메뉴 건너뛰기




Volumn , Issue , 2014, Pages 787-798

Blind Transmitter Authentication for spectrum security and enforcement

Author keywords

Cognitive radios; PHY layer authentication; Spectrum sharing and management; Transmitter identification

Indexed keywords

AUTHENTICATION; COGNITIVE RADIO; FREQUENCY ALLOCATION; PHYSICAL LAYER; TRANSMITTERS;

EID: 84910593983     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660318     Document Type: Conference Paper
Times cited : (39)

References (33)
  • 1
    • 84910637656 scopus 로고    scopus 로고
    • Accessed: May 15, 2014
    • Design considerations for minimum SNR. http://www.cisco.com/en/US/docs/wireless/technology/mesh/7.3/design/guide/Mesh-chapter-011.pdf. Accessed: May 15, 2014.
    • Design Considerations for Minimum SNR
  • 3
    • 84921018856 scopus 로고    scopus 로고
    • A practical and provably secure coalition-resistant group signature scheme
    • volume 1880 of Lecture Notes in Computer Science, Springer Berlin Heidelberg
    • G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Advances in Cryptology - CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 255-270. Springer Berlin Heidelberg, 2000.
    • (2000) Advances in Cryptology - CRYPTO 2000 , pp. 255-270
    • Ateniese, G.1    Camenisch, J.2    Joye, M.3    Tsudik, G.4
  • 5
    • 60149092949 scopus 로고    scopus 로고
    • Wireless device identification with radiometric signatures
    • V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In Proc. ACM MobiCom, pages 116-127, 2008.
    • (2008) Proc. ACM MobiCom , pp. 116-127
    • Brik, V.1    Banerjee, S.2    Gruteser, M.3    Oh, S.4
  • 6
    • 33745699032 scopus 로고    scopus 로고
    • Maximum-likelihood estimation of frequency and time offsets in OFDM systems with multiple sets of identical data
    • July
    • M.-H. Cheng and C.-C. Chou. Maximum-likelihood estimation of frequency and time offsets in OFDM systems with multiple sets of identical data. Signal Processing, IEEE Transactions on, 54(7):2848-2852, July 2006.
    • (2006) Signal Processing, IEEE Transactions on , vol.54 , Issue.7 , pp. 2848-2852
    • Cheng, M.-H.1    Chou, C.-C.2
  • 7
    • 0032625842 scopus 로고    scopus 로고
    • Watermarking as communication with side information
    • July
    • I. Cox, M. Miller, and A. McKellips. Watermarking as communication with side information. Proc. IEEE, 87(7):1127-1141, July 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1127-1141
    • Cox, I.1    Miller, M.2    McKellips, A.3
  • 8
    • 71049178173 scopus 로고    scopus 로고
    • Transient-based identification of wireless sensor nodes
    • Apr.
    • B. Danev and S. Capkun. Transient-based identification of wireless sensor nodes. In Int. Conf. Inform. Process. Sensor Netw., pages 25-36, Apr. 2009.
    • (2009) Int. Conf. Inform. Process. Sensor Netw. , pp. 25-36
    • Danev, B.1    Capkun, S.2
  • 11
    • 33644995185 scopus 로고    scopus 로고
    • Analysis and design of secure watermark-based authentication systems
    • Mar.
    • C. Fei, D. Kundur, and R. Kwong. Analysis and design of secure watermark-based authentication systems. IEEE Trans. Inform. Forensics Security, 1(1):43-55, Mar. 2006.
    • (2006) IEEE Trans. Inform. Forensics Security , vol.1 , Issue.1 , pp. 43-55
    • Fei, C.1    Kundur, D.2    Kwong, R.3
  • 12
    • 62949158691 scopus 로고    scopus 로고
    • Blind synchronization for OFDM systems in multipath channels
    • T. Fusco and M. Tanda. Blind synchronization for OFDM systems in multipath channels. IEEE Trans. Wireless Commun., 8(3):1340-1348, 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.3 , pp. 1340-1348
    • Fusco, T.1    Tanda, M.2
  • 13
    • 77953185209 scopus 로고    scopus 로고
    • Physical layer authentication watermarks through synthetic channel emulation
    • Apr.
    • N. Goergen, T. Clancy, and T. Newman. Physical layer authentication watermarks through synthetic channel emulation. In IEEE Symp. New Frontiers Dynamic Spectrum, pages 1-7, Apr. 2010.
    • (2010) IEEE Symp. New Frontiers Dynamic Spectrum , pp. 1-7
    • Goergen, N.1    Clancy, T.2    Newman, T.3
  • 14
    • 84910678430 scopus 로고    scopus 로고
    • Physical layer authentication in OFDM systems based on hypothesis testing of CFO estimates
    • W. Hou, X. Wang, and J.-Y. Chouinard. Physical layer authentication in OFDM systems based on hypothesis testing of CFO estimates. In IEEE ICC, 2012.
    • (2012) IEEE ICC
    • Hou, W.1    Wang, X.2    Chouinard, J.-Y.3
  • 17
    • 84893562953 scopus 로고    scopus 로고
