메뉴 건너뛰기




Volumn 0, Issue 9781461465096, 2013, Pages 1-83

Physical layer approaches for securing wireless communication systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; COMPUTERS;

EID: 85045996161     PISSN: 21915768     EISSN: 21915776     Source Type: Book Series    
DOI: None     Document Type: Chapter
Times cited : (26)

References (92)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon, ‘‘Communication theory of secrecy systems,’’ Bell Syst. Tech. J., vol. 29, pp. 656–715, 1949.
    • (1949) Bell Syst. Tech. J. , vol.29 , pp. 656-715
    • Shannon, C.E.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, ‘‘The wire-tap channel,’’ Bell Syst. Tech. J., vol. 54, pp. 1355–1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 0017973511 scopus 로고    scopus 로고
    • Broadcast channels with confidential messages
    • May 1978
    • I. Csiszar and J. Korner, ‘‘Broadcast channels with confidential messages,’’ IEEE Trans. Inf. Theory, vol. 24, pp. 339–348, May 1978.
    • IEEE Trans. Inf. Theory , vol.24 , pp. 339-348
    • Csiszar, I.1    Korner, J.2
  • 4
    • 0347337828 scopus 로고    scopus 로고
    • Secure space-time communication
    • Dec. 2003
    • A.O. Hero, ‘‘Secure space-time communication,’’ IEEE Trans. Inf. Theory, vol. 49, no. 12, pp. 3235–3249, Dec. 2003.
    • IEEE Trans. Inf. Theory , vol.49 , Issue.12 , pp. 3235-3249
    • Hero, A.O.1
  • 5
    • 51849132358 scopus 로고    scopus 로고
    • Using antenna array redundancy and channel diversity for secure wireless transmissions
    • May 2007
    • X. Li and J. Hwu, ‘‘Using antenna array redundancy and channel diversity for secure wireless transmissions,’’ J. Commun., vol. 2, no. 3, pp. 24–32, May 2007.
    • J. Commun. , vol.2 , Issue.3 , pp. 24-32
    • Li, X.1    Hwu, J.2
  • 6
    • 44849094850 scopus 로고    scopus 로고
    • Secure MIMO communications in a system with equal numbers of transmit and receive antennas
    • May
    • H. Kim and J. D. Villasenor, ‘‘Secure MIMO communications in a system with equal numbers of transmit and receive antennas,’’ IEEE Commun. Lett., vol. 12, no. 5, pp. 386–388, May, 2008.
    • (2008) IEEE Commun. Lett. , vol.12 , Issue.5 , pp. 386-388
    • Kim, H.1    Villasenor, J.D.2
  • 7
    • 0027599802 scopus 로고    scopus 로고
    • Secret key agreement by public discussion from common information
    • Mar. 1993
    • U. Maurer, ‘‘Secret key agreement by public discussion from common information,’’ IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733–742, Mar. 1993.
    • IEEE Trans. Inf. Theory , vol.39 , Issue.3 , pp. 733-742
    • Maurer, U.1
  • 9
    • 0027629488 scopus 로고
    • Common randomness in information theory and cryptography, part I: Secret sharing
    • July
    • I. Csiszar and P. Narayan, ‘‘Common randomness in information theory and cryptography, part I: Secret sharing,’’ IEEE Trans. Inf. Theory, vol. 39, pp. 1121–1132, July 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , pp. 1121-1132
    • Csiszar, I.1    Narayan, P.2
  • 11
    • 45249104850 scopus 로고    scopus 로고
    • Wireless information theoretic security
    • June, 2008
    • M. Nloch, J. Barros and M. R. D. Rodrigues, ‘‘Wireless information theoretic security,’’ IEEE Trans. Inform. Theory, vol. 54, no. 6, pp. 2515–2534, June, 2008.
    • IEEE Trans. Inform. Theory , vol.54 , Issue.6 , pp. 2515-2534
    • Nloch, M.1    Barros, J.2    Rodrigues, M.R.D.3
  • 12
    • 33747886952 scopus 로고    scopus 로고
    • Secret key agreement from correlated source outputs using low density parity check matrices
    • July 2006
    • J. Muramatsu, ‘‘Secret key agreement from correlated source outputs using low density parity check matrices,’’ IEICE Trans. Fund. Elec. Comm. Comp., vol. 89, no. 7, pp. 2036–2046, July 2006.
