메뉴 건너뛰기




Volumn 8, Issue , 2015, Pages 27-39

Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers

Author keywords

Physical layer security; Radio frequency fingerprinting; Spoofing; WPAN; ZigBee Networks

Indexed keywords

ACCESS CONTROL; CONTROL EQUIPMENT; COSTS; CRITICAL INFRASTRUCTURES; NETWORK LAYERS; RADIO WAVES; SOFTWARE RADIO; STANDARDS; ZIGBEE;

EID: 84922252655     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2014.11.002     Document Type: Article
Times cited : (21)

References (24)
  • 1
    • 84922223758 scopus 로고    scopus 로고
    • Industrial wireless: all quiet on the wireless front
    • Boyes W. Industrial wireless: all quiet on the wireless front. Control Glob. 2011.
    • (2011) Control Glob.
    • Boyes, W.1
  • 3
    • 71049178173 scopus 로고    scopus 로고
    • Transient-based identification of wireless sensor nodes
    • in: Proceedings of the International Conference on Information Processing in Sensor Networks
    • B. Danev, S. Capkun, Transient-based identification of wireless sensor nodes, in: Proceedings of the International Conference on Information Processing in Sensor Networks, 2009, pp. 25-36.
    • (2009) , pp. 25-36
    • Danev, B.1    Capkun, S.2
  • 4
    • 77952407534 scopus 로고    scopus 로고
    • Attacks on physical-layer identification
    • in: Proceedings of the Third ACM Conference on Wireless Network Security
    • B. Danev, H. Luechken, S. Capkun, K. El Defrawy, Attacks on physical-layer identification, in: Proceedings of the Third ACM Conference on Wireless Network Security, pp. 89-98, 2010.
    • (2010) , pp. 89-98
    • Danev, B.1    Luechken, H.2    Capkun, S.3    El Defrawy, K.4
  • 5
    • 84874333373 scopus 로고    scopus 로고
    • An RF-DNA verification process for ZigBee networks
    • in: Proceedings of the Military Communications Conference
    • C. Dubendorfer, B. Ramsey, M. Temple, An RF-DNA verification process for ZigBee networks, in: Proceedings of the Military Communications Conference, 2012.
    • (2012)
    • Dubendorfer, C.1    Ramsey, B.2    Temple, M.3
  • 6
    • 0003922190 scopus 로고    scopus 로고
    • Pattern Classification
    • John Wiley and Sons
    • Duda R., Hart P., Stork D. Pattern Classification. New York 2001, John Wiley and Sons.
    • (2001) New York
    • Duda, R.1    Hart, P.2    Stork, D.3
  • 7
    • 84907697431 scopus 로고    scopus 로고
    • Assessment of Demand Response and Advanced Metering
    • Staff Report, Washington, DC
    • Federal Energy Regulatory Commission, Assessment of Demand Response and Advanced Metering, Staff Report, Washington, DC , 2012. http://www.ferc.gov/legal/staff-reports/12-20-12-demand-response.pdf.
    • (2012)
  • 8
    • 84885894065 scopus 로고    scopus 로고
    • Extracting keys from second generation ZigBee chips
    • presented at Black Hat USA
    • T. Goodspeed, Extracting keys from second generation ZigBee chips, presented at Black Hat USA , 2009. http://www.blackhat.com/presentations/bhusa-09/GOODSPEED/BHUSA09-Goodspeed-ZigbeeChips-PAPER.pdf.
    • (2009)
    • Goodspeed, T.1
  • 9
    • 84863269702 scopus 로고    scopus 로고
    • Api-do: Tools for exploring the wireless attack surface in smart meters
    • in: Proceedings of the Forty-Fifth Hawaii International Conference on System Sciences
    • T. Goodspeed, S. Bratus, R. Melgares, R. Speers, S. Smith, Api-do: Tools for exploring the wireless attack surface in smart meters, in: Proceedings of the Forty-Fifth Hawaii International Conference on System Sciences, pp. 2133-2140, 2012.
    • (2012) , pp. 2133-2140
    • Goodspeed, T.1    Bratus, S.2    Melgares, R.3    Speers, R.4    Smith, S.5
  • 11
    • 84871987901 scopus 로고    scopus 로고
    • Identification of legacy radios in a cognitive radio network using a radio frequency fingerprinting based method
    • in: Proceedings of the IEEE International Conference on Communications
    • N. Hu, Y. Yao, Identification of legacy radios in a cognitive radio network using a radio frequency fingerprinting based method, in: Proceedings of the IEEE International Conference on Communications, pp. 1597-1602, 2012.
    • (2012) , pp. 1597-1602
    • Hu, N.1    Yao, Y.2
  • 12
    • 10644233142 scopus 로고    scopus 로고
    • Guest Editorial, Introduction to the special section on M-Health: Beyond seamless mobility and global wireless healthcare connectivity
    • Istepanian R., Jovanov E., Zhang Y. Guest Editorial, Introduction to the special section on M-Health: Beyond seamless mobility and global wireless healthcare connectivity. IEEE Trans. Inf. Technol. Biomed. 2004, 8(4):405-414.
    • (2004) IEEE Trans. Inf. Technol. Biomed. , vol.8 , Issue.4 , pp. 405-414
