Physical unclonable functions for device authentication and secret key generation
Proceedings of the 44th annual Design Automation Conference
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Robust location distinction using temporal link signatures
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
On fast and accurate detection of unauthorized wireless access points using clock skews
Proceedings of the 14th ACM international conference on Mobile computing and networking
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
Attacks on physical-layer identification
Proceedings of the third ACM conference on Wireless network security
Exploiting multiple-antenna diversity for shared secret key generation in wireless networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Sequence number-based MAC address spoof detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Review: Detecting node replication attacks in wireless sensor networks: A survey
Journal of Network and Computer Applications
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Towards Practical Identification of HF RFID Devices
ACM Transactions on Information and System Security (TISSEC)
Discovering trustworthy social spaces
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
Modeling of WBAN and cloud integration for secure and reliable healthcare
BodyNets '13 Proceedings of the 8th International Conference on Body Area Networks
A generic authentication protocol for wireless body area networks
BodyNets '13 Proceedings of the 8th International Conference on Body Area Networks
Hi-index | 0.00 |
Lower/physical layer characteristics have been considered as potential alternatives/complements to provide security services in wireless networks. This article provides an overview of various noncryptographic mechanisms for user authentication and device identification in wireless networks using lower/physical layer properties or information. We discuss merits and demerits of these authentication/identification schemes and the practical implementation issues. Future research on cross-layer security design concludes this article.