메뉴 건너뛰기




Volumn 4074 LNCS, Issue , 2006, Pages 80-95

Detecting impersonation attacks in future wireless and mobile networks

Author keywords

[No Author keywords available]

Indexed keywords

MOBILE TELECOMMUNICATION SYSTEMS; PATTERN RECOGNITION SYSTEMS; PROFESSIONAL ASPECTS; RISK ASSESSMENT; SECURITY SYSTEMS;

EID: 33748995703     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11801412_8     Document Type: Conference Paper
Times cited : (45)

References (37)
  • 7
    • 0035388827 scopus 로고    scopus 로고
    • Characteristics of radio transmitter fingerprints
    • K.J. Ellis and N. Serinken. Characteristics of radio transmitter fingerprints. Radio Science, 36:585-597, 2001.
    • (2001) Radio Science , vol.36 , pp. 585-597
    • Ellis, K.J.1    Serinken, N.2
  • 8
    • 32144461283 scopus 로고    scopus 로고
    • Telecommunications and internet protocol harmonization over networks TIPHON release 4; protocol framework definition; methods and protocols for security; part 1: Threat analysis
    • ETSI. Telecommunications and internet protocol harmonization over networks TIPHON release 4; protocol framework definition; methods and protocols for security; part 1: Threat analysis. Technical Specification ETSI TS 102 165-1 V4.1.1, 2003.
    • (2003) Technical Specification ETSI TS 102 165-1 V4.1.1
  • 13
    • 84941161226 scopus 로고    scopus 로고
    • Using mobility profiles for anomaly-based intrusion detection in mobile networks
    • Montreal, Canada, August 2005. Preliminary version in NDSS'05 Preconference Workshop on Wireless and Mobile Security
    • J. Hall, M. Barbeau, and E. Kranakis. Using mobility profiles for anomaly-based intrusion detection in mobile networks. In Proceedings of the Wireless and Mobile Computing, Networking and Communications, pages 22-24, Montreal, Canada, August 2005. Preliminary version in NDSS'05 Preconference Workshop on Wireless and Mobile Security.
    • Proceedings of the Wireless and Mobile Computing, Networking and Communications , pp. 22-24
    • Hall, J.1    Barbeau, M.2    Kranakis, E.3
  • 15
    • 0034336489 scopus 로고    scopus 로고
    • Feature selection using probabilistic neural networks
    • Andrew Hunter. Feature selection using probabilistic neural networks. Neural Computing and Applications, 9:124-132, 2000.
    • (2000) Neural Computing and Applications , vol.9 , pp. 124-132
    • Hunter, A.1
  • 16
    • 84941157461 scopus 로고    scopus 로고
    • Accessed in February 2004
    • AirDefense Inc. http://www.airdefense.net. Accessed in February 2004.
  • 17
    • 33749030067 scopus 로고    scopus 로고
    • Financial times information
    • March
    • Financial Times Information. Mobile cloning, March 2005.
    • (2005) Mobile Cloning
  • 19
    • 77949731575 scopus 로고    scopus 로고
    • Temporal sequence learning and data reduction for anomaly detection
    • August
    • Terran Lane and Carla E. Brodley, Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security, 2(3):295-331, August 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.3 , pp. 295-331
    • Lane, T.1    Brodley, C.E.2
  • 21
    • 0000501025 scopus 로고
    • Evaluation of location area planning scenarios in future mobile telecommunication systems
    • J. Markoulidakis, G. Lyberopoulos, D. Tsirkas, and E. Sykas. Evaluation of location area planning scenarios in future mobile telecommunication systems. Wireless Networks, 1, 1995.
    • (1995) Wireless Networks , pp. 1
    • Markoulidakis, J.1    Lyberopoulos, G.2    Tsirkas, D.3    Sykas, E.4
  • 22
    • 84941161525 scopus 로고    scopus 로고
    • Accessed in February 2004
    • Netstumbler. http://www.netstumbler.org. Accessed in February 2004.
  • 23
    • 77955321219 scopus 로고    scopus 로고
    • Local and metropolitan area networks - Part 16: Air interface for fixed broadband wireless access systems - amendment for physical and medium access control layers for combined fixed and mobile operation in licensed bands
    • IEEE P802.16e/D8-2005, May
    • LAN MAN Standards Committee of the IEEE Computer Society, the IEEE Microwave Theory, and Techniques Society. Local and metropolitan area networks - part 16: Air interface for fixed broadband wireless access systems - amendment for physical and medium access control layers for combined fixed and mobile operation in licensed bands. Draft IEEE Standard, IEEE P802.16e/D8-2005, May 2005.
