메뉴 건너뛰기




Volumn 7, Issue 7, 2008, Pages 2571-2579

Using the physical layer for wireless authentication in time-variant channels

Author keywords

Authentication; Cross layer design; Hypothesis testing; Physical layer; Time variant channel; Wireless

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; COMMUNICATION CHANNELS (INFORMATION THEORY); LOCAL AREA NETWORKS;

EID: 48149115694     PISSN: 15361276     EISSN: None     Source Type: Journal    
DOI: 10.1109/TWC.2008.070194     Document Type: Article
Times cited : (333)

References (26)
  • 2
    • 34247366075 scopus 로고    scopus 로고
    • Your 802.11 network has no clothes
    • Dec
    • A. Mishra, M. Shin, and W. A. Arbaugh, "Your 802.11 network has no clothes," IEEE Commun. Mag., vol. 9, pp. 44-51, Dec. 2002.
    • (2002) IEEE Commun. Mag , vol.9 , pp. 44-51
    • Mishra, A.1    Shin, M.2    Arbaugh, W.A.3
  • 3
    • 0004104571 scopus 로고    scopus 로고
    • Unsafe at any key size: An analysis of the WEP encapsulation
    • IEEE Document 802.11-00/362
    • J. Walker, "Unsafe at any key size: an analysis of the WEP encapsulation," IEEE Document 802.11-00/362, 2000.
    • (2000)
    • Walker, J.1
  • 4
    • 48149085594 scopus 로고    scopus 로고
    • A. J. Viterbi, CDMA: Principles of Spread Spectrum Communication. Redwood City, CA: Addison-Wesley Wireless Communications Series, 1995.
    • A. J. Viterbi, CDMA: Principles of Spread Spectrum Communication. Redwood City, CA: Addison-Wesley Wireless Communications Series, 1995.
  • 5
    • 0032022195 scopus 로고    scopus 로고
    • On limits of wireless communications in a fading environment when using multiple antennas
    • Mar
    • G. J. Foschini and M. J. Gans, "On limits of wireless communications in a fading environment when using multiple antennas," IEEE Wireless Personal Commun., vol. 6, pp. 311-335, Mar. 1998.
    • (1998) IEEE Wireless Personal Commun , vol.6 , pp. 311-335
    • Foschini, G.J.1    Gans, M.J.2
  • 6
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in UWB channels
    • Sept
    • R. Wilson, D. Tse, and R. Scholtz, "Channel identification: secret sharing using reciprocity in UWB channels," IEEE Trans. Inform. Theory, vol. 2, pp. 364-375, Sept. 2007.
    • (2007) IEEE Trans. Inform. Theory , vol.2 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.3
  • 7
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • Dec
    • A. E. Hero, "Secure space-time communication," IEEE Trans. Inform. Theory, pp. 3235-3249, Dec. 2003.
    • (2003) IEEE Trans. Inform. Theory , pp. 3235-3249
    • Hero, A.E.1
  • 8
    • 33847353721 scopus 로고    scopus 로고
    • Secret communication in presence of colluding eavesdroppers
    • Oct
    • S. Goel and R. Negi, "Secret communication in presence of colluding eavesdroppers," in Proc. IEEE Military Communications Conference (MILCOM), vol. 3, pp. 1501-1506, Oct. 2005.
    • (2005) Proc. IEEE Military Communications Conference (MILCOM) , vol.3 , pp. 1501-1506
    • Goel, S.1    Negi, R.2
  • 9
    • 0013046241 scopus 로고    scopus 로고
    • An initial security analysis of the IEEE 802.1x standard,
    • Tech. Rep. CS-TR-4328, University of Maryland, College Park
    • A. Mishra and W A. Arbaugh, "An initial security analysis of the IEEE 802.1x standard," Tech. Rep. CS-TR-4328, University of Maryland, College Park, 2002.
    • (2002)
    • Mishra, A.1    Arbaugh, W.A.2
  • 11
    • 1542747838 scopus 로고    scopus 로고
    • Detection of transient in radio frequency fingerprinting using signal phase
    • ACTA Press, pp, July
    • J. Hall, M. Barbeau, and E. Kranakis, "Detection of transient in radio frequency fingerprinting using signal phase," in Wireless and Optical Communications. ACTA Press, pp. 13-18, July 2003.
    • (2003) Wireless and Optical Communications , pp. 13-18
    • Hall, J.1    Barbeau, M.2    Kranakis, E.3
  • 13
    • 33847300575 scopus 로고    scopus 로고
    • Short paper: A signal fingerprinting paradigm for general physical layer and sensor network security and assurance
    • Sept
    • T. Daniels, M. Mina, and S. F. Russell, "Short paper: a signal fingerprinting paradigm for general physical layer and sensor network security and assurance," in Proc. IEEE/Create Net Secure Commum., pp. 219-221, Sept. 2005.
    • (2005) Proc. IEEE/Create Net Secure Commum , pp. 219-221
    • Daniels, T.1    Mina, M.2    Russell, S.F.3
  • 14
    • 34247324807 scopus 로고    scopus 로고
    • Detecting identity-based attacks in wireless networks using signalprints
    • Los Angeles, CA, Sept
    • D. Faria and D. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in Proc. ACM Workshop on Wireless Security, pp. 43-52, Los Angeles, CA, Sept. 2006.
    • (2006) Proc. ACM Workshop on Wireless Security , pp. 43-52
    • Faria, D.1    Cheriton, D.2
  • 20
    • 77955326733 scopus 로고
    • Characterization of randomly time-variant linear channels
    • Dec
    • P.A. Bello, "Characterization of randomly time-variant linear channels," IEEE Trans. Commun. Syst., vol. CS-11, pp. 360-393, Dec. 1963.
    • (1963) IEEE Trans. Commun. Syst , vol.CS-11 , pp. 360-393
    • Bello, P.A.1
  • 22
    • 0001083776 scopus 로고
    • The effect of frequency selective fading on the binary error probability of incoherent and differentially coherent matched filter receivers
    • June
    • P. A. Bello and B. D. Nelin, "The effect of frequency selective fading on the binary error probability of incoherent and differentially coherent matched filter receivers," IEEE Trans. Commun. Syst., vol. CS-11, pp. 170-186, June 1963.
    • (1963) IEEE Trans. Commun. Syst , vol.CS-11 , pp. 170-186
    • Bello, P.A.1    Nelin, B.D.2
  • 25
    • 48149094788 scopus 로고    scopus 로고
    • Clarifications on the link budget evaluation
    • IEEE Document C802.20-05/18
    • A. Tee, "Clarifications on the link budget evaluation," IEEE Document C802.20-05/18, 2005.
    • (2005)
    • Tee, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.