메뉴 건너뛰기




Volumn , Issue , 2010, Pages

SecureAngle: Improving wireless security using angle-of-arrival information

Author keywords

802.11; angle of arrival; SecureAngle; wireless

Indexed keywords

802.11; ANGLE OF ARRIVAL; DEFENSE IN DEPTH; DOWNLINK TRANSMISSIONS; INDOOR ENVIRONMENT; LOCATION INFORMATION; LOCATION SERVICES; MULTI-ANTENNA; SECUREANGLE; SECURITY RISKS; WIRELESS SECURITY; WIRELESS SECURITY PROTOCOLS;

EID: 84865566718     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1868447.1868458     Document Type: Conference Paper
Times cited : (37)

References (17)
  • 2
    • 0033872896 scopus 로고    scopus 로고
    • RADAR: An in-building RF-based user location and tracking system
    • P. Bahl and V. Padmanabhan. RADAR: An in-building RF-based user location and tracking system. In Proc. of IEEE Infocom, pages 775-784, 2000.
    • (2000) Proc. of IEEE Infocom , pp. 775-784
    • Bahl, P.1    Padmanabhan, V.2
  • 4
    • 70349147400 scopus 로고    scopus 로고
    • Practical attacks against WEP and WPA
    • M. Beck and E. Tews. Practical attacks against WEP and WPA. In Proc. of ACM WiSec, pages 79-86, 2009.
    • (2009) Proc. of ACM WiSec , pp. 79-86
    • Beck, M.1    Tews, E.2
  • 6
    • 60149107046 scopus 로고    scopus 로고
    • Modulation rate adaptation in urban and vehicular environments: Cross-layer implementation and experimental evaluation
    • Sept.
    • J. Camp and E. Knightly. Modulation rate adaptation in urban and vehicular environments: Cross-layer implementation and experimental evaluation. In Proc. of ACM MobiCom, pages 315-326, Sept. 2008.
    • (2008) Proc. of ACM MobiCom , pp. 315-326
    • Camp, J.1    Knightly, E.2
  • 7
    • 84856542731 scopus 로고    scopus 로고
    • Radio-layer security: Detecting identity-based attacks in wireless networks using signalprints
    • D. Faria and D. Cheriton. Radio-layer security: Detecting identity-based attacks in wireless networks using signalprints. In Proc. of ACM WiSe, 2006.
    • Proc. of ACM WiSe, 2006
    • Faria, D.1    Cheriton, D.2
  • 8
    • 80052013888 scopus 로고    scopus 로고
    • Lax security led to TJX breach
    • May
    • D. Goodin. Lax security led to TJX breach. The Register, May 2007. http://www.theregister.co.uk/2007/05/04/txj-nonfeasance.
    • (2007) The Register
    • Goodin, D.1
  • 10
    • 37749047975 scopus 로고    scopus 로고
    • Robust location distinction using temporal link signatures
    • Sept.
    • N. Patwari and S. Kasera. Robust location distinction using temporal link signatures. In Proc. of the acm MobiCom Conf., pages 111-122, Sept. 2007.
    • (2007) Proc. of the Acm MobiCom Conf. , pp. 111-122
    • Patwari, N.1    Kasera, S.2
  • 11
    • 0031338376 scopus 로고    scopus 로고
    • Robust Frequency and Timing Synchroniation for OFDM
    • Dec.
    • T. M. Schmidl and D. C. Cox. Robust Frequency and Timing Synchroniation for OFDM. IEEE Trans. on Communications, 45(12):1613-1621, Dec. 1997.
    • (1997) IEEE Trans. on Communications , vol.45 , Issue.12 , pp. 1613-1621
    • Schmidl, T.M.1    Cox, D.C.2
  • 12
    • 0022683359 scopus 로고
    • Multiple emitter location and signal parameter estimation
    • Mar.
    • R. Schmidt. Multiple emitter location and signal parameter estimation. ieee Trans. on Antennas and Propagation, ap-34(3):276-280, Mar. 1986.
    • (1986) Ieee Trans. on Antennas and Propagation , vol.AP-34 , Issue.3 , pp. 276-280
    • Schmidt, R.1
  • 17
    • 58149114485 scopus 로고    scopus 로고
    • Using WLAN infrastructure for angle-of-arrival indoor user location
    • Sept.
    • C. Wong, R. Klukas, and G. Messier. Using WLAN infrastructure for angle-of-arrival indoor user location. In Proc. of the IEEE VTC Conf., pages 1-5, Sept. 2008.
    • (2008) Proc. of the IEEE VTC Conf. , pp. 1-5
    • Wong, C.1    Klukas, R.2    Messier, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.