    • IEICE Trans. Fund. Elec. Comm. Comp. , vol.89 , Issue.7 , pp. 2036-2046
    • Muramatsu, J.1
  • 14
    • 45249101530 scopus 로고    scopus 로고
    • The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming
    • June, 2008
    • E. Tekin and A. Yener, ‘‘The general Gaussian multiple-access and two-way wire-tap channels: Achievable rates and cooperative jamming,’’ IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2735–2751, June, 2008.
    • IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2735-2751
    • Tekin, E.1    Yener, A.2
  • 18
    • 0033099611 scopus 로고    scopus 로고
    • Good error-correcting codes based on very sparse matrices
    • Mar. 1999
    • D. J. C. MacKay, ‘‘Good error-correcting codes based on very sparse matrices,’’ IEEE Trans. Inf. Theory, vol. 45, no. 3, pp. 399–431, Mar. 1999.
    • IEEE Trans. Inf. Theory , vol.45 , Issue.3 , pp. 399-431
    • Mackay, D.J.C.1
  • 19
    • 4544245136 scopus 로고    scopus 로고
    • Exact thresholds and optimal codes for the binary-symmetric channel and gallager’s decoding algorithm A
    • Sep. 2004
    • L. Bazzi, T. J. Richardson and R. L. Urbanke, ‘‘Exact thresholds and optimal codes for the binary-symmetric channel and gallager’s decoding algorithm A,’’ IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 2010–2021, Sep. 2004.
    • IEEE Trans. Inf. Theory , vol.50 , Issue.9 , pp. 2010-2021
    • Bazzi, L.1    Richardson, T.J.2    Urbanke, R.L.3
  • 21
    • 80053941690 scopus 로고    scopus 로고
    • Achieving the secrecy capacity of wiretap channels using polar codes
    • H. Mahdavifar and A. Vardy, ‘‘Achieving the secrecy capacity of wiretap channels using polar codes,’’ IEEE Trans. Inform. Theory, vol. 57, no. 10, pp. 6428–6443, 2011.
    • (2011) IEEE Trans. Inform. Theory , vol.57 , Issue.10 , pp. 6428-6443
    • Mahdavifar, H.1    Vardy, A.2
  • 22
    • 80051775152 scopus 로고    scopus 로고
    • Strong secrecy on the binary erasure wiretap channel using large-girth ldpc codes
    • A. Subramanian, A. Thangaraj, M. Bloch, and S. McLaughlin, ‘‘Strong secrecy on the binary erasure wiretap channel using large-girth ldpc codes,’’ IEEE Trans. Inform. Forensics and Secur., vol. 6, no.3, pp. 585–594, 2011.
    • (2011) IEEE Trans. Inform. Forensics and Secur. , vol.6 , Issue.3 , pp. 585-594
    • Subramanian, A.1    Thangaraj, A.2    Bloch, M.3    McLaughlin, S.4
  • 23
    • 79958020005 scopus 로고    scopus 로고
    • Secret keys from channel noise
    • H. Ahmadi, R. Safavi-Naini, ‘‘Secret keys from channel noise,’’ Eurocry 2011, pp. 266–283, 2011.
    • (2011) Eurocry 2011 , pp. 266-283
    • Ahmadi, H.1    Safavi-Naini, R.2
  • 24
    • 77953297543 scopus 로고    scopus 로고
    • Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
    • K. Zeng and D. Wu, A. Chan and P. Mohapatra, ‘‘Exploiting multiple-antenna diversity for shared secret key generation in wireless networks,’’ IEEEINFOCOM 2010, pp. 1–9, 2010.
    • (2010) IEEEINFOCOM 2010 , pp. 1-9
    • Zeng, K.1    Wu, D.2    Chan, A.3    Mohapatra, P.4
  • 25
    • 0034318173 scopus 로고    scopus 로고
    • Parallel concatenated gallager codes
    • H. Behairy, S.-C. Chang, ‘‘Parallel concatenated gallager codes,’’ Electron.Lett., vol. 36, no. 24, pp. 2025–2026, 2000.
