PHY-techniques to improve higher-layer functions in wireless networks

OF THE DISSERTATION PHY-Techniques to Improve Higher-Layer Functions in Wireless Networks

[1]  Steven Kay,et al.  Fundamentals Of Statistical Signal Processing , 2001 .

[2]  M. J. Gans,et al.  On Limits of Wireless Communications in a Fading Environment when Using Multiple Antennas , 1998, Wirel. Pers. Commun..

[3]  Donggang Liu,et al.  Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.

[4]  A. Viterbi CDMA: Principles of Spread Spectrum Communication , 1995 .

[5]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[6]  Larry J. Greenstein,et al.  Sensor-assisted localization in cellular systems , 2007, IEEE Transactions on Wireless Communications.

[7]  Larry J. Greenstein,et al.  Sensor Networks for Estimating and Updating the Performance of Cellular Systems , 2006, 2006 IEEE International Conference on Communications.

[8]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[9]  Irene A. Stegun,et al.  Handbook of Mathematical Functions. , 1966 .

[10]  Milton Abramowitz,et al.  Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .

[11]  Jesse Walker,et al.  Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .

[12]  Yao Yan,et al.  Dynamic resource management in the fourth generation wireless systems , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..

[13]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[14]  John G. Proakis,et al.  Digital Communications , 1983 .

[15]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[16]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[17]  David C. Moore,et al.  Robust distributed network localization with noisy range measurements , 2004, SenSys '04.

[18]  L. El Ghaoui,et al.  Convex position estimation in wireless sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[19]  Larry J. Greenstein,et al.  A Physical-Layer Technique to Enhance Authentication for Mobile Terminals , 2008, 2008 IEEE International Conference on Communications.

[20]  Alfred O. Hero,et al.  Using proximity and quantized RSS for sensor localization in wireless networks , 2003, WSNA '03.

[21]  Wenyuan Xu,et al.  Securing wireless systems via lower layer enforcements , 2006, WiSe '06.

[22]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[23]  K.Venkatesh Prasad,et al.  Fundamentals of statistical signal processing: Estimation theory: by Steven M. KAY; Prentice Hall signal processing series; Prentice Hall; Englewood Cliffs, NJ, USA; 1993; xii + 595 pp.; $65; ISBN: 0-13-345711-7 , 1994 .

[24]  Songwu Lu,et al.  Securing a Wireless World , 2006, Proceedings of the IEEE.

[25]  Koen Langendoen,et al.  Distributed localization in wireless sensor networks: a quantitative compariso , 2003, Comput. Networks.

[26]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[27]  William A. Arbaugh,et al.  Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.

[28]  Ming Xiao,et al.  A new energy-efficient MIMO-sensor network architecture M-SENMA , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[29]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[30]  Larry J. Greenstein,et al.  MIMO-assisted channel-based authentication in wireless networks , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[31]  Michel Barbeau,et al.  DETECTION OF TRANSIENT IN RADIO FREQUENCY FINGERPRINTING USING SIGNAL PHASE , 2003 .

[32]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory , 2002 .

[33]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[34]  William A. Arbaugh,et al.  An Initial Security Analysis of the IEEE 802.1X Standard , 2002 .

[35]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[36]  Mani Mina,et al.  Short Paper: A Signal Fingerprinting Paradigm for General Physical Layer and Sensor Network Security and Assurance , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[37]  R.L. Moses,et al.  Locating the nodes: cooperative localization in wireless sensor networks , 2005, IEEE Signal Processing Magazine.

[38]  H. Vincent Poor,et al.  Uplink user capacity in a CDMA macrocell with a hotspot microcell: exact and approximate analyses , 2003, IEEE Trans. Wirel. Commun..

[39]  Liang Xiao,et al.  Spectral efficiency of distributed antenna system with random antenna layout , 2003 .

[40]  David R. Cheriton,et al.  Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.

[41]  Richard P. Martin,et al.  Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[42]  Jeffrey G. Andrews,et al.  Broadband wireless access with WiMax/802.16: current performance benchmarks and future potential , 2005, IEEE Communications Magazine.

[43]  Antti Toskala,et al.  WCDMA for UMTS: Radio Access for Third Generation Mobile Communications , 2000 .

[44]  H. Vincent Poor,et al.  Capacity in a CDMA macrocell with a hotspot microcell: exact and approximate analyses , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).

[45]  Michel C. Jeruchim,et al.  Developments in the Theory and Application of Importance Sampling , 1987, IEEE Trans. Commun..

[46]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[47]  Larry J. Greenstein,et al.  An empirically based path loss model for wireless channels in suburban environments , 1999, IEEE J. Sel. Areas Commun..

[48]  Raheem A. Beyah,et al.  A Passive Approach to Wireless NIC Identification , 2006, 2006 IEEE International Conference on Communications.

[49]  R. Viswanathan,et al.  An introduction to statistical signal processing with applications , 1979 .

[50]  Liang Xiao,et al.  A dynamic resource scheduling algorithm for OFDM system , 2003, 9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732).

[51]  Lutz H.-J. Lampe,et al.  Performance Analysis and Enhancement of Multiband OFDM for UWB Communications , 2007, IEEE Transactions on Wireless Communications.

[52]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[53]  T. Kohno,et al.  Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[54]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[55]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[56]  B.W. Dickinson,et al.  An introduction to statistical signal processing with applications , 1979, Proceedings of the IEEE.

[57]  Andreas F. Molisch,et al.  Wireless Communications , 2005 .

[58]  Ainslie,et al.  CORRELATION MODEL FOR SHADOW FADING IN MOBILE RADIO SYSTEMS , 2004 .

[59]  Bradford W. Parkinson,et al.  Global positioning system : theory and applications , 1996 .

[60]  Mani B. Srivastava,et al.  The bits and flops of the n-hop multilateration primitive for node localization problems , 2002, WSNA '02.

[61]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[62]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[63]  Sneha Kumar Kasera,et al.  Robust location distinction using temporal link signatures , 2007, MobiCom '07.

[64]  Larry J. Greenstein,et al.  Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.

[65]  W. C. Jakes,et al.  Microwave Mobile Communications , 1974 .

[66]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..

[67]  S. Haykin,et al.  Adaptive Filter Theory , 1986 .

[68]  Brian W. Kernighan,et al.  WISE design of indoor wireless systems: practical computation and optimization , 1995 .

[69]  King Lun Yiu Ad-hoc positioning system , 2008 .

[70]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[71]  Gordon L. Stüber,et al.  Overview of radiolocation in CDMA cellular systems , 1998, IEEE Commun. Mag..

[72]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[73]  Liang Xiao,et al.  Information-theoretic capacity analysis in MIMO distributed antenna systems , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..

[74]  Larry J. Greenstein,et al.  Distributed measurements for estimating and updating cellular system performance , 2008, IEEE Transactions on Communications.

[75]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[76]  N. Mandayam,et al.  Impact of Pilot Assisted Channel State Estimation on Multiple Antenna Multiuser TDD Systems with Spatial Filtering , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[77]  Shidong Zhou,et al.  A comparative study of MIMO capacity with different antenna topologies , 2002, The 8th International Conference on Communication Systems, 2002. ICCS 2002..