메뉴 건너뛰기




Volumn , Issue , 2009, Pages 25-36

Transient-based identification of wireless sensor nodes

Author keywords

Fingerprinting; Sensor networks; Wireless security

Indexed keywords

EQUAL ERROR RATE; FINGERPRINTING; IMPERSONATION ATTACK; MESSAGE AUTHENTICATION; RECOGNITION ACCURACY; WIRELESS MULTI-HOP; WIRELESS SECURITY; WIRELESS SENSOR NODE;

EID: 71049178173     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (210)

References (36)
  • 1
    • 0029461389 scopus 로고
    • Transient analysis and genetic algorithms for classification
    • J. Toonstra and W. Kisner, "Transient analysis and genetic algorithms for classification," in Proc. IEEE WESCANEX, 1995.
    • (1995) Proc. IEEE WESCANEX
    • Toonstra, J.1    Kisner, W.2
  • 2
    • 0035388827 scopus 로고    scopus 로고
    • Characteristics of radio transmitter fingerprints
    • K. Ellis and N. Serinken, "Characteristics of radio transmitter fingerprints," Radio Science, vol. 36, pp. 585-597, 2001.
    • (2001) Radio Science , vol.36 , pp. 585-597
    • Ellis, K.1    Serinken, N.2
  • 3
    • 11144331561 scopus 로고    scopus 로고
    • Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
    • J. Hall, M. Barbeau, and E. Kranakis, "Enhancing intrusion detection in wireless networks using radio frequency fingerprinting," in Proc. CIIT, 2004.
    • (2004) Proc. CIIT
    • Hall, J.1    Barbeau, M.2    Kranakis, E.3
  • 6
    • 24344507334 scopus 로고    scopus 로고
    • Remote physical device fingerprinting
    • T. Kohno, A. Broido, and K. Claffy, "Remote physical device fingerprinting," IEEE TDSC, vol. 2, no. 2, 2005.
    • (2005) IEEE TDSC , vol.2 , Issue.2
    • Kohno, T.1    Broido, A.2    Claffy, K.3
  • 7
    • 71049148988 scopus 로고    scopus 로고
    • Nmap security scanner. http://www.insecure.org/nmap/2004
    • "Nmap security scanner." http://www.insecure.org/nmap/2004
  • 8
    • 71049194494 scopus 로고    scopus 로고
    • "Xprobe." http://www.sys-security.com
    • Xprobe1
  • 10
    • 0030357161 scopus 로고    scopus 로고
    • Wavelet based transmitter identification
    • R. Hippenstiel and Y. Payal, "Wavelet based transmitter identification," in Proc. ISSPA, 1996.
    • (1996) Proc. ISSPA
    • Hippenstiel, R.1    Payal, Y.2
  • 11
    • 38049181728 scopus 로고    scopus 로고
    • Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
    • J. Hall, M. Barbeau, and E. Kranakis, "Detecting rogue devices in bluetooth networks using radio frequency fingerprinting," in Proc. CCN, 2006.
    • (2006) Proc. CCN
    • Hall, J.1    Barbeau, M.2    Kranakis, E.3
  • 12
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks," in Proc. IEEE INFOCOM, 2003.
    • (2003) Proc. IEEE INFOCOM
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 13
    • 51349157157 scopus 로고    scopus 로고
    • Implications of radio fingerprinting on the security of sensor networks
    • K. Rassmussen and S. Capkun, "Implications of radio fingerprinting on the security of sensor networks," in Proc. SecureComm, 2007.
    • (2007) Proc. SecureComm
    • Rassmussen, K.1    Capkun, S.2
  • 14
    • 34547363825 scopus 로고    scopus 로고
    • The sybil attack in sensor networks: Analysis and defenses
    • J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis and defenses," in Proc. IEEE IPSN, 2004.
    • (2004) Proc. IEEE IPSN
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 15
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • B. Parno, A. Perrig, and V. Gligor, "Distributed detection of node replication attacks in sensor networks," in Proc. IEEE S&P, 2005.
    • (2005) Proc. IEEE S&P
    • Parno, B.1    Perrig, A.2    Gligor, V.3
  • 18
    • 84876396478 scopus 로고    scopus 로고
    • IEEE 802.15.4 standard
    • "IEEE 802.15.4 standard," 2006.
    • (2006)
  • 20
    • 0031188771 scopus 로고    scopus 로고