    • (2000) Electron.Lett. , vol.36 , Issue.24 , pp. 2025-2026
    • Behairy, H.1    Chang, S.-C.2
  • 26
    • 74549130152 scopus 로고    scopus 로고
    • Build-in wiretap channel I with feedback and LDPC codes
    • Dec. 2009
    • H. Wen, G. Gong and P-H. Ho, ‘‘Build-in wiretap channel I with feedback and LDPC codes,’’ J. Commun. Netw., vol. 11, no. 6, pp. 538–643, Dec. 2009.
    • J. Commun. Netw. , vol.11 , Issue.6 , pp. 538-643
    • Wen, H.1    Gong, G.2    Ho, P.-H.3
  • 27
    • 84861879514 scopus 로고    scopus 로고
    • On achieving unconditional secure communications over binary symmetric channels (BSC)
    • Hong Wen, Pin-Han Ho and Xiao-Hong Jiang, ‘‘On achieving unconditional secure communications over binary symmetric channels (BSC),’’ IEEE Wirel. Commun. Lett., vol. 1, no. 2, pp. 49–52, 2012.
    • (2012) IEEE Wirel. Commun. Lett. , vol.1 , Issue.2 , pp. 49-52
    • Wen, H.1    Ho, P.-H.2    Jiang, X.-H.3
  • 29
    • 0033881606 scopus 로고    scopus 로고
    • Secure information transmission for mobile radio
    • H. Koorapaty, A. A. Hassan, S. Chennakeshu, ‘‘Secure information transmission for mobile radio,’’ IEEE Trans. Wirel. Commun., vol. 2, no. 7, pp. 52–55, 2003.
    • (2003) IEEE Trans. Wirel. Commun. , vol.2 , Issue.7 , pp. 52-55
    • Koorapaty, H.1    Hassan, A.A.2    Chennakeshu, S.3
  • 30
    • 85045983815 scopus 로고    scopus 로고
    • A real orthogonal space-time coded UWB scheme for wireless secure communications,’’
    • Y. Zhang and H. Dai, ‘‘A real orthogonal space-time coded UWB scheme for wireless secure communications,’’ EURASIP J. Wirel Commun. Netw., vol. 6, no. 3, pp. 1–8, 2009.
    • (2009) EURASIP J. Wirel Commun. Netw. , vol.6 , Issue.3 , pp. 1-8
    • Zhang, Y.1    Dai, H.2
  • 31
    • 0038397761 scopus 로고    scopus 로고
    • Blind identification of FIR MIMO channels by decorrelation subchannels
    • Y. Hua, S. An and Y. Xiang, ‘‘Blind identification of FIR MIMO channels by decorrelation subchannels,’’ IEEE Trans. Signal Process., vol. 51, no. 5, pp. 1143–1155, 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.5 , pp. 1143-1155
    • Hua, Y.1    An, S.2    Xiang, Y.3
  • 32
    • 66949180834 scopus 로고    scopus 로고
    • A note on the secrecy capacity of the multiantenna wiretap channel
    • T. Liu, S. Shamai Shitz, ‘‘A note on the secrecy capacity of the multiantenna wiretap channel,’’ IEEE Trans. Inf. Theory, vol. 55, no. 6, pp. 2547–2553, 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.6 , pp. 2547-2553
    • Liu, T.1    Shamai Shitz, S.2
  • 33
    • 38649135720 scopus 로고    scopus 로고
    • WG: A family of stream ciphers with designed randomness properties
    • Y. Nawaz and G. Gong, ‘‘WG: A family of stream ciphers with designed randomness properties,’’ Inf. Sci., vol. 178, no. 7, pp. 1903–1916, 2008.
    • (2008) Inf. Sci. , vol.178 , Issue.7 , pp. 1903-1916
    • Nawaz, Y.1    Gong, G.2
  • 34
    • 35248828626 scopus 로고    scopus 로고
    • Higher order correlation attacks, XL algorithm and cryptanalysis of toyocrypt
    • Berlin: Springer
    • N. Courtois, ‘‘Higher order correlation attacks, XL algorithm and cryptanalysis of toyocrypt’’, In Proceedings of ICISC 2002, LNCS: vol. 2587, Berlin: Springer, pp. 182–199, 2003.
