메뉴 건너뛰기




Volumn 29, Issue 7, 2011, Pages 1469-1479

Identifying wireless users via transmitter imperfections

Author keywords

breaking anonymity; Brownian Bridge; Likelihood Ratio Test; process variations; Radiometric identification; Volterra series

Indexed keywords

BREAKING ANONYMITY; BROWNIAN BRIDGE; LIKELIHOOD RATIO TESTS; PROCESS VARIATION; RADIOMETRIC IDENTIFICATION; VOLTERRA SERIES;

EID: 80051512509     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2011.110812     Document Type: Article
Times cited : (204)

References (26)
  • 1
    • 80051543490 scopus 로고    scopus 로고
    • National Center for Missing Exploited and Children. Child Pornography Fact Sheet
    • National Center for Missing Exploited and Children. Child Pornography Fact Sheet: Http://www.missingkids.com/missingkids/servlet/PageServlet? LanguageCountry=enUS&PageId=2451.
  • 2
    • 80051506791 scopus 로고    scopus 로고
    • Business Software Alliance Year in Review
    • Business Software Alliance 2009 Year in Review: Http://www.bsa.org/ ~/media/Files/General/YIR2009.ashx.
    • (2009)
  • 3
    • 80051481725 scopus 로고    scopus 로고
    • Federal Trade Commission Identity Theft Survey Report
    • Federal Trade Commission 2006 Identity Theft Survey Report: Http: //www.ftc.gov/os/2007/11/SynovateFinalReportIDTheft2006.pdf.
    • (2006)
  • 4
    • 80051490331 scopus 로고    scopus 로고
    • Francois Paget, McAfee Avert Labs " Financial Fraud and Internet Banking: Threats and Countermeasures"
    • Francois Paget, McAfee Avert Labs, "Financial Fraud and Internet Banking: Threats and Countermeasures": Http://www.mcafee.com/us/ local content/reports/6168rpt fraud 0409.pdf.
  • 7
    • 38549124508 scopus 로고    scopus 로고
    • Fingerprints in the ether: Using the physical layer for wireless authentication
    • DOI 10.1109/ICC.2007.767, 4289438, 2007 IEEE International Conference on Communications, ICC'07
    • L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Fingerprints in ether: Using the physical layer for wireless authentication," in Proc. IEEE Int. Conf. Communications (ICC), June 2007, pp. 4646-4651. (Pubitemid 351146262)
    • (2007) IEEE International Conference on Communications , pp. 4646-4651
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 8
    • 69749083720 scopus 로고    scopus 로고
    • Channel-based detection of sybil attacks in wireless networks
    • September
    • "Channel-based detection of sybil attacks in wireless networks," in IEEE Transactions on Information Forensics and Security, September 2009, pp. VOL. 4, NO. 3.
    • (2009) IEEE Transactions on Information Forensics and Security , vol.4 , Issue.3
  • 10
    • 37749047975 scopus 로고    scopus 로고
    • Robust location distinction using temporal link signatures
    • N. Patwari and S. Kasera, "Robust location distinction using temporal link signatures," in ACM MOBICOM, 2007, pp. 111-122.
    • (2007) ACM MOBICOM , pp. 111-122
    • Patwari, N.1    Kasera, S.2
  • 11
    • 34247324807 scopus 로고    scopus 로고
    • Detecting identity-based attacks in wireless networks using signalprints
    • DOI 10.1145/1161289.1161298, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
    • D. Faria and D. Cheriton, "Radio-layer security: Detecting identitybased attacks in wireless networks using signalprints," in IProc. 5th ACM Workshop on Wireless Security (WiSe'06), Sep 2006, pp. 43-52. (Pubitemid 46634301)
    • (2006) WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security , vol.2006 , pp. 43-52
    • Faria, D.B.1    Cheriton, D.R.2
  • 14
    • 60149084101 scopus 로고    scopus 로고
    • PhD Dissertation, School of Computer Science, Carleton University, Ottawa, Ontario
    • J. Hall, "Detection of rogue devices in wireless networks." PhD Dissertation, School of Computer Science, Carleton University, Ottawa, Ontario, 2006.
    • (2006) Detection of Rogue Devices in Wireless Networks
    • Hall, J.1
  • 15
    • 0343349593 scopus 로고    scopus 로고
    • Bayesian detection of radio transmitter turn-on transients
    • O. Ureten and N. Serinken, "Bayesian detection of radio transmitter turn-on transients," in NSIP99, 1999, pp. 830-834.
    • (1999) NSIP99 , pp. 830-834
    • Ureten, O.1    Serinken, N.2
  • 22
    • 80051486179 scopus 로고    scopus 로고
    • Data Sheetc Analog Devices AD9776A/AD9778A/AD9779A
    • Data Sheet, Analog Devices AD9776A/AD9778A/AD9779A: Http://www.analog. com/static/imported-files/data sheets/AD9776 9778 9779.pdf.
  • 23
    • 28044466164 scopus 로고    scopus 로고
    • Optimum DAC resolution for WMAN, WLAN and WPAN OFDM-based standards
    • 9.2-4, 2005 Digest of Technical Papers - International Conference on Consumer Electronics, ICCE 2005
    • A. Mehrnia, "Optimum dac resolution for wman, wlan and wpan ofdm based standards," in International Conference on Consumer Electronics, 2005, pp. 355-356. (Pubitemid 41688151)
    • (2005) Digest of Technical Papers - IEEE International Conference on Consumer Electronics , pp. 355-356
    • Mehrnia, A.1
  • 24
    • 80051479251 scopus 로고    scopus 로고
    • Data Sheet MAXIM MAX5858 dual 10-bit 300Msps digital to analog converter
    • Data Sheet, MAXIM MAX5858 dual, 10-bit, 300Msps digital to analog converter: Http://datasheets.maxim-ic.com/en/ds/MAX5858.pdf.
  • 25
    • 80051506469 scopus 로고    scopus 로고
    • Data Sheet SKYWORKS SKY65006-348LF
    • Data Sheet, SKYWORKS SKY65006-348LF: Http://www.skyworksinc. com/uploads/documents/200122H.pdf.
  • 26
    • 80051501628 scopus 로고    scopus 로고
    • Data Sheet MAXIM MAX2242, 2.4GHz to 2.5GHz Linear Power Amplifier
    • Data Sheet, MAXIM MAX2242, 2.4GHz to 2.5GHz Linear Power Amplifier: . http://datasheets.maxim-ic.com/en/ds/MAX2242.pdf


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.