    • (2005) Draft IEEE Standard
  • 24
    • 1542487484 scopus 로고    scopus 로고
    • Cellular security: Better, but foes still lurk
    • June
    • Michael J. Riezenman. Cellular security: better, but foes still lurk. IEEE Spectrum, pages 39-42, June 2000.
    • (2000) IEEE Spectrum , pp. 39-42
    • Riezenman, M.J.1
  • 26
    • 0031234827 scopus 로고    scopus 로고
    • IDAMN: An intrusion detection architecture for mobile networks
    • Sept.
    • D. Samfat and R. Molva. IDAMN: an intrusion detection architecture for mobile networks. IEEE Journal on Selected Areas in Communications, 15(7):1373-1380, Sept. 1997.
    • (1997) IEEE Journal on Selected Areas in Communications , vol.15 , Issue.7 , pp. 1373-1380
    • Samfat, D.1    Molva, R.2
  • 27
    • 16244402347 scopus 로고    scopus 로고
    • Bayesian detection of Wi-Fi transmitter RF finger-prints
    • March
    • N. Serinken and O. Ureten. Bayesian detection of Wi-Fi transmitter RF finger-prints. Electronic Letters, 41(6):373-374, March 2005.
    • (2005) Electronic Letters , vol.41 , Issue.6 , pp. 373-374
    • Serinken, N.1    Ureten, O.2
  • 28
    • 0031359229 scopus 로고    scopus 로고
    • Multifractal modelling of radio transmitter transients for classification
    • Winnipeg Manitoba, May. IEEE
    • D. Shaw and W. Kinsner. Multifractal modelling of radio transmitter transients for classification. In Communications Power and Computing, pages 306-312, Winnipeg Manitoba, May 1997. IEEE.
    • (1997) Communications Power and Computing , pp. 306-312
    • Shaw, D.1    Kinsner, W.2
  • 31
    • 27544449081 scopus 로고    scopus 로고
    • Use of an artificial neural network to detect anomalies in wireless device location for the purpose of intrusion detection
    • SoutheastCon, April
    • Jared Spencer. Use of an artificial neural network to detect anomalies in wireless device location for the purpose of intrusion detection. In Proceedings of the IEEE, pages 686-691, SoutheastCon, April 2005.
    • (2005) Proceedings of the IEEE , pp. 686-691
    • Spencer, J.1
  • 32
    • 11244286137 scopus 로고    scopus 로고
    • Mobility-based anomaly detection in cellular mobile networks
    • Philadelphia, Pennsylvania, USA
    • B. Sun and F. Yu. Mobility-based anomaly detection in cellular mobile networks. In International Conference on WiSe 04, pages 61-69, Philadelphia, Pennsylvania, USA, 2004.
    • (2004) International Conference on WiSe 04 , pp. 61-69
    • Sun, B.1    Yu, F.2
  • 33
    • 1242298616 scopus 로고    scopus 로고
    • Improvement of transmitter identification system for low SNR transients
    • February
    • O.K. Tekbas, O. Ureten, and N. Serinken. Improvement of transmitter identification system for low SNR transients. Electronic Letters, 40(3):182-183, February 2004.
    • (2004) Electronic Letters , vol.40 , Issue.3 , pp. 182-183
    • Tekbas, O.K.1    Ureten, O.2    Serinken, N.3
  • 34
    • 0029461389 scopus 로고
    • Transient analysis and genetic algorithms for classification
    • IEEE
    • J. Toonstra and W. Kinsner. Transient analysis and genetic algorithms for classification. In WESCAN. IEEE, 1995.
    • (1995) WESCAN
    • Toonstra, J.1    Kinsner, W.2
  • 35
    • 0033326545 scopus 로고    scopus 로고
    • Detection of radio transmitter turn-on transients
    • Oktay Ureten and Nur Serinken. Detection of radio transmitter turn-on transients. Electronic Letters, 35:1996-1997, 1999.
    • (1999) Electronic Letters , vol.35 , pp. 1996-1997
    • Ureten, O.1    Serinken, N.2
  • 36
    • 0034271986 scopus 로고    scopus 로고
    • Location management for next generation personal communications networks
    • Sept.
    • V. Wong and V. Leung. Location management for next generation personal communications networks. IEEE Network, pages 18-24, Sept. 2000.
    • (2000) IEEE Network , pp. 18-24
    • Wong, V.1    Leung, V.2
  • 37
    • 0035208987 scopus 로고    scopus 로고
    • Profile-based protocols in wireless mobile ad hoc networks
    • K. Wu, J. Harms, and E.S. Elmallah. Profile-based protocols in wireless mobile ad hoc networks. Local Computer Networks, pages 568-575, 2001.
    • (2001) Local Computer Networks , pp. 568-575
    • Wu, K.1    Harms, J.2    Elmallah, E.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.