    • (2003) Proceedings of ICISC 2002, LNCS , vol.2587 , pp. 182-199
    • Courtois, N.1
  • 35
    • 0032656952 scopus 로고    scopus 로고
    • Space time block codes from orthogonal designs
    • V. Tarokh, H. Jafarkhani, A. R. Calderbank, ‘‘Space time block codes from orthogonal designs,’’ IEEE Trans. Inf. Theory, vol. 45, no. 5, pp. 744–765, 1999.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , Issue.5 , pp. 744-765
    • Tarokh, V.1    Jafarkhani, H.2    Calderbank, A.R.3
  • 36
    • 84863901332 scopus 로고    scopus 로고
    • Draft standard for information technology telecommunications and information exchange between systems local and metropolitan area networks specific requirements
    • 802.11 Working Group of the 802 Committee
    • IEEE P802.11n, Draft standard for information technology telecommunications and information exchange between systems local and metropolitan area networks specific requirements, Part 11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. 802.11 Working Group of the 802 Committee, 2009.
    • (2009) Part 11:Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
  • 37
    • 0032183752 scopus 로고    scopus 로고
    • A simple transmitter diversity scheme for wireless communications
    • S. M. Alamouti, ‘‘A simple transmitter diversity scheme for wireless communications,’’ IEEE Journal on Selected Areas in Communications, vol. 16, no.8, pp. 1451–1458, 1998.
    • (1998) IEEE Journal on Selected Areas in Communications , vol.16 , Issue.8 , pp. 1451-1458
    • Alamouti, S.M.1
  • 38
    • 0032662468 scopus 로고    scopus 로고
    • Space-time codes for high data rate wireless communication: Performance criteria in the presence of channel estimation errors, mobility, and multiple paths
    • V. Tarokh, A. Naguib, N. Seshadri, A. R. Calderbank, ‘‘Space-time codes for high data rate wireless communication: performance criteria in the presence of channel estimation errors, mobility, and multiple paths,’’ IEEE Trans. Commun., vol. 17, no. 2, pp. 199–207, 1999.
    • (1999) IEEE Trans. Commun. , vol.17 , Issue.2 , pp. 199-207
    • Tarokh, V.1    Naguib, A.2    Seshadri, N.3    Calderbank, A.R.4
  • 39
    • 85045970431 scopus 로고    scopus 로고
    • Framework for MIMO cross-layer secure communication based on STBC
    • August 2011
    • H. Wen, G. Gong, S. Lv and P. Ho, ‘‘Framework for MIMO cross-layer secure communication based on STBC,’’ Telecommun. Syst. J., pp. 1–9, August 2011.
    • Telecommun. Syst. J. , pp. 1-9
    • Wen, H.1    Gong, G.2    Lv, S.3    Ho, P.4
  • 40
    • 77956430509 scopus 로고    scopus 로고
    • A framework of physical layer technique assisted authentication for vehicular communication networks
    • H. Wen, P. Ho and G. Gong, ‘‘A framework of physical layer technique assisted authentication for vehicular communication networks,’’ Sci China Ser F-Inf Sci, vol. 53, no. 10, pp. 1996–2004, 2010.
    • (2010) Sci China Ser F-Inf Sci , vol.53 , Issue.10 , pp. 1996-2004
    • Wen, H.1    Ho, P.2    Gong, G.3
  • 41
    • 78650361034 scopus 로고    scopus 로고
    • Physical layer assisted authentication for distributed Ad-Hoc wireless sensor networks
    • H. Wen, P. Ho, C. Qi and G. Gong, ‘‘Physical layer assisted authentication for distributed Ad-Hoc wireless sensor networks,’’ IEEE Inf. Secur., vol. 4, issue 4, pp. 390–396, 2010.
