메뉴 건너뛰기




Volumn , Issue , 2012, Pages 5415-5420

An information theoretic Location Verification System for wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION THEORY; INTELLIGENT SYSTEMS; INTELLIGENT VEHICLE HIGHWAY SYSTEMS; TRAFFIC CONTROL; WIRELESS NETWORKS;

EID: 84877678881     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2012.6503982     Document Type: Conference Paper
Times cited : (17)

References (23)
  • 2
    • 51349133236 scopus 로고    scopus 로고
    • Detecting 802.11 MAC-layer spoofing using received signal strength
    • Apr.
    • Y. Sheng, K. Tan, G. Chen, D. Kotz, and A. Campbell, "Detecting 802.11 MAC-layer spoofing using received signal strength," in Proc. IEE INF O COM, Apr. 2008, pp. 1768-1776.
    • (2008) Proc. IEE INF O COM , pp. 1768-1776
    • Sheng, Y.1    Tan, K.2    Chen, G.3    Kotz, D.4    Campbell, A.5
  • 3
    • 38549091723 scopus 로고    scopus 로고
    • Wireless intrusion detection using tracking verification
    • Glasgow, Jun.
    • R. A. Malaney, "Wireless intrusion detection using tracking verification," in Proc. IEEE ICC, Glasgow, Jun. 2007, pp. 1558-1563.
    • (2007) Proc. IEEE ICC , pp. 1558-1563
    • Malaney, R.A.1
  • 4
    • 77953789262 scopus 로고    scopus 로고
    • Detecting and localizing identity-based attacks in wireless and sensor networks
    • Jun.
    • Y. Chen, J. Yang, W. Trappe, and R. P. Martin, "Detecting and localizing identity-based attacks in wireless and sensor networks," IEEE Trans. Veh. Tecimoi., vol. 59, no. 5, pp. 2418-2434, Jun. 2010.
    • (2010) IEEE Trans. Veh. Tecimoi. , vol.59 , Issue.5 , pp. 2418-2434
    • Chen, Y.1    Yang, J.2    Trappe, W.3    Martin, R.P.4
  • 5
    • 39749096536 scopus 로고    scopus 로고
    • Secure location verification with hidden and mobile base station
    • Apr.
    • S. Capkun, K. B. Rasmussen, M. Cagalj, and M. Srivastava, "Secure location verification with hidden and mobile base station," IEEE Trans. Mobile Comput., vol. 7, no. 4, pp. 470-483, Apr. 2008.
    • (2008) IEEE Trans. Mobile Comput. , vol.7 , Issue.4 , pp. 470-483
    • Capkun, S.1    Rasmussen, K.B.2    Cagalj, M.3    Srivastava, M.4
  • 6
    • 44049090016 scopus 로고    scopus 로고
    • Evaluation of localization attacks on power-modulated challenge-response systems
    • Jun.
    • Z. Yu, L. Zang, and W. Trappe, "Evaluation of localization attacks on power-modulated challenge-response systems," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 259-272, Jun. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.2 , pp. 259-272
    • Yu, Z.1    Zang, L.2    Trappe, W.3
  • 7
    • 77951198358 scopus 로고    scopus 로고
    • A node-to-node location verification method
    • May
    • L. Dawei, L. Moon-Chuen, and W. Dan, "A node-to-node location verification method," IEEE Trans. Ind. Electron, vol. 57, pp. 1526-1537, May, 2010.
    • (2010) IEEE Trans. Ind. Electron , vol.57 , pp. 1526-1537
    • Dawei, L.1    Moon-Chuen, L.2    Dan, W.3
  • 8
    • 84856187703 scopus 로고    scopus 로고
    • A secure cooperative approach for nonline-of-sight location verification in VA NET
    • Jan.
    • O. Abumansoor, A. Boukerche, "A secure cooperative approach for nonline-of-sight location verification in VA NET," IEEE Trans. Veh. Technol., vol. 61, pp. 275-285, Jan. 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , pp. 275-285
    • Abumansoor, O.1    Boukerche, A.2
  • 9
    • 33845597602 scopus 로고    scopus 로고
    • Position verification approaches for vehicular ad hoc networks
    • Oct.
    • T. Leinmiiller, E. Schoch, and F. Kargl, "Position verification approaches for vehicular ad hoc networks," IEEE Wireless Commun., vol. 13, no. 5, pp. 16-21, Oct. 2006.
    • (2006) IEEE Wireless Commun. , vol.13 , Issue.5 , pp. 16-21
    • Leinmiiller, T.1    Schoch, E.2    Kargl, F.3
  • 10
    • 46749099829 scopus 로고    scopus 로고
    • Providing VANET security through active position detection
    • Jul.
    • G. Yan, S. Olairu, and M. C. Weigle, "Providing VANET security through active position detection," Comput. Commun., vol. 31, no. 12, pp. 2883-2897, Jul. 2008.
