메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1880-1888

Identity-based attack detection in mobile wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK DETECTION; DECORRELATIONS; DETECTION MECHANISM; HIGH PROBABILITY; IDENTITY-BASED; MOBILE SCENARIOS; MOBILE WIRELESS NETWORK; RECEIVED SIGNAL STRENGTH; STATIC NETWORKS; WIRELESS FADING CHANNELS;

EID: 79960885766     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2011.5934990     Document Type: Conference Paper
Times cited : (41)

References (24)
  • 9
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication in time-variant channels
    • July
    • L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol. 7, no. 7, pp. 2571-2579, July 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 11
    • 70349675562 scopus 로고    scopus 로고
    • Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks
    • J. Yang, Y. Chen, W. Trappe, and J. Cheng, "Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks," in The 28th Conference on Computer Communications INFO-COM, 2009, pp. 666-674.
    • (2009) The 28th Conference on Computer Communications INFO-COM , pp. 666-674
    • Yang, J.1    Chen, Y.2    Trappe, W.3    Cheng, J.4
  • 15
    • 36348950365 scopus 로고    scopus 로고
    • Detecting spoofing and anomalous traffic in wireless networks via forge-resistant relationships
    • December
    • Q. Li and W. Trappe, "Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships," IEEE Transactions on Information Foresics and Security, vol. 2, no. 4, pp. 793-808, December 2007.
    • (2007) IEEE Transactions on Information Foresics and Security , vol.2 , Issue.4 , pp. 793-808
    • Li, Q.1    Trappe, W.2
  • 16
    • 77958096949 scopus 로고    scopus 로고
    • Non-cryptographic authentication and identification in wireless networks
    • October
    • K. Zeng, K. Govindan, and P. Mohapatra, "Non-cryptographic authentication and identification in wireless networks," IEEE Wireless Communications, vol. 17, no. 5, pp. 56 -62, October 2010.
    • (2010) IEEE Wireless Communications , vol.17 , Issue.5 , pp. 56-62
    • Zeng, K.1    Govindan, K.2    Mohapatra, P.3
  • 24
    • 79960866123 scopus 로고    scopus 로고
    • [Online]
    • "TCPDUMP/LIBPCAP Public repository." [Online]. Available: http://www.tcpdump.org/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.