메뉴 건너뛰기




Volumn , Issue , 2008, Pages 567-573

RF fingerprints for secure authentication in single-hop WSN

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; COMPUTER NETWORKS; CRYPTOGRAPHY; HYBRID SENSORS; MOBILE COMPUTING; ROUTING PROTOCOLS; SENSOR NETWORKS; SENSORS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 56749182003     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WiMob.2008.18     Document Type: Conference Paper
Times cited : (8)

References (27)
  • 1
    • 56749100658 scopus 로고    scopus 로고
    • Statistics Handbook of Japan 2007, Statistics Bureau of Japan, 2007.
    • "Statistics Handbook of Japan 2007", Statistics Bureau of Japan, 2007.
  • 2
    • 34548269952 scopus 로고    scopus 로고
    • Pervasive Healthcare and Wireless Health Monitoring, U. Varshney, Mobile Networking Applications (2007), V.12, pp. 113-127, 2007.
    • "Pervasive Healthcare and Wireless Health Monitoring", U. Varshney, Mobile Networking Applications (2007), V.12, pp. 113-127, 2007.
  • 3
    • 34247106132 scopus 로고    scopus 로고
    • Living Assistance Systems: - An Ambient Intelligence Approach, J. Nehmer, M. Becker, A. Karshmer, R. Lamm, ICSE'06, Shanghai, China, pp.43-50, May 20-28, 2006.
    • "Living Assistance Systems: - An Ambient Intelligence Approach", J. Nehmer, M. Becker, A. Karshmer, R. Lamm, ICSE'06, Shanghai, China, pp.43-50, May 20-28, 2006.
  • 4
    • 56749138396 scopus 로고    scopus 로고
    • International Conference on Aging, Disability and Independence, St. Petersburg, U.S.A., February 1-5, 2006.
    • International Conference on Aging, Disability and Independence", St. Petersburg, U.S.A., February 1-5, 2006.
  • 5
    • 38349178199 scopus 로고    scopus 로고
    • Security and Privacy for Implantable Medical Devices, D. Halperin, T.S. Heydt-Benjamin, K. Fu, W. H. Maisel, IEEE Pervasive Computing pp.30-39, January-March, 2008.
    • "Security and Privacy for Implantable Medical Devices", D. Halperin, T.S. Heydt-Benjamin, K. Fu, W. H. Maisel, IEEE Pervasive Computing pp.30-39, January-March, 2008.
  • 6
    • 56749161814 scopus 로고    scopus 로고
    • Pre-Authentication and Authentication Models in Ad Hoc Networks, K. Hoeper, G. Gong, Wireless Network Security, Part II, Springer Verlag, ISBN 978-0-387-28040-0, pp. pp. 65-82, December 2006.
    • "Pre-Authentication and Authentication Models in Ad Hoc Networks", K. Hoeper, G. Gong, Wireless Network Security, Part II, Springer Verlag, ISBN 978-0-387-28040-0, pp. pp. 65-82, December 2006.
  • 7
    • 4043157158 scopus 로고    scopus 로고
    • An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions, O .H. Tekbas, N. Serinken, and O. Ureten, Canadian Journal Electrical and Computer Engineering, V. 29, N. 3, July 2004.
    • "An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions", O .H. Tekbas, N. Serinken, and O. Ureten, Canadian Journal Electrical and Computer Engineering, V. 29, N. 3, July 2004.
  • 8
    • 34249822230 scopus 로고    scopus 로고
    • Wireless security through RF fingerprinting, O. Ureten, N. Serinken, Canadian Journal Electrical and Computer Engineering, V. 32, N. 1, Winter 2007.
    • "Wireless security through RF fingerprinting", O. Ureten, N. Serinken, Canadian Journal Electrical and Computer Engineering, V. 32, N. 1, Winter 2007.
  • 9
    • 33748995703 scopus 로고    scopus 로고
    • Detecting Impersonation Attacks in Future Wireless and Mobile Networks, J. Hall, M. Barbeau, E. Kranakis, Mobile Ad-hoc Networks and Sensors workshop (MADNES), Springer-Verlag LNCS, V. 4074, pp. 80-95, 2006.
    • "Detecting Impersonation Attacks in Future Wireless and Mobile Networks", J. Hall, M. Barbeau, E. Kranakis, Mobile Ad-hoc Networks and Sensors workshop (MADNES), Springer-Verlag LNCS, V. 4074, pp. 80-95, 2006.