    • (2008) Comput. Commun. , vol.31 , Issue.12 , pp. 2883-2897
    • Yan, G.1    Olairu, S.2    Weigle, M.C.3
  • 12
    • 67249109195 scopus 로고    scopus 로고
    • Secure location verification for vehicular ad-hoc networks
    • Dec.
    • J.-H. Song, V. W. S. Wong, and V. C. M. Leung, "Secure location verification for vehicular ad-hoc networks," in Proc. IEEE GLOBECOM, Dec. 2008, pp. 1-5.
    • (2008) Proc. IEEE GLOBECOM , pp. 1-5
    • Song, J.-H.1    Wong, V.W.S.2    Leung, V.C.M.3
  • 13
    • 34247328623 scopus 로고    scopus 로고
    • Detection and localization of Sybil nodes in VA NETs
    • Sep.
    • B. Xiao, B. Yu, and C. Gao, "Detection and localization of Sybil nodes in VA NETs," in Proc. Workshop DlWANS, Sep. 2006, pp. 1-8.
    • (2006) Proc. Workshop DIWANS , pp. 1-8
    • Xiao, B.1    Yu, B.2    Gao, C.3
  • 14
    • 34247332710 scopus 로고    scopus 로고
    • Measuring intrusion detection capability: An information-theoretic approach
    • Taipei, Taiwan, Mar.
    • G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skoric, "Measuring intrusion detection capability: An information-theoretic approach," in Proc. ASIACCS' 06, Taipei, Taiwan, Mar. 2006.
    • (2006) Proc. ASIACCS' 06
    • Gu, G.1    Fogla, P.2    Dagon, D.3    Lee, W.4    Skoric, B.5
  • 15
    • 46749103795 scopus 로고    scopus 로고
    • Gaussian mixture modeling by exploiting the Mahanalobis distance
    • Jul.
    • D. Ververidis and C. Kotropoulos, "Gaussian mixture modeling by exploiting the Mahanalobis distance," IEEE Trans. Signal Process., vol. 56, no. 7, pp. 2797-2811, Jul. 2008.
    • (2008) IEEE Trans. Signal Process. , vol.56 , Issue.7 , pp. 2797-2811
    • Ververidis, D.1    Kotropoulos, C.2
  • 16
    • 33947604177 scopus 로고    scopus 로고
    • Nuisance parameters and location accuracy in lognormal fading model
    • Mar.
    • R. A. Malaney, "Nuisance parameters and location accuracy in lognormal fading model," IEEE Trans. Wireless Commun., vol. 6, no. 3, Mar. 2007.
    • (2007) IEEE Trans. Wireless Commun. , vol.6 , Issue.3
    • Malaney, R.A.1
  • 19
    • 79961116371 scopus 로고    scopus 로고
    • Tagging systems
    • US Patent, Pub. No. US2006/0022832
    • A. Kent, W. Munro, T. Spiller and R. Beausoleil, "Tagging Systems," US Patent, Pub. No. US2006/0022832, 2006.
    • (2006)
    • Kent, A.1    Munro, W.2    Spiller, T.3    Beausoleil, R.4
  • 20
    • 77951261706 scopus 로고    scopus 로고
    • Location-dependent communications using quantum entanglement
    • R. A. Malaney, "Location-dependent communications using quantum entanglement," Phys. Rev. A 81, 042319, 2010.
    • (2010) Phys. Rev. A , vol.81 , pp. 042319
    • Malaney, R.A.1
  • 21
    • 79551621917 scopus 로고    scopus 로고
    • Quantum location verification in noisy channels
    • Dec.
    • R. A. Malaney, "Quantum location verification in noisy channels," in Proc. IEEE GLOBECOM, Dec. 2010, pp. 1-6.
    • (2010) Proc. IEEE GLOBECOM , pp. 1-6
    • Malaney, R.A.1
  • 22
    • 84877660555 scopus 로고    scopus 로고
    • Location verification in quantum communications
    • WIPO Patent, Pub. No. W0/2011/044629
    • R. A. Malaney, "Location verification in quantum communications," WIPO Patent, Pub. No. W0/2011/044629, 2011.
    • (2011)
    • Malaney, R.A.1
  • 23
    • 80052013421 scopus 로고    scopus 로고
    • Position-based quantum cryptography: Impossibility and constructions
    • vol. 6841 of Lecture Notes in Computer Science, Springer-Verlag
    • H. Buhrman, N. Chandran, S. Fehr, R. Gelles, V. Goyal, R. Ostrovsky and C. Schaffner, "Position-based quantum cryptography: impossibility and constructions," In Advances in Cryptology, vol. 6841 of Lecture Notes in Computer Science, pp. 429-446, Springer-Verlag, 2011.
    • (2011) Advances in Cryptology , pp. 429-446
    • Buhrman, H.1    Chandran, N.2    Fehr, S.3    Gelles, R.4    Goyal, V.5    Ostrovsky, R.6    Schaffner, C.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.