    • Istepanian, R.1    Jovanov, E.2    Zhang, Y.3
  • 14
    • 84874294621 scopus 로고    scopus 로고
    • Where's the mote? Ask the MoteHunter!
    • in: Proceedings of the Thirty-Seventh IEEE Conference on Local Computer Networks Workshops
    • C. Kiraly, G. Picco, Where's the mote? Ask the MoteHunter! in: Proceedings of the Thirty-Seventh IEEE Conference on Local Computer Networks Workshops, pp. 982-990, 2012.
    • (2012) , pp. 982-990
    • Kiraly, C.1    Picco, G.2
  • 15
    • 84881382576 scopus 로고    scopus 로고
    • ZigBee-based internet of things in 3D terrains
    • Lin M., Leu J., Li K., Wu J. ZigBee-based internet of things in 3D terrains. Comput. Electr. Eng. 2013, 39(6):1667-1683.
    • (2013) Comput. Electr. Eng. , vol.39 , Issue.6 , pp. 1667-1683
    • Lin, M.1    Leu, J.2    Li, K.3    Wu, J.4
  • 16
    • 80051512509 scopus 로고    scopus 로고
    • Identifying wireless users via transmitter imperfections
    • Polak A., Dolatshahi S., Goeckel D. Identifying wireless users via transmitter imperfections. IEEE J. Sel. Areas Commun. 2011, 29(7):1469-1479.
    • (2011) IEEE J. Sel. Areas Commun. , vol.29 , Issue.7 , pp. 1469-1479
    • Polak, A.1    Dolatshahi, S.2    Goeckel, D.3
  • 17
    • 84897678206 scopus 로고    scopus 로고
    • Watching for weakness in wild WPANs
    • in: Proceedings of the Military Communications Conference
    • B. Ramsey, B. Mullins, R. Speers, K. Batterton, Watching for weakness in wild WPANs, in: Proceedings of the Military Communications Conference, pp. 1401-1409, 2013.
    • (2013) , pp. 1401-1409
    • Ramsey, B.1    Mullins, B.2    Speers, R.3    Batterton, K.4
  • 18
    • 84874344339 scopus 로고    scopus 로고
    • Improved tools for indoor ZigBee warwalking
    • in: Proceedings of the Thirty-Seventh IEEE Conference on Local Computer Networks Workshops
    • B. Ramsey, B. Mullins, E. White, Improved tools for indoor ZigBee warwalking, in: Proceedings of the Thirty-Seventh IEEE Conference on Local Computer Networks Workshops, pp. 921-924, 2012.
    • (2012) , pp. 921-924
    • Ramsey, B.1    Mullins, B.2    White, E.3
  • 19
    • 84877659198 scopus 로고    scopus 로고
    • PHY foundation for multi-factor ZigBee node authentication
    • in: Proceedings of the IEEE Global Communications Conference
    • B. Ramsey, M. Temple, B. Mullins, PHY foundation for multi-factor ZigBee node authentication, in: Proceedings of the IEEE Global Communications Conference, pp. 795-800, 2012.
    • (2012) , pp. 795-800
    • Ramsey, B.1    Temple, M.2    Mullins, B.3
  • 20
    • 79955712919 scopus 로고    scopus 로고
    • Key management systems for sensor networks in the context of the internet of things
    • Roman R., Alcaraz C., Lopez J., Sklavos N. Key management systems for sensor networks in the context of the internet of things. Comput. Electr. Eng. 2011, 37(2):147-159.
    • (2011) Comput. Electr. Eng. , vol.37 , Issue.2 , pp. 147-159
    • Roman, R.1    Alcaraz, C.2    Lopez, J.3    Sklavos, N.4
  • 21
    • 84922234095 scopus 로고    scopus 로고
    • Air Force hospital eliminates equipment loss
    • reduces labor hours, RFID J.
    • C. Swedberg, Air Force hospital eliminates equipment loss, reduces labor hours, RFID J. (), 2011. http://www.rfidjournal.com/articles/view?8445.
    • (2011)
    • Swedberg, C.1
  • 22
    • 84871992823 scopus 로고    scopus 로고
    • Analysis of receiver front end on the performance of RF fingerprinting
    • in: Proceedings of the Twenty-Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications
    • S. Ur Rehman, K. Sowerby, C. Coghill, Analysis of receiver front end on the performance of RF fingerprinting, in: Proceedings of the Twenty-Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 2494-2499, 2012.
    • (2012) , pp. 2494-2499
    • Ur Rehman, S.1    Sowerby, K.2    Coghill, C.3
  • 23
    • 84891938032 scopus 로고    scopus 로고
    • Analysis of impersonation attacks on systems using RF fingerprints and low-end receivers
    • Ur Rehman S., Sowerby K., Coghil C. Analysis of impersonation attacks on systems using RF fingerprints and low-end receivers. J. Comput. Syst. Sci. 2014, 80(3):591-601.
    • (2014) J. Comput. Syst. Sci. , vol.80 , Issue.3 , pp. 591-601
    • Ur Rehman, S.1    Sowerby, K.2    Coghil, C.3
  • 24
    • 84922235815 scopus 로고    scopus 로고
    • KillerBee: Framework and Tools for Exploiting ZigBee and IEEE 802.15.4 Networks. Version 1.0
    • J. Wright, KillerBee: Framework and Tools for Exploiting ZigBee and IEEE 802.15.4 Networks. Version 1.0. http://code.google.com/p/killerbee.
    • Wright, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.