메뉴 건너뛰기




Volumn , Issue , 2013, Pages 10-18

PHY-layer authentication by introducing controlled inter symbol interference

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; SIGNAL TO NOISE RATIO; SPECTROSCOPY; TRANSMITTERS;

EID: 84893562953     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CNS.2013.6682687     Document Type: Conference Paper
Times cited : (22)

References (24)
  • 4
    • 80051914579 scopus 로고    scopus 로고
    • Cryptographic link signatures for spectrum usage authentication in cognitive radio
    • X. Tan, K. Borle, W. Du, and B. Chen, "Cryptographic link signatures for spectrum usage authentication in cognitive radio," in Proc. ACM WiSec, June 2011, pp. 79-90.
    • Proc. ACM WiSec, June 2011 , pp. 79-90
    • Tan, X.1    Borle, K.2    Du, W.3    Chen, B.4
  • 6
    • 84865520742 scopus 로고    scopus 로고
    • On the limitation of embedding cryptographic signature for primary transmitter authentication
    • Aug.
    • T. Jiang, H. Zeng, Q. Yan, W. Lou, and Y. Hou, "On the limitation of embedding cryptographic signature for primary transmitter authentication," IEEE Wireless Commun. Letters, vol. 1, no. 4, pp. 324-327, Aug. 2012.
    • (2012) IEEE Wireless Commun. Letters , vol.1 , Issue.4 , pp. 324-327
    • Jiang, T.1    Zeng, H.2    Yan, Q.3    Lou, W.4    Hou, Y.5
  • 7
    • 0017512893 scopus 로고
    • Correlative coding: A bandwidth-efficient signaling scheme
    • July
    • S. Pasupathy, "Correlative coding: A bandwidth-efficient signaling scheme," IEEE Commun. Soc. Mag., vol. 15, no. 4, pp. 4-11, July 1977.
    • (1977) IEEE Commun. Soc. Mag. , vol.15 , Issue.4 , pp. 4-11
    • Pasupathy, S.1
  • 8
    • 0035681586 scopus 로고    scopus 로고
    • Partial response signaling for enhanced spectral efficiency and RF performance in OFDM systems
    • V. Vadde and S. Gray, "Partial response signaling for enhanced spectral efficiency and RF performance in OFDM systems," in IEEE Global Telecommun. Conf., vol. 5, 2001, pp. 3120-3124. (Pubitemid 34059165)
    • (2001) Conference Record / IEEE Global Telecommunications Conference , vol.5 , pp. 3120-3124
    • Vadde, V.1    Gray, S.2
  • 10
    • 0015346024 scopus 로고
    • Maximum-likelihood sequence estimation of digital sequences in the presence of intersymbol interference
    • May
    • J. Forney, G., "Maximum-likelihood sequence estimation of digital sequences in the presence of intersymbol interference," IEEE Tran. Info. Theory, vol. 18, no. 3, pp. 363-378, May 1972.
    • (1972) IEEE Tran. Info. Theory , vol.18 , Issue.3 , pp. 363-378
    • Forney, G.J.1
  • 11
    • 0015600423 scopus 로고
    • The viterbi algorithm
    • March
    • J. Forney, G.D., "The viterbi algorithm," IEEE Proc., vol. 61, no. 3, pp. 268-278, March 1973.
    • (1973) IEEE Proc. , vol.61 , Issue.3 , pp. 268-278
    • Forney, G.D.J.1
  • 13
    • 38049181728 scopus 로고    scopus 로고
    • Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting
    • Oct.
    • J. Hall, M. Barbeau, and E. Kranakis, "Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting," in Commun. Comput. Netw., Oct. 2006.
    • (2006) Commun. Comput. Netw.
    • Hall, J.1    Barbeau, M.2    Kranakis, E.3
  • 14
    • 34249822230 scopus 로고    scopus 로고
    • Wireless security through RF fingerprinting
    • O. Ureten and N. Serinken, "Wireless security through RF fingerprinting," Canadian J. Electr. Comput. Eng., vol. 32, no. 1, pp. 27-33, 2007.
    • (2007) Canadian J. Electr. Comput. Eng. , vol.32 , Issue.1 , pp. 27-33
    • Ureten, O.1    Serinken, N.2
  • 18
    • 0032625842 scopus 로고    scopus 로고
    • Watermarking as communication with side information
    • July
    • I. Cox, M. Miller, and A. McKellips, "Watermarking as communication with side information," Proc. IEEE, vol. 87, no. 7, pp. 1127-1141, July 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1127-1141
    • Cox, I.1    Miller, M.2    McKellips, A.3
  • 19
    • 33644995185 scopus 로고    scopus 로고
    • Analysis and design of secure watermark-based authentication systems
    • Mar.
    • C. Fei, D. Kundur, and R. Kwong, "Analysis and design of secure watermark-based authentication systems," IEEE Trans. Inform. Forensics Security, vol. 1, no. 1, pp. 43-55, Mar. 2006.
    • (2006) IEEE Trans. Inform. Forensics Security , vol.1 , Issue.1 , pp. 43-55
    • Fei, C.1    Kundur, D.2    Kwong, R.3
  • 21
    • 5444259436 scopus 로고    scopus 로고
    • Transmitter identification using embedded pseudo random sequences
    • Sep.
    • X. Wang, Y. Wu, and B. Caron, "Transmitter identification using embedded pseudo random sequences," IEEE Trans. Broadcast., vol. 50, pp. 244-252, Sep. 2004.
    • (2004) IEEE Trans. Broadcast. , vol.50 , pp. 244-252
    • Wang, X.1    Wu, Y.2    Caron, B.3
  • 22
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication in time-variant channels
    • July
    • L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, "Using the physical layer for wireless authentication in time-variant channels," IEEE Trans. Wireless Commun., vol. 7, no. 7, pp. 2571-2579, July 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 23
    • 77955196382 scopus 로고    scopus 로고
    • Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
    • Y. Liu, P. Ning, and H. Dai, "Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures," in IEEE Symp. Security and Privacy, May 2010, pp. 286-301.
    • IEEE Symp. Security and Privacy, May 2010 , pp. 286-301
    • Liu, Y.1    Ning, P.2    Dai, H.3
  • 24
    • 80051889486 scopus 로고    scopus 로고
    • Short paper: ACE: Authenticating the channel estimation process in wireless communication systems
    • R. Miller and W. Trappe, "Short paper: ACE: authenticating the channel estimation process in wireless communication systems," in Proc. ACM WiSec, 2011, pp. 91-96.
    • Proc. ACM WiSec, 2011 , pp. 91-96
    • Miller, R.1    Trappe, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.