PHY-techniques to improve higher-layer functions in wireless networks
暂无分享,去创建一个
[1] Steven Kay,et al. Fundamentals Of Statistical Signal Processing , 2001 .
[2] M. J. Gans,et al. On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas , 1998, Wirel. Pers. Commun..
[3] Donggang Liu,et al. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.
[4] A. Viterbi. CDMA: Principles of Spread Spectrum Communication , 1995 .
[5] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[6] Larry J. Greenstein,et al. Sensor-assisted localization in cellular systems , 2007, IEEE Transactions on Wireless Communications.
[7] Larry J. Greenstein,et al. Sensor Networks for Estimating and Updating the Performance of Cellular Systems , 2006, 2006 IEEE International Conference on Communications.
[8] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[9] Irene A. Stegun,et al. Handbook of Mathematical Functions. , 1966 .
[10] Milton Abramowitz,et al. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .
[11] Jesse Walker,et al. Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .
[12] Yao Yan,et al. Dynamic resource management in the fourth generation wireless systems , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..
[13] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[14] John G. Proakis,et al. Digital Communications , 1983 .
[15] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[16] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[17] David C. Moore,et al. Robust distributed network localization with noisy range measurements , 2004, SenSys '04.
[18] L. El Ghaoui,et al. Convex position estimation in wireless sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[19] Larry J. Greenstein,et al. A Physical-Layer Technique to Enhance Authentication for Mobile Terminals , 2008, 2008 IEEE International Conference on Communications.
[20] Alfred O. Hero,et al. Using proximity and quantized RSS for sensor localization in wireless networks , 2003, WSNA '03.
[21] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.
[22] S. Kay. Fundamentals of statistical signal processing: estimation theory , 1993 .
[23] K.Venkatesh Prasad,et al. Fundamentals of statistical signal processing: Estimation theory: by Steven M. KAY; Prentice Hall signal processing series; Prentice Hall; Englewood Cliffs, NJ, USA; 1993; xii + 595 pp.; $65; ISBN: 0-13-345711-7 , 1994 .
[24] Songwu Lu,et al. Securing a Wireless World , 2006, Proceedings of the IEEE.
[25] Koen Langendoen,et al. Distributed localization in wireless sensor networks: a quantitative compariso , 2003, Comput. Networks.
[26] Andrea Goldsmith,et al. Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).
[27] William A. Arbaugh,et al. Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.
[28] Ming Xiao,et al. A new energy-efficient MIMO-sensor network architecture M-SENMA , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[29] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[30] Larry J. Greenstein,et al. MIMO-assisted channel-based authentication in wireless networks , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.
[31] Michel Barbeau,et al. DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .
[32] Wade Trappe,et al. Introduction to Cryptography with Coding Theory , 2002 .
[33] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[34] William A. Arbaugh,et al. An Initial Security Analysis of the IEEE 802.1X Standard , 2002 .
[35] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[36] Mani Mina,et al. Short Paper: A Signal Fingerprinting Paradigm for General Physical Layer and Sensor Network Security and Assurance , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[37] R.L. Moses,et al. Locating the nodes: cooperative localization in wireless sensor networks , 2005, IEEE Signal Processing Magazine.
[38] H. Vincent Poor,et al. Uplink user capacity in a CDMA macrocell with a hotspot microcell: exact and approximate analyses , 2003, IEEE Trans. Wirel. Commun..
[39] Liang Xiao,et al. Spectral efficiency of distributed antenna system with random antenna layout , 2003 .
[40] David R. Cheriton,et al. Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.
[41] Richard P. Martin,et al. Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[42] Jeffrey G. Andrews,et al. Broadband wireless access with WiMax/802.16: current performance benchmarks and future potential , 2005, IEEE Communications Magazine.
[43] Antti Toskala,et al. WCDMA for UMTS: Radio Access for Third Generation Mobile Communications , 2000 .
[44] H. Vincent Poor,et al. Capacity in a CDMA macrocell with a hotspot microcell: exact and approximate analyses , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).
[45] Michel C. Jeruchim,et al. Developments in the Theory and Application of Importance Sampling , 1987, IEEE Trans. Commun..
[46] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[47] Larry J. Greenstein,et al. An empirically based path loss model for wireless channels in suburban environments , 1999, IEEE J. Sel. Areas Commun..
[48] Raheem A. Beyah,et al. A Passive Approach to Wireless NIC Identification , 2006, 2006 IEEE International Conference on Communications.
[49] R. Viswanathan,et al. An introduction to statistical signal processing with applications , 1979 .
[50] Liang Xiao,et al. A dynamic resource scheduling algorithm for OFDM system , 2003, 9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732).
[51] Lutz H.-J. Lampe,et al. Performance Analysis and Enhancement of Multiband OFDM for UWB Communications , 2007, IEEE Transactions on Wireless Communications.
[52] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[53] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[54] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[55] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[56] B.W. Dickinson,et al. An introduction to statistical signal processing with applications , 1979, Proceedings of the IEEE.
[57] Andreas F. Molisch,et al. Wireless Communications , 2005 .
[58] Ainslie,et al. CORRELATION MODEL FOR SHADOW FADING IN MOBILE RADIO SYSTEMS , 2004 .
[59] Bradford W. Parkinson,et al. Global positioning system : theory and applications , 1996 .
[60] Mani B. Srivastava,et al. The bits and flops of the n-hop multilateration primitive for node localization problems , 2002, WSNA '02.
[61] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[62] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[63] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[64] Larry J. Greenstein,et al. Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.
[65] W. C. Jakes,et al. Microwave Mobile Communications , 1974 .
[66] William A. Arbaugh,et al. Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..
[67] S. Haykin,et al. Adaptive Filter Theory , 1986 .
[68] Brian W. Kernighan,et al. WISE design of indoor wireless systems: practical computation and optimization , 1995 .
[69] King Lun Yiu. Ad-hoc positioning system , 2008 .
[70] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[71] Gordon L. Stüber,et al. Overview of radiolocation in CDMA cellular systems , 1998, IEEE Commun. Mag..
[72] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[73] Liang Xiao,et al. Information-theoretic capacity analysis in MIMO distributed antenna systems , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..
[74] Larry J. Greenstein,et al. Distributed measurements for estimating and updating cellular system performance , 2008, IEEE Transactions on Communications.
[75] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[76] N. Mandayam,et al. Impact of Pilot Assisted Channel State Estimation on Multiple Antenna Multiuser TDD Systems with Spatial Filtering , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[77] Shidong Zhou,et al. A comparative study of MIMO capacity with different antenna topologies , 2002, The 8th International Conference on Communication Systems, 2002. ICCS 2002..