Systems Magazine.
[3] Richard P. Martin,et al. The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study , 2006, DCOSS.
[4] Richard P. Martin,et al. The limits of localization using signal strength: a comparative study , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[5] Anish Arora,et al. Spatial Signatures for Lightweight Security in Wireless Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[6] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[7] Wenyuan Xu,et al. Relationship-based Detection of Spoofing-related Anomalous Traffic , 2009 .
[8] Richard P. Martin,et al. A Practical Approach to Landmark Deployment for Indoor Localization , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[9] Avishai Wool,et al. Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation , 2005, Wirel. Networks.
[10] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[11] Massimo Bernaschi,et al. Access points vulnerabilities to DoS attacks in 802.11 networks , 2008, Wirel. Networks.
[12] Václav Hlavác,et al. Multi-class support vector machine , 2002, Object recognition supported by user interaction for service robots.
[13] Jie Zheng,et al. Estimating the Number of Clusters via System Evolution for Cluster Analysis of Gene Expression Data , 2009, IEEE Transactions on Information Technology in Biomedicine.
[14] Wade Trappe,et al. Relationship -based Detection of Spoofing -related Anomalous Traffic in Ad Hoc Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[15] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[16] Wade Trappe,et al. An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.
[17] Richard P. Martin,et al. Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[18] Tzi-cker Chiueh,et al. Sequence Number-Based MAC Address Spoof Detection , 2005, RAID.
[19] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[20] Jie Wu,et al. Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[21] Jie Yang,et al. A theoretical analysis of wireless localization using RF-based fingerprint matching , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[22] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[23] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.