    • (2010) IEEE Inf. Secur. , vol.4 , Issue.4 , pp. 390-396
    • Wen, H.1    Ho, P.2    Qi, C.3    Gong, G.4
  • 42
    • 79952851711 scopus 로고    scopus 로고
    • Physical layer technique to assist authentication based on PKI for vehicular xommunication networks
    • Feb. 2011
    • H. Wen, P. Ho, ‘‘Physical layer technique to assist authentication based on PKI for vehicular xommunication networks,’’ KSII Trans. Internet Inf. Syst.,’’ vol. 5, issue 5, pp. 440–456, Feb. 2011.
    • KSII Trans. Internet Inf. Syst. , vol.5 , Issue.5 , pp. 440-456
    • Wen, H.1    Ho, P.2
  • 43
    • 84555202479 scopus 로고    scopus 로고
    • Lightweight and effective detection scheme for node clone attack in WSNs
    • Sept. 2011
    • H. Wen, J. Luo and L. Zhou, ‘‘Lightweight and effective detection scheme for node clone attack in WSNs,’’ IET Wireless Sensor Systems, vol. 1, no. 3, pp. 137–143, Sept. 2011.
    • IET Wireless Sensor Systems , vol.1 , Issue.3 , pp. 137-143
    • Wen, H.1    Luo, J.2    Zhou, L.3
  • 44
    • 84861879514 scopus 로고    scopus 로고
    • On achieving unconditional secure communications over binary symmetric channels (BSC)
    • H. Wen, P. Ho and X. Jiang, ‘‘On achieving unconditional secure communications over binary symmetric channels (BSC),’’ IEEE Wirel. Commun. Lett., vol. 1, no. 2, pp.49–52, 2012.
    • (2012) IEEE Wirel. Commun. Lett. , vol.1 , Issue.2 , pp. 49-52
    • Wen, H.1    Ho, P.2    Jiang, X.3
  • 45
    • 48149115694 scopus 로고    scopus 로고
    • Using the physical layer for wireless authentication in time-variant channels
    • July 2008
    • L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, ‘‘Using the physical layer for wireless authentication in time-variant channels,’’ IEEE Trans. Wirel. Commun., vol. 7, issue 7, pp. 2571–2579, July 2008.
    • IEEE Trans. Wirel. Commun. , vol.7 , Issue.7 , pp. 2571-2579
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.3    Trappe, W.4
  • 49
    • 77955326733 scopus 로고
    • Characterization of randomly time-variant linear channels,’’
    • P. A. Bello, ‘‘Characterization of randomly time-variant linear channels,’’ IEEE Trans. Comm. Syst., vol. 11, pp. 360–393, 1963.
    • (1963) IEEE Trans. Comm. Syst. , vol.11 , pp. 360-393
    • Bello, P.A.1
  • 52
    • 0032118152 scopus 로고    scopus 로고
    • Robust channel estimation for OFDM systems with rapid dispersive fading channels
    • July 1998
    • Y. Li, L. J. Cimini, Jr. and N. R. Sollenberger, ‘‘Robust channel estimation for OFDM systems with rapid dispersive fading channels,’’ IEEE Trans. Commun., vol. 46, no. 7, pp. 902–915, July 1998.
    • IEEE Trans. Commun. , vol.46 , Issue.7 , pp. 902-915
    • Li, Y.1    Cimini, L.J.2    Sollenberger, N.R.3
  • 53
    • 0036447354 scopus 로고    scopus 로고
    • A Study of channel estimation in OFDM systems
    • Vancouver, Canada, Sept
    • S. Coleri, M. Ergen, A. Puri, A. Bahai, ‘‘A Study of channel estimation in OFDM systems,’’ in Proceedings of IEEE VTC, vol. 2, pp. 894–898, Vancouver, Canada, Sept. 2002.
    • (2002) Proceedings of IEEE VTC , vol.2 , pp. 894-898
    • Coleri, S.1    Ergen, M.2    Puri, A.3    Bahai, A.4
  • 54
    • 15844391671 scopus 로고    scopus 로고
    • Research on an iterative algorithm of LS Channel estimation in MIMO OFDM systems
    • Mar. 2005
    • Y. Qiao, S. Yu, P. Su, and L. Zhang, ‘‘Research on an iterative algorithm of LS Channel estimation in MIMO OFDM systems,’’ IEEE Trans. Broadcast, vol. 51, no. 1, pp. 149–153, Mar. 2005.