  • 10
    • 0242678584 scopus 로고    scopus 로고
    • Self-Organized Public-Key Management for Mobile Ad Hoc Networks, S. Capkun, L. Buttyan, J.-P. Hubaux, IEEE Transactions On Mobile Computing, V.2, N.l, pp.52-64, Jan.-Mar., 2003.
    • "Self-Organized Public-Key Management for Mobile Ad Hoc Networks", S. Capkun, L. Buttyan, J.-P. Hubaux, IEEE Transactions On Mobile Computing, V.2, N.l, pp.52-64, Jan.-Mar., 2003.
  • 11
    • 51349157157 scopus 로고    scopus 로고
    • Implications of Radio Fingerprinting on the Security of Sensor Networks, K. B. Rasmussen, S. Capkun, 3rd International Conference on Security and Privacy in Communication Networks (SecureComm07), Nice, France, September 17-20, 2007.
    • "Implications of Radio Fingerprinting on the Security of Sensor Networks", K. B. Rasmussen, S. Capkun, 3rd International Conference on Security and Privacy in Communication Networks (SecureComm07), Nice, France, September 17-20, 2007.
  • 12
    • 33846997176 scopus 로고    scopus 로고
    • Electromagnetic Signatures of WLAN Cards and Network Security, K.A. Remley, C.A. Grosvenor, R.T. Johnk, D.R. Novotny, P.D. Hale, M.D. McKinley, A. Karygiannis, E. Antonakakis, 2005 IEEE International Symposium on Signal Processing and Information Technology, Athens, Greece, pp.484-488, December 18-20, 2005.
    • "Electromagnetic Signatures of WLAN Cards and Network Security", K.A. Remley, C.A. Grosvenor, R.T. Johnk, D.R. Novotny, P.D. Hale, M.D. McKinley, A. Karygiannis, E. Antonakakis, 2005 IEEE International Symposium on Signal Processing and Information Technology, Athens, Greece, pp.484-488, December 18-20, 2005.
  • 13
    • 37749047975 scopus 로고    scopus 로고
    • Robust Location Distinction using Temporal Link Signatures, N. Patwari, S.K. Kasera, MobiCom'07, Montréal, Canada, pp. 111-122, September 9-14, 2007.
    • "Robust Location Distinction using Temporal Link Signatures", N. Patwari, S.K. Kasera, MobiCom'07, Montréal, Canada, pp. 111-122, September 9-14, 2007.
  • 14
    • 34247324807 scopus 로고    scopus 로고
    • Detecting Identity-Based Attacks in Wireless Networks using Signalprints, D.B. Faria, D. R. Cheriton, WiSe'06, Los Angeles, USA, pp. 43-52, September 29, 2006.
    • "Detecting Identity-Based Attacks in Wireless Networks using Signalprints", D.B. Faria, D. R. Cheriton, WiSe'06, Los Angeles, USA, pp. 43-52, September 29, 2006.
  • 15
    • 58049188696 scopus 로고    scopus 로고
    • Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility, M. Poturalski, P. Papadimitratos, J.-P. Hubaux, Proceedings of the 2008 ACM symposium on Information, computer and communications security, Tokyo, Japan, pp. 189-200, 2008.
    • "Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility", M. Poturalski, P. Papadimitratos, J.-P. Hubaux, Proceedings of the 2008 ACM symposium on Information, computer and communications security, Tokyo, Japan, pp. 189-200, 2008.
  • 16
    • 56749100656 scopus 로고    scopus 로고
    • Key Distribution Mechanisms for Wireless Sensor Networks: a Survey, S. A. Camptepe, B. Yener, Technical Report TR-05-07, Rensselaer Polytechnic Institute, Computer Science Department, Troy, New York, U.S.A., March 23, 2005.
    • "Key Distribution Mechanisms for Wireless Sensor Networks: a Survey", S. A. Camptepe, B. Yener, Technical Report TR-05-07, Rensselaer Polytechnic Institute, Computer Science Department, Troy, New York, U.S.A., March 23, 2005.
  • 17
    • 34147173361 scopus 로고    scopus 로고
    • A Survey on Peer-to-Peer Key Management for Mobile Ad Hoc Networks, J. Vandermerwe, D. Dawoud, S. McDonald, ACM Computing. Surveys.V.39, N.l, Article 1, April 2007.
    • "A Survey on Peer-to-Peer Key Management for Mobile Ad Hoc Networks", J. Vandermerwe, D. Dawoud, S. McDonald, ACM Computing. Surveys.V.39, N.l, Article 1, April 2007.
  • 18
    • 56749095356 scopus 로고    scopus 로고
    • Protocols for Authentication and Key Establishment, C. Boyd, A. Mathuria, Springer-Verlag, Berlin, Germany, ISBN:3-540-43107-1, 2003.
