메뉴 건너뛰기




Volumn , Issue , 2008, Pages 116-127

Wireless device identification with radiometric signatures

Author keywords

802.11; Authenitcation; Fingerprinting; PHY; Radiometric; RF; Security; Security token; Signature; Wireless

Indexed keywords

802.11; AUTHENITCATION; FINGERPRINTING; PHY; RADIOMETRIC; RF; SECURITY; SECURITY TOKEN; SIGNATURE; WIRELESS;

EID: 60149092949     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1409944.1409959     Document Type: Conference Paper
Times cited : (718)

References (36)
  • 1
    • 60149102635 scopus 로고    scopus 로고
    • Agilent 802.11a/g Manufacturing Test Application Note : A Guide to Getting Started
    • Agilent Technologies
    • Agilent Technologies. Agilent 802.11a/g Manufacturing Test Application Note : A Guide to Getting Started. Application note 1308-3.
    • Application note 1308-3
  • 2
    • 84948074711 scopus 로고    scopus 로고
    • Making 802.11g transmitter measurements
    • Agilent Technologies
    • Agilent Technologies. Making 802.11g transmitter measurements. Application note 1380-4.
    • Application note 1380-4
  • 3
    • 60149083124 scopus 로고    scopus 로고
    • RF Testing of WLAN products
    • Agilent Technologies
    • Agilent Technologies. RF Testing of WLAN products. Application note 1380-1.
    • Application note 1380-1
  • 4
    • 60149108331 scopus 로고    scopus 로고
    • Testing and Troubleshooting Digital RF Communications Transmitter Designs
    • Agilent Technologies
    • Agilent Technologies. Testing and Troubleshooting Digital RF Communications Transmitter Designs. Application note 1313.
    • Application note 1313
  • 5
    • 48149099022 scopus 로고    scopus 로고
    • Detecting Impersonation Attacks in Future Wireless and Mobile Networks
    • M. Barbeau, J. Hall, and E. Kranakis. Detecting Impersonation Attacks in Future Wireless and Mobile Networks. MADNES, 2006.
    • (2006) MADNES
    • Barbeau, M.1    Hall, J.2    Kranakis, E.3
  • 6
    • 0004283194 scopus 로고    scopus 로고
    • Artech House, See entry on Target Recongnition and Identification
    • David K. Barton and Sergey A. Leonov. Radar Technology Encyclopedia. Artech House, 1998. See entry on Target Recongnition and Identification.
    • (1998) Radar Technology Encyclopedia
    • Barton, D.K.1    Leonov, S.A.2
  • 9
    • 0029462943 scopus 로고    scopus 로고
    • Novel identification of intercepted signals from unknown radio transmitters
    • H.C. Choe, C.E. Poole, A.M. Yu, and H.H. Szu. Novel identification of intercepted signals from unknown radio transmitters. SPIE, 2491:504, 2003.
    • (2003) SPIE , vol.2491 , pp. 504
    • Choe, H.C.1    Poole, C.E.2    Yu, A.M.3    Szu, H.H.4
  • 10
    • 34247324807 scopus 로고    scopus 로고
    • Detecting identity-based attacks in wireless networks using signalprints
    • D.B. Faria and D.R. Cheriton. Detecting identity-based attacks in wireless networks using signalprints. ACM WiSe, pages 43-52, 2006.
    • (2006) ACM WiSe , pp. 43-52
    • Faria, D.B.1    Cheriton, D.R.2
  • 12
    • 85180626613 scopus 로고    scopus 로고
    • Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach
    • R. Gerdes, T. Daniels, M. Mina, and S. Russell. Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach. NDSS, 2006.
    • (2006) NDSS
    • Gerdes, R.1    Daniels, T.2    Mina, M.3    Russell, S.4
  • 15
  • 17
    • 0012785420 scopus 로고    scopus 로고
    • IEEE Std 802.11a
    • IEEE Standards Association
    • IEEE Standards Association. IEEE Std 802.11a. http://standards.ieee.org/ getieee802/download/802.11a-1999.pdf.
  • 18
    • 84868868850 scopus 로고    scopus 로고
    • IEEE Std 802.11b
    • IEEE Standards Association
    • IEEE Standards Association. IEEE Std 802.11b. http://standards.ieee.org/ getieee802/download/802.11b-1999.pdf.
  • 20
    • 84979563757 scopus 로고
    • Specific emitter identification (SEI) and classical parameter fusion technology
    • L.E. Langley. Specific emitter identification (SEI) and classical parameter fusion technology. WESCON, 1993.
    • (1993) WESCON
    • Langley, L.E.1
  • 24
    • 60149098160 scopus 로고    scopus 로고
    • ORBIT wireless research laboratory. WINLAB, Rutgers University, http://www.orbit-lab.org/.
    • ORBIT wireless research laboratory. WINLAB, Rutgers University, http://www.orbit-lab.org/.
  • 25
    • 37749006403 scopus 로고    scopus 로고
    • Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, and David Wetherall. 802.11 user fingerprinting. In MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pages 99-110, New York, NY, USA, 2007. ACM.
    • Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, and David Wetherall. 802.11 user fingerprinting. In MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pages 99-110, New York, NY, USA, 2007. ACM.
  • 26
    • 37749047975 scopus 로고    scopus 로고
    • Robust location distinction using temporal link signatures
    • N. Patwari and S.K. Kasera. Robust location distinction using temporal link signatures. ACM MOBICOM, pages 111-122, 2007.
    • (2007) ACM MOBICOM , pp. 111-122
    • Patwari, N.1    Kasera, S.K.2
  • 28
    • 51349157157 scopus 로고    scopus 로고
    • Implications of Radio Fingerprinting on the Security of Sensor Networks
    • K.B. Rasmussen and S. Capkun. Implications of Radio Fingerprinting on the Security of Sensor Networks. Proceedings of IEEE SecureComm, 2007.
    • (2007) Proceedings of IEEE SecureComm
    • Rasmussen, K.B.1    Capkun, S.2
  • 30
    • 1542487484 scopus 로고    scopus 로고
    • Cellular security: Better, but foes still lurk
    • M.J. Riezenman. Cellular security: better, but foes still lurk. Spectrum, IEEE, 2000.
    • (2000) Spectrum, IEEE
    • Riezenman, M.J.1
  • 31
    • 0038343934 scopus 로고    scopus 로고
    • Information fusion in biometrics
    • A. Ross and A. Jain. Information fusion in biometrics. Pattern Recognition Letters, 24(13):2115-2125, 2003.
    • (2003) Pattern Recognition Letters , vol.24 , Issue.13 , pp. 2115-2125
    • Ross, A.1    Jain, A.2
  • 32
    • 60149110675 scopus 로고    scopus 로고
    • 89600S series VXI-based Vector Signal Analyzer. Agilent technologies
    • 89600S series VXI-based Vector Signal Analyzer. Agilent technologies.
  • 34
    • 26444609828 scopus 로고    scopus 로고
    • Capacity and Examples of Template-Protecting Biometrie Authentication Systems
    • P. Tuyls and J. Goseling. Capacity and Examples of Template-Protecting Biometrie Authentication Systems. ECCV, 2004.
    • (2004) ECCV
    • Tuyls, P.1    Goseling, J.2
  • 35
    • 34249822230 scopus 로고    scopus 로고
    • O. Ureten and N. Serinken. Wireless security through RF fingerprinting. Electrical and Computer Engineering, Canadian Journal of, 32(1):27-33, 2007.
    • O. Ureten and N. Serinken. Wireless security through RF fingerprinting. Electrical and Computer Engineering, Canadian Journal of, 32(1):27-33, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.