    • IEEE Trans. Broadcast , vol.51 , Issue.1 , pp. 149-153
    • Qiao, Y.1    Yu, S.2    Su, P.3    Zhang, L.4
  • 55
    • 0000090155 scopus 로고    scopus 로고
    • Sequential tests of statistical hypotheses
    • June 1945
    • A. Wald, ‘‘Sequential tests of statistical hypotheses,’’ Ann. Math. Stat. 16 (2): 117–186, June 1945.
    • Ann. Math. Stat , vol.16 , Issue.2 , pp. 117-186
    • Wald, A.1
  • 56
    • 85045967004 scopus 로고    scopus 로고
    • ‘‘Dedicated Short Range Communications (DSRC),’’ [Online] Available: http://grouper.ieee.org/groups/scc32/dsrc/index2007.html.
  • 57
    • 85045961445 scopus 로고    scopus 로고
    • IEEE P802.11p: Draft standard for information technology telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications
    • Jun. 2009
    • Task Group p, ‘‘IEEE P802.11p: Draft standard for information technology telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications,’’ IEEE Computer Society, Jun. 2009.
    • IEEE Computer Society
  • 58
    • 3042594839 scopus 로고    scopus 로고
    • The security and privacy of smart vehicles
    • J.P. Hubaux, ‘‘The security and privacy of smart vehicles,’’ IEEE Secur. Priv., vol. 2, pp. 49–55, 2004.
    • (2004) IEEE Secur. Priv. , vol.2 , pp. 49-55
    • Hubaux, J.P.1
  • 59
    • 33845726678 scopus 로고    scopus 로고
    • Securing vehicular ad hoc networks
    • M. Raya and J. P. Hubaux, ‘‘Securing vehicular ad hoc networks,’’ J. Comput. Secur., vol. 15, no. 1, pp. 39–68, 2007.
    • (2007) J. Comput. Secur. , vol.15 , Issue.1 , pp. 39-68
    • Raya, M.1    Hubaux, J.P.2
  • 61
  • 62
    • 51449098979 scopus 로고    scopus 로고
    • Pin-Han Ho, and X. Shen, ‘‘An efficient identity-based batch verification scheme for vehicular sensor networks
    • C. Zhang, R. Lu, X. Lin, Pin-Han Ho, and X. Shen, ‘‘An efficient identity-based batch verification scheme for vehicular sensor networks,’’ in Proceedings of IEEE INFOCOM, pp. 246–250, 2008.
    • (2008) Proceedings of IEEE INFOCOM , pp. 246-250
    • Zhang, C.1    Lu, R.2    Lin, X.3
  • 63
    • 58149123333 scopus 로고    scopus 로고
    • TSVC: Timed efficient and secure vehicular communications with privacy preserving
    • X. Lin, X. Sun, X. Wang, C. Zhang, Pin-Han Ho, X. Shen, ‘‘TSVC: timed efficient and secure vehicular communications with privacy preserving,’’ IEEE Trans. Wirel. Commun., vol. 7, no. 12, pp. 4987–4998, 2009.
    • (2009) IEEE Trans. Wirel. Commun. , vol.7 , Issue.12 , pp. 4987-4998
    • Lin, X.1    Sun, X.2    Wang, X.3    Zhang, C.4    Pin-Han Ho, X.S.5
  • 64
    • 51249100419 scopus 로고    scopus 로고
    • R. Lu and P. H. Ho, ‘‘RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks
    • May 19–23, 2008
    • C. Zhang, X. Lin, R. Lu and P. H. Ho, ‘‘RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks,’’ in Proceedings of ICC’08, pp. 1451–1457, May 19–23, 2008.
    • Proceedings of ICC’08 , pp. 1451-1457
    • Zhang, C.1    Lin, X.2
  • 66
    • 85000276942 scopus 로고    scopus 로고
    • ‘Multilevel lTESLA: Broadcast authentication for distributed sensor networks
    • Nov
    • Donggang Liu and Peng Ning, ‘‘Multilevel lTESLA: broadcast authentication for distributed sensor networks,’’ ACM Trans. Embed. Comput. Syst., vol. 3, no. 3, Nov. 2004, pp. 800–836.