    • "Protocols for Authentication and Key Establishment", C. Boyd, A. Mathuria, Springer-Verlag, Berlin, Germany, ISBN:3-540-43107-1, 2003.
  • 19
    • 0022045868 scopus 로고    scopus 로고
    • Impossibility of Distributed Consensus with One Faulty Process, M. J. Fischer, N. A. Lynch, M. S. Paterson, Journal of the Assccktion for Computing Machinery, V.32, N.2, pp. 374-382, April 1985.
    • "Impossibility of Distributed Consensus with One Faulty Process", M. J. Fischer, N. A. Lynch, M. S. Paterson, Journal of the Assccktion for Computing Machinery, V.32, N.2, pp. 374-382, April 1985.
  • 20
    • 0141854015 scopus 로고    scopus 로고
    • Hundreds of impossibility results for distributed computing, F. Fich, E. Ruppert, Distributed Computing, Springer-Verlag, V.16, pp.121-163,2003.
    • "Hundreds of impossibility results for distributed computing", F. Fich, E. Ruppert, Distributed Computing, Springer-Verlag, V.16, pp.121-163,2003.
  • 21
    • 84948991087 scopus 로고    scopus 로고
    • A Secure and Efficient Conference Key Distribution System, M. Burmester, Y. Desmedt, Advances in Cryptology - Eurocrypt '94, Springer-Verlag LNCS 950, pp. 275-286, 1995.
    • "A Secure and Efficient Conference Key Distribution System", M. Burmester, Y. Desmedt, Advances in Cryptology - Eurocrypt '94, Springer-Verlag LNCS 950, pp. 275-286, 1995.
  • 22
    • 56749134358 scopus 로고    scopus 로고
    • Authenticated Multi-Party Key Agreement, M. Just, S. Vaudenay, ASIACRYPT: Advances in Cryptology --ASIACRYPT: International Conference on the Theory and Application of Cryptology, 1996.
    • "Authenticated Multi-Party Key Agreement", M. Just, S. Vaudenay, ASIACRYPT: Advances in Cryptology --ASIACRYPT: International Conference on the Theory and Application of Cryptology, 1996.
  • 23
    • 56749128166 scopus 로고    scopus 로고
    • Rethinking Public Key Infrastructures and Digital Certificates, S. Brands, MIT Press, Cambridge Ma., U.S.A., ISBN:0-262-02491-8, 2001.
    • "Rethinking Public Key Infrastructures and Digital Certificates", S. Brands, MIT Press, Cambridge Ma., U.S.A., ISBN:0-262-02491-8, 2001.
  • 24
    • 56749109830 scopus 로고    scopus 로고
    • Resilient Aggregation in Sensor Networks, D. Wagner, SASN'04, Washington, U.S.A., pp.78-87, October 25, 2004.
    • "Resilient Aggregation in Sensor Networks", D. Wagner, SASN'04, Washington, U.S.A., pp.78-87, October 25, 2004.
  • 25
    • 34547471023 scopus 로고    scopus 로고
    • RANBAR: RANSACBased Resilient Aggregation in Sensor Networks, L. Buttyan, P. Schaffer, I. Vajda, SASN'06, Alexandria, U.S.A., October 30, 2006.
    • "RANBAR: RANSACBased Resilient Aggregation in Sensor Networks", L. Buttyan, P. Schaffer, I. Vajda, SASN'06, Alexandria, U.S.A., October 30, 2006.
  • 26
    • 0037396695 scopus 로고    scopus 로고
    • Secret-Key Agreement over Unauthenticated Public Channels Part I: Denitions and a Completeness Result, U. Maurer, S. Wolf., IEEE Transactions on Information Theory, V.49, N.4, pp.822-831,2003.
    • "Secret-Key Agreement over Unauthenticated Public Channels Part I: Denitions and a Completeness Result", U. Maurer, S. Wolf., IEEE Transactions on Information Theory, V.49, N.4, pp.822-831,2003.
  • 27
    • 56749161813 scopus 로고    scopus 로고
    • Telecommunications and Internet Protocol Harmonization over Networks (TIPHON) Release 04; Protocol Framework Definition; Methods and Protocols for Security; Part 1: Threat Analysis,ETSI TS 102 165-1 V4.1.1 2003-02
    • "Telecommunications and Internet Protocol Harmonization over Networks (TIPHON) Release 04; Protocol Framework Definition; Methods and Protocols for Security; Part 1: Threat Analysis",ETSI TS 102 165-1 V4.1.1 (2003-02).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.