References

Biswas S and Morris R 2005 Exor: Opportunistic multi-hop routing for wireless networks SIGCOMM'05, Philadelphia, Pennsylvania.

Brik V, Banerjee S, Gruteser M and Oh S 2008 Wireless device identification with radiometric signatures Proceedings of the 14th ACM International Conference on Mobile Computing and Networking MobiCom '08, pp. 116–127.

Couto DD, Aguayo D, Bicket J and Morris R 2003 A high-throughput path metic for multi-hop wireless routing ACM MobiCom '03, San Diego, California.

Demirbas M and Song Y 2006 An rssi-based scheme for sybil attack detection in wireless sensor networks Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks WOWMOM, pp. 564–570.

Eschenauer L and Gligor VD 2002 A key-management scheme for distributed sensor networks CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM, New York, NY, USA.

Faria DB and Cheriton DR 2006 Detecting identity-based attacks in wireless networks using signalprints Proceedings of the 5th ACM Workshop on Wireless Security, WiSe, pp. 43–52.

Greenberger M 1961 Notes on a new pseudo-random number generator. Journal of the Association of Computing Machinery 8(2), 163–167.

Jamieson K and Balakrishnan H 2007 Ppr: Partial packet recovery for wireless networks ACM SIGCOMM, Kyoto, Japan.

Kim KH and Shin KG 2006 On accurate measurement of link quality in multi-hop wireless mesh networks MobiCom '06: Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, pp. 38–49. ACM Press, New York, NY, USA.

Laufer RP and Kleinrock L 2008 Multirate anypath routing in wireless mesh networks. Technical Report UCLA-CSD-TR080025, UCLA Computer Science Department.

Rappaport TS 1996 Wireless Communications: Principles and Practice. Prentice Hall, Lower Saddle River, NJ.

Sang L, Arora A and Zhang H 2