    • (2004) ACM Trans. Embed. Comput. Syst , vol.3 , Issue.3 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 67
    • 33845926634 scopus 로고    scopus 로고
    • An RSSI-based scheme for Sybil attack detection in wireless sensor networks
    • M. Demirbas, Youngwhan Song, ‘‘An RSSI-based scheme for Sybil attack detection in wireless sensor networks,’’ in Proceedings of WoWMoM 2006, pp. 566–570, 2006.
    • (2006) Proceedings of Wowmom 2006 , pp. 566-570
    • Demirbas, M.1    Song, Y.2
  • 68
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, ‘‘A method for obtaining digital signatures and public-key cryptosystems,’’ Commun. ACM, vol. 21, no. 2, 1978, pp. 120–126.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 69
    • 0003508564 scopus 로고    scopus 로고
    • Federal Register 56. FIPS PUB 186, Aug. 1991
    • U. S. National Institute of Standards and Technology (NIST), Digital Signature Standard (DSS), Federal Register 56. FIPS PUB 186, Aug. 1991.
    • Digital Signature Standard (DSS)
  • 70
    • 0004300781 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publication 81 (FIPS PUB 81)
    • U. S. National Institute of Standards and Technology (NIST). DES Model of Operation. Federal Information Processing Standards Publication 81 (FIPS PUB 81).
    • DES Model of Operation
  • 73
    • 85045966806 scopus 로고    scopus 로고
    • Wireless InSite software, http://www.remcom.com/wirelessinsite/.
  • 79
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromise-tolerant security mechanisms for wireless sensor networks
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, ‘‘Location-based compromise-tolerant security mechanisms for wireless sensor networks,’’ IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 247–260, 2006.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 82
    • 84878664200 scopus 로고    scopus 로고
    • DHT-based detection of node clone in wireless sensor networks
    • Sept. 23–25, 2009, Niagara Falls, Ontario, Canada, LNICST 28
    • Zhijun Li and Guang Gong, ‘‘DHT-based detection of node clone in wireless sensor networks,’’ in Proceedings of First International Conference on Ad Hoc Networks (ADHOCNETS 2009), Sept. 23–25, 2009, Niagara Falls, Ontario, Canada, LNICST 28, pp. 240–255.
    • Proceedings of First International Conference on Ad Hoc Networks (ADHOCNETS 2009) , pp. 240-255
    • Li, Z.1    Gong, G.2
  • 83
    • 74249096583 scopus 로고    scopus 로고
    • Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks
    • Oct. 12–15, 2009, Macau SAR, P.R.C
    • Zhijun Li and Guang Gong, ‘‘Randomly directed exploration: An efficient node clone detection protocol in wireless sensor networks,’’ in Proceedings of IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS ’09), Oct. 12–15, 2009, Macau SAR, P.R.C, pp. 1030–1035.
    • Proceedings of IEEE 6Th International Conference on Mobile Adhoc and Sensor Systems (MASS ’09) , pp. 1030-1035
    • Li, Z.1    Gong, G.2
  • 87
    • 40049095300 scopus 로고    scopus 로고
    • Geographical location-based scheme for Sybil attacks detection in wireless sensor networks
    • Jan
    • Zhang Jian-Ming, Yu Qun and Wang Liang-Min, ‘‘Geographical location-based scheme for Sybil attacks detection in wireless sensor networks,’’ J. Syst. Simul., vol. 20, no. 1, pp. 259–263, Jan. 2008.
    • (2008) J. Syst. Simul. , vol.20 , Issue.1 , pp. 259-263
    • Jian-Ming, Z.1    Yu, Q.2    Wang, L.-M.3
  • 92
    • 85045960257 scopus 로고    scopus 로고
    • Method of detecting the Sybil attack based on ranging in wireless sensor network
    • Ren Xiu-li, Yang Wei, ‘‘Method of detecting the Sybil attack based on ranging in wireless sensor network,’’ in Proceedings of WiCom ’09, pp. 1–4, 2009.
    • (2009) Proceedings of Wicom ’09 , pp. 1-4
    • Yang Wei, R.X.-L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.