Physical layer challenge-response authentication in wireless networks with relay
暂无分享,去创建一个
[1] Michel Barbeau,et al. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.
[2] Michael A. Temple,et al. Improving Intra-Cellular Security Using Air Monitoring with RF Fingerprints , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[3] Prasant Mohapatra,et al. Identity-based attack detection in mobile wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[4] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[5] Srdjan Capkun,et al. Attacks on physical-layer identification , 2010, WiSec '10.
[6] John C. Klensin,et al. IMAP/POP AUTHorize Extension for Simple Challenge/Response , 1997, RFC.
[7] William Allen Simpson,et al. PPP Challenge Handshake Authentication Protocol (CHAP) , 1996, RFC.
[8] Sneha Kumar Kasera,et al. Advancing wireless link signatures for location distinction , 2008, MobiCom '08.
[9] Peng Ning,et al. Enhanced wireless channel authentication using time-synched link signature , 2012, 2012 Proceedings IEEE INFOCOM.
[10] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[11] Peng Ning,et al. Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.
[12] Oktay Ureten,et al. Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.
[13] Yan Dong,et al. PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[14] John S. Baras,et al. Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.
[15] Srdjan Capkun,et al. Efficient uncoordinated FHSS anti-jamming communication , 2009, MobiHoc '09.
[16] K. J. Ray Liu,et al. Extrinsic Channel-Like Fingerprint Embedding for Authenticating MIMO Systems , 2011, IEEE Transactions on Wireless Communications.
[17] Sneha Kumar Kasera,et al. Robust location distinction using temporal link signatures , 2007, MobiCom '07.
[18] Peng Ning,et al. Poster: mimicry attacks against wireless link signature , 2011, CCS '11.
[19] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[20] Yu-Chee Tseng,et al. Discriminant Minimization Search for Large-Scale RF-Based Localization Systems , 2011, IEEE Transactions on Mobile Computing.
[21] Kyungwhoon Cheun,et al. A New Symbol Timing Recovery Algorithm For OFDM Systems , 1997 .
[22] Edward J. Delp,et al. Forensic characterization of RF devices , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).