메뉴 건너뛰기




Volumn , Issue , 2013, Pages 200-204

Is link signature dependable for wireless security?

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL CORRELATION; CORRELATION ATTACK; LINE-OF-SIGHT; SECURITY MECHANISM; SPATIAL CORRELATIONS; STATISTICAL INFERENCE; WIRELESS SECURITY; WIRELESS SIGNALS;

EID: 84883075684     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2013.6566763     Document Type: Conference Paper
Times cited : (56)

References (21)
  • 1
    • 34247339387 scopus 로고    scopus 로고
    • Securing wireless systems via lower layer enforcements
    • Z. Li, W. Xu, R. Miller, and W. Trappe, "Securing wireless systems via lower layer enforcements," in Proc. of ACM WiSec, 2006.
    • (2006) Proc. of ACM WiSec
    • Li, Z.1    Xu, W.2    Miller, R.3    Trappe, W.4
  • 3
    • 37749047975 scopus 로고    scopus 로고
    • Robust location distinction using temporal link signatures
    • N. Patwari and S. Kasera, "Robust location distinction using temporal link signatures," in Proc. of ACM MobiCom, 2007.
    • (2007) Proc. of ACM MobiCom
    • Patwari, N.1    Kasera, S.2
  • 5
    • 77955196382 scopus 로고    scopus 로고
    • Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
    • Y. Liu, P. Ning, and H. Dai, "Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures," in IEEE Symposium on SP (Oakland), 2010.
    • (2010) IEEE Symposium on SP (Oakland)
    • Liu, Y.1    Ning, P.2    Dai, H.3
  • 7
    • 60149097098 scopus 로고    scopus 로고
    • Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel
    • S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, "Radiotelepathy: Extracting a secret key from an unauthenticated wireless channel," in Proc. of ACM MobiCom, 2008.
    • (2008) Proc. of ACM MobiCom
    • Mathur, S.1    Trappe, W.2    Mandayam, N.3    Ye, C.4    Reznik, A.5
  • 8
    • 72249083097 scopus 로고    scopus 로고
    • High-rate uncorrelated bit extraction for shared secret key generation from channel measurements
    • N. Patwari, J. Croft, S. Jana, and S. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements," IEEE Trans. Mobile Comput., vol. 9, no. 1, pp. 17-30, 2010.
    • (2010) IEEE Trans. Mobile Comput , vol.9 , Issue.1 , pp. 17-30
    • Patwari, N.1    Croft, J.2    Jana, S.3    Kasera, S.4
  • 9
    • 33846583244 scopus 로고    scopus 로고
    • Wireless communications: Principles and practice
    • T. Rappaport, Wireless communications: Principles and practice. Prentice Hall, 2001.
    • (2001) Prentice Hall
    • Rappaport, T.1
  • 11
    • 27744585978 scopus 로고    scopus 로고
    • Closed-form expressions for the correlation coefficient of directive antennas impinged by a multimodal truncated laplacian PAS
    • L. Schumacher and B. Raghothaman, "Closed-form expressions for the correlation coefficient of directive antennas impinged by a multimodal truncated laplacian PAS," IEEE Trans. Wireless Commun., vol. 4, no. 4, pp. 1351-1359, 2005.
    • (2005) IEEE Trans. Wireless Commun. , vol.4 , Issue.4 , pp. 1351-1359
    • Schumacher, L.1    Raghothaman, B.2
  • 12
    • 0038236417 scopus 로고    scopus 로고
    • Correlation analysis based on MIMO channel measurements in an indoor environment
    • P. Kyritsi, D. Cox, R. Valenzuela, and P. Wolniansky, "Correlation analysis based on MIMO channel measurements in an indoor environment," IEEE J. Sel. Areas Commun., vol. 21, no. 5, pp. 713-720, 2003.
    • (2003) IEEE J. Sel. Areas Commun. , vol.21 , Issue.5 , pp. 713-720
    • Kyritsi, P.1    Cox, D.2    Valenzuela, R.3    Wolniansky, P.4
  • 13
    • 84861598237 scopus 로고    scopus 로고
    • Enhanced wireless channel authentication using time-synched link signature
    • Y. Liu and P. Ning, "Enhanced wireless channel authentication using time-synched link signature," in Proc. of IEEE INFOCOM-mini, 2012.
    • (2012) Proc. of IEEE INFOCOM-mini
    • Liu, Y.1    Ning, P.2
  • 14
    • 79957837002 scopus 로고    scopus 로고
    • On passive inference attacks against physical-layer key extraction
    • M. Edman, A. Kiayias, and B. Yener, "On passive inference attacks against physical-layer key extraction," in Proc. of ACM EuroSec, 2011.
    • (2011) Proc. of ACM EuroSec
    • Edman, M.1    Kiayias, A.2    Yener, B.3
  • 17
    • 0033887179 scopus 로고    scopus 로고
    • Fading correlation and its effect on the capacity of multielement antenna systems
    • D. Shiu, G. Foschini, M. Gans, and J. Kahn, "Fading correlation and its effect on the capacity of multielement antenna systems," IEEE Trans. Commun., vol. 48, no. 3, pp. 502-513, 2000.
    • (2000) IEEE Trans. Commun. , vol.48 , Issue.3 , pp. 502-513
    • Shiu, D.1    Foschini, G.2    Gans, M.3    Kahn, J.4
  • 19
    • 0036530337 scopus 로고    scopus 로고
    • A space-time correlation model for multielement antenna systems in mobile fading channels
    • IEEE
    • A. Abdi and M. Kaveh, "A space-time correlation model for multielement antenna systems in mobile fading channels," IEEE J. Sel. Areas Commun., vol. 20, no. 3, pp. 550-560, 2002.
    • (2002) J. Sel. Areas Commun. , vol.20 , Issue.3 , pp. 550-560
    • Abdi, A.1    Kaveh, M.2
  • 21
    • 84883112722 scopus 로고    scopus 로고
    • Is link signature dependable for wireless security?
    • NC State University, Department of Electrical Engineering
    • X. He, H. Dai, W. Shen, and P. Ning, "Is link signature dependable for wireless security?" NC State University, Department of Electrical Engineering, Tech. Rep., 2012, available at http://www4.ncsu.edu/hdai/ linksignature.pdf.
    • Tech. Rep. , vol.2012
    • He, X.1    Dai, H.2    Shen, W.3    Ning, P.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.