    • PHY-layer authentication by introducing controlled inter symbol interference
    • V. Kumar, J.-M. Park, T. Clancy, and K. Bian. PHY-layer authentication by introducing controlled inter symbol interference. In IEEE CNS, pages 10-18, 2013.
    • (2013) IEEE CNS , pp. 10-18
    • Kumar, V.1    Park, J.-M.2    Clancy, T.3    Bian, K.4
  • 18
    • 1842715081 scopus 로고    scopus 로고
    • The advantages of elliptic curve cryptography for wireless security
    • K. Lauter. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications, page 63, 2004.
    • (2004) IEEE Wireless Communications , pp. 63
    • Lauter, K.1
  • 20
    • 77955196382 scopus 로고    scopus 로고
    • Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures
    • May
    • Y. Liu, P. Ning, and H. Dai. Authenticating primary users' signals in cognitive radio networks via integrated cryptographic and wireless link signatures. In IEEE Symp. Security and Privacy, pages 286-301, May 2010.
    • (2010) IEEE Symp. Security and Privacy , pp. 286-301
    • Liu, Y.1    Ning, P.2    Dai, H.3
  • 21
    • 80051889486 scopus 로고    scopus 로고
    • Short paper: ACE: Authenticating the channel estimation process in wireless communication systems
    • R. Miller and W. Trappe. Short paper: ACE: authenticating the channel estimation process in wireless communication systems. In Proc. ACM WiSec, pages 91-96, 2011.
    • (2011) Proc. ACM WiSec , pp. 91-96
    • Miller, R.1    Trappe, W.2
  • 22
  • 23
    • 79952991896 scopus 로고    scopus 로고
    • Blind estimation of OFDM parameters in cognitive radio networks
    • March
    • A. Punchihewa, V. Bhargava, and C. Despins. Blind estimation of OFDM parameters in cognitive radio networks. IEEE Trans. Wireless Commun., 10(3):733-738, March 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.3 , pp. 733-738
    • Punchihewa, A.1    Bhargava, V.2    Despins, C.3
  • 25
    • 80051914579 scopus 로고    scopus 로고
    • Cryptographic link signatures for spectrum usage authentication in cognitive radio
    • June
    • X. Tan, K. Borle, W. Du, and B. Chen. Cryptographic link signatures for spectrum usage authentication in cognitive radio. In Proc. ACM WiSec, pages 79-90, June 2011.
    • (2011) Proc. ACM WiSec , pp. 79-90
    • Tan, X.1    Borle, K.2    Du, W.3    Chen, B.4
  • 26
    • 84869380841 scopus 로고    scopus 로고
    • A comparison of PHY layer on the Ecma-392 and IEEE 802.11af standards
    • J.-S. Um, S.-H. Hwang, and B.-J. Jeong. A comparison of PHY layer on the Ecma-392 and IEEE 802.11af standards. In CROWNCOM, 7th Int. ICST Conf. on, pages 313-319, 2012.
    • (2012) CROWNCOM, 7th Int. ICST Conf. on , pp. 313-319
    • Um, J.-S.1    Hwang, S.-H.2    Jeong, B.-J.3
  • 27
    • 34249822230 scopus 로고    scopus 로고
    • Wireless security through RF fingerprinting
    • O. Ureten and N. Serinken. Wireless security through RF fingerprinting. Canadian J. Electr. Comput. Eng., 32(1):27-33, 2007.
    • (2007) Canadian J. Electr. Comput. Eng. , vol.32 , Issue.1 , pp. 27-33
    • Ureten, O.1    Serinken, N.2
  • 28
    • 5444259436 scopus 로고    scopus 로고
    • Transmitter identification using embedded pseudo random sequences
    • Sep.
    • X. Wang, Y. Wu, and B. Caron. Transmitter identification using embedded pseudo random sequences. IEEE Trans. Broadcast., 50:244-252, Sep. 2004.
    • (2004) IEEE Trans. Broadcast. , vol.50 , pp. 244-252
    • Wang, X.1    Wu, Y.2    Caron, B.3
  • 29
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication in time-variant channels
    • July
    • L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe. Using the physical layer for wireless authentication in time-variant channels. IEEE Trans. Wireless Commun., 7(7):2571-2579, July 2008.
    • (2008) IEEE Trans. Wireless Commun. , vol.7 , Issue.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 30
    • 70449632782 scopus 로고    scopus 로고
    • Tamper resistance for software defined radio software
    • S. Xiao, J. Park, and Y. Ye. Tamper resistance for software defined radio software. In COMPSAC, pages 383-391, 2009.
    • (2009) COMPSAC , pp. 383-391
    • Xiao, S.1    Park, J.2    Ye, Y.3
  • 33
    • 39349101790 scopus 로고    scopus 로고
    • OFDM signal identification and transmission parameter estimation for cognitive radio applications
    • T. Yucek and H. Arslan. OFDM signal identification and transmission parameter estimation for cognitive radio applications. In IEEE GlobeCom, pages 4056-4060, 2007.
    • (2007) IEEE GlobeCom , pp. 4056-4060
    • Yucek, T.1    Arslan, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.