    • Probabilistic visual learning for object representation
    • B. Moghaddam and A. Pentland, "Probabilistic visual learning for object representation," IEEE PAMI, vol. 19, no. 7, pp. 696-710, 1996.
    • (1996) IEEE PAMI , vol.19 , Issue.7 , pp. 696-710
    • Moghaddam, B.1    Pentland, A.2
  • 22
    • 0035248924 scopus 로고    scopus 로고
    • Pca versus lda
    • A. Martinez and A. Kak, "Pca versus lda," IEEE PAMI, vol. 23, no. 2, pp. 228-233, 2001.
    • (2001) IEEE PAMI , vol.23 , Issue.2 , pp. 228-233
    • Martinez, A.1    Kak, A.2
  • 23
    • 34249822230 scopus 로고    scopus 로고
    • Wireless security through rf fingerprinting
    • Winter
    • O.Ureten and N.Serinken, "Wireless security through rf fingerprinting," Canadian J. Elect. Comput. Eng., vol. 32, no. 1, Winter 2007.
    • (2007) Canadian J. Elect. Comput. Eng , vol.32 , Issue.1
    • Ureten, O.1    Serinken, N.2
  • 25
    • 4043157158 scopus 로고    scopus 로고
    • An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions
    • O. Tekbas, N. Serinken, and O. Ureten, "An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions," Canadian J. Elect. Comput. Eng., vol. 29, no. 3, 2004.
    • (2004) Canadian J. Elect. Comput. Eng , vol.29 , Issue.3
    • Tekbas, O.1    Serinken, N.2    Ureten, O.3
  • 27
    • 29844457889 scopus 로고    scopus 로고
    • The feasibility of launching and detecting jamming attacks in wireless networks
    • W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. ACM MobiHoc, 2005.
    • (2005) Proc. ACM MobiHoc
    • Xu, W.1    Trappe, W.2    Zhang, Y.3    Wood, T.4
  • 28
    • 71049189349 scopus 로고    scopus 로고
    • Gnu software radio
    • "Gnu software radio." http://www.gnu.org/software/gnuradio/
  • 29
    • 50249175122 scopus 로고    scopus 로고
    • Jamming- resistant key establishment using uncoordinated frequency hopping
    • P
    • M. Strasser, C. Poepper, S. Capkun, and M. Cagalj, "Jamming- resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE S&P, 2008.
    • Proc. IEEE S& , pp. 2008
    • Strasser, M.1    Poepper, C.2    Capkun, S.3    Cagalj, M.4
  • 30
    • 23044524214 scopus 로고    scopus 로고
    • Physical security devices for computer subsystems: A survey of attacks and defenses
    • S. Weingart, "Physical security devices for computer subsystems: A survey of attacks and defenses," in Proc. CHES, 2000.
    • (2000) Proc. CHES
    • Weingart, S.1
  • 32
    • 76849097603 scopus 로고    scopus 로고
    • Energy analysis of public-key cryptography for wireless sensor networks
    • A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Proc. PerComm, 2005.
    • (2005) Proc. PerComm
    • Wander, A.1    Gura, N.2    Eberle, H.3    Gupta, V.4    Shantz, S.5
  • 34
    • 51349089417 scopus 로고    scopus 로고
    • Waveform collection for use in wireless telephone identification,
    • U.S. Patent 5,999,806
    • D. Kaplan and D. Stanhope, "Waveform collection for use in wireless telephone identification," U.S. Patent 5,999,806, 1999.
    • (1999)
    • Kaplan, D.1    Stanhope, D.2
  • 35
    • 71049133194 scopus 로고    scopus 로고
    • Identification of the defective transmission devices using the wavelet transform
    • B. Wang, S. Omatu, and T. Abe, "Identification of the defective transmission devices using the wavelet transform," IEEE PAMI, vol. 27, no. 6, pp. 696-710, 2005.
    • (2005) IEEE PAMI , vol.27 , Issue.6 , pp. 696-710
    • Wang, B.1    Omatu, S.2    Abe, T.3
  • 36
    • 1242298616 scopus 로고    scopus 로고
    • Improvement of transmitter identification system for low snr transients
    • O. Tekbas, O. Ureten, and N. Serinken, "Improvement of transmitter identification system for low snr transients," in Electronic Letters, 2004.
    • (2004) Electronic Letters
    • Tekbas, O.1    Ureten, O.2    Serinken, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.