Fundamentals of statistical signal processing: estimation theory
Fundamentals of statistical signal processing: estimation theory
Communication systems engineering
Communication systems engineering
Digital video processing
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Motion Tracking with an Active Camera
IEEE Transactions on Pattern Analysis and Machine Intelligence
Making Everyday Life Easier Using Dense Sensor Networks
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Remote Physical Device Fingerprinting
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Lightweight detection and classification for wireless sensor networks in realistic environments
Proceedings of the 3rd international conference on Embedded networked sensor systems
Securing wireless systems via lower layer enforcements
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Relative location estimation in wireless sensor networks
IEEE Transactions on Signal Processing
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels
IEEE Transactions on Information Forensics and Security - Part 1
Identifying unique devices through wireless fingerprinting
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
Advancing wireless link signatures for location distinction
Proceedings of the 14th ACM international conference on Mobile computing and networking
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
Channel-based detection of Sybil attacks in wireless networks
IEEE Transactions on Information Forensics and Security
A Wireless Security Framework without Shared Secrets
SSS '09 Proceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Attacks on physical-layer identification
Proceedings of the third ACM conference on Wireless network security
Hidden anchor: a lightweight approach for physical layer location privacy
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Ensemble: cooperative proximity-based authentication
Proceedings of the 8th international conference on Mobile systems, applications, and services
Enhancing wireless security through reconfigurable antennas
RWS'10 Proceedings of the 2010 IEEE conference on Radio and wireless symposium
Information-theoretically secret key generation for fading wireless channels
IEEE Transactions on Information Forensics and Security
SecureAngle: improving wireless security using angle-of-arrival information (poster abstract)
Proceedings of the ACM SIGCOMM 2010 conference
Detecting intra-room mobility with signal strength descriptors
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
SecureAngle: improving wireless security using angle-of-arrival information
Hotnets-IX Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks
Empirical evaluation of signal-strength fingerprint positioning in wireless LANs
Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems
Non-cryptographic authentication and identification in wireless networks
IEEE Wireless Communications
CRMA: collision-resistant multiple access
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
Poster: mimicry attacks against wireless link signature
Proceedings of the 18th ACM conference on Computer and communications security
BANA: body area network authentication exploiting channel characteristics
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
A shared-secret free security infrastructure for wireless networks
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
Neighborhood watch: security and privacy analysis of automatic meter reading systems
Proceedings of the 2012 ACM conference on Computer and communications security
ArrayTrack: a fine-grained indoor location system
nsdi'13 Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
SecureArray: improving wifi security with fine-grained physical-layer information
Proceedings of the 19th annual international conference on Mobile computing & networking
Securing data provenance in body area networks using lightweight wireless link fingerprints
Proceedings of the 3rd international workshop on Trustworthy embedded devices
From RSSI to CSI: Indoor localization via channel response
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
The ability of a receiver to determine when a transmitter has changed location is important for energy conservation in wireless sensor networks, for physical security of radio-tagged objects, and for wireless network security in detection of replication attacks. In this paper, we propose using a measured temporal link signature to uniquely identify the link between a transmitter and a receiver. When the transmitter changes location, or if an attacker at a different location assumes the identity of the transmitter, the proposed link distinction algorithm reliably detects the change in the physical channel. This detection can be performed at a single receiver or collaboratively by multiple receivers. We record over 9,000 link signatures at different locations and over time to demonstrate that our method significantly increases the detection rate and reduces the false alarm rate, in comparison to existing methods.