메뉴 건너뛰기




Volumn 10, Issue 3, 2011, Pages 449-462

Temporal link signature measurements for location distinction

Author keywords

location distinction.; measurements; PHY layer; radio channel

Indexed keywords

DETECTION RATES; EXISTING METHOD; FALSE ALARM RATE; MEASURED DATA; MULTIPLE RECEIVERS; MUTUAL INFORMATIONS; PHY LAYER; PHYSICAL CHANNELS; PHYSICAL SECURITY; RADIO CHANNEL; TAGGED OBJECT;

EID: 78751632083     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2010.189     Document Type: Article
Times cited : (33)

References (42)
  • 1
    • 78751606216 scopus 로고    scopus 로고
    • Sensing and Processing Across Networks (SPAN) Lab Website 2010
    • Sensing and Processing Across Networks (SPAN) Lab Website http://span.ece.utah.edu 2010.
  • 2
    • 84939024947 scopus 로고
    • A nonparametric estimation of the entropy for absolutely continuous distributions
    • May
    • I.A. Ahmad and P.E. Lin, "A Nonparametric Estimation of the Entropy for Absolutely Continuous Distributions," IEEE Trans. Information Theory, vol. 22, no. 3, pp. 372-375, May 1976.
    • (1976) IEEE Trans. Information Theory , vol.22 , Issue.3 , pp. 372-375
    • Ahmad, I.A.1    Lin, P.E.2
  • 8
    • 3543131272 scopus 로고    scopus 로고
    • Geodesic entropic graphs for dimension and entropy estimation in manifold learning
    • Aug.
    • J.A. Costa and A.O. Hero III, "Geodesic Entropic Graphs for Dimension and Entropy Estimation in Manifold Learning," IEEE Trans. Signal Processing, vol. 52, no. 8, pp. 2210-2221, Aug. 2004.
    • (2004) IEEE Trans. Signal Processing , vol.52 , Issue.8 , pp. 2210-2221
    • Costa, J.A.1    Hero Iii, A.O.2
  • 10
    • 1542341270 scopus 로고    scopus 로고
    • Location-based authentication: Grounding cyberspace for better security
    • Feb.
    • D.E. Denning and P.F. MacDoran, "Location-Based Authentication: Grounding Cyberspace for Better Security," Computer Fraud and Security, pp. 12-16, Feb. 1996.
    • (1996) Computer Fraud and Security , pp. 12-16
    • Denning, D.E.1    MacDoran, P.F.2
  • 13
    • 34247324807 scopus 로고    scopus 로고
    • Radio-layer security: Detecting identity-based attacks in wireless networks using signalprints
    • Sept.
    • D.B. Faria and D.R. Cheriton, "Radio-Layer Security: Detecting Identity-Based Attacks in Wireless Networks Using Signalprints," Proc. Workshop Wireless Security (WiSe '06), pp. 43-52, Sept. 2006.
    • (2006) Proc. Workshop Wireless Security (WiSe '06) , pp. 43-52
    • Faria, D.B.1    Cheriton, D.R.2
  • 15
    • 23944520444 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless lan through disposable interface identifiers: A quantitative analysis
    • M. Gruteser and D. Grunwald, "Enhancing Location Privacy in Wireless LAN through Disposable Interface Identifiers: A Quantitative Analysis," Mobile Networks and Applications, vol. 10, no. 3, pp. 315-325, 2005.
    • (2005) Mobile Networks and Applications , vol.10 , Issue.3 , pp. 315-325
    • Gruteser, M.1    Grunwald, D.2
  • 17
    • 0027627694 scopus 로고
    • The indoor radio propagation channel
    • July.
    • H. Hashemi, "The Indoor Radio Propagation Channel," Proc. IEEE, vol. 81, no. 7, pp. 943-968, July. 1993.
    • (1993) Proc. IEEE , vol.81 , Issue.7 , pp. 943-968
    • Hashemi, H.1
  • 19
    • 0000466122 scopus 로고    scopus 로고
    • Survey on independent component analysis
    • A. Hyvärinen, "Survey on Independent Component Analysis," Neural Computing Surveys, vol. 2, pp. 94-128, 1999.
    • (1999) Neural Computing Surveys , vol.2 , pp. 94-128
    • Hyvärinen, A.1
  • 22
  • 23
    • 0035415421 scopus 로고    scopus 로고
    • Joint symbol timing and channel estimation for OFDM based WLANs
    • DOI 10.1109/4234.940980, PII S1089779801076670
    • E.G. Larsson, G. Liu, J. Li, and G.B. Giannakis, "Joint Symbol Timing and Channel Estimation for OFDM Based WLANs," IEEE Comm. Letters, vol. 5, no. 8, pp. 325-327, Aug. 2001. (Pubitemid 32949940)
    • (2001) IEEE Communications Letters , vol.5 , Issue.8 , pp. 325-327
    • Larsson, E.G.1    Liu, G.2    Li, J.3    Giannakis, G.B.4
  • 29
    • 37749047975 scopus 로고    scopus 로고
    • Robust location distinction using temporal link signatures
    • Sept.
    • N. Patwari and S.K. Kasera, "Robust Location Distinction Using Temporal Link Signatures," Proc. ACM MobiCom, Sept. 2007.
    • (2007) Proc. ACM MobiCom
    • Patwari, N.1    Kasera, S.K.2
  • 31
    • 33646726919 scopus 로고    scopus 로고
    • New 802.11h mechanisms can reduce power consumption
    • Mar./Apr.
    • D. Qiao and S. Choi, "New 802.11h Mechanisms Can Reduce Power Consumption," IEEE IT Professional, vol. 8, no. 2. pp. 43-48, Mar./Apr. 2006.
    • (2006) IEEE IT Professional , vol.8 , Issue.2 , pp. 43-48
    • Qiao, D.1    Choi, S.2
  • 32
    • 0034229951 scopus 로고    scopus 로고
    • Picoradio supports Ad Hoc ultra-low power wireless networking
    • July
    • J.M. Rabaey, M.J. Ammer, J.L. da Silva Jr., D. Patel, and S. Roundy, "Picoradio Supports Ad Hoc Ultra-Low Power Wireless Networking," IEEE Computer, vol. 33, no. 7, pp. 42-48, July 2000.
    • (2000) IEEE Computer , vol.33 , Issue.7 , pp. 42-48
    • Rabaey, J.M.1    Ammer, M.J.2    Da Silva Jr., J.L.3    Patel, D.4    Roundy, S.5
  • 36
    • 0030818931 scopus 로고    scopus 로고
    • Blind multiuser channel estimation in asynchronous cdma systems
    • Jan.
    • M. Torlak and G. Xu, "Blind Multiuser Channel Estimation in Asynchronous CDMA Systems," IEEE Trans. Signal Processing, vol. 45, no. 1, pp. 137-147, Jan. 1997.
    • (1997) IEEE Trans. Signal Processing , vol.45 , Issue.1 , pp. 137-147
    • Torlak, M.1    Xu, G.2
  • 37
    • 22944483445 scopus 로고    scopus 로고
    • Edgeworth approximation of multivariate differential entropy
    • M.M. Van Hulle, "Edgeworth Approximation of Multivariate Differential Entropy," Neural Computation, vol. 17, no. 9, pp. 1903-1910, 2005.
    • (2005) Neural Computation , vol.17 , Issue.9 , pp. 1903-1910
    • Van Hulle, M.M.1
  • 42
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication in stime-variant channels
    • July
    • L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the Physical Layer for Wireless Authentication in sTime-Variant Channels," IEEE Trans. Wireless Comm., vol. 7, no. 7, pp. 2571-2579, July 2008.
    • (2008) IEEE Trans. Wireless Comm. , vol.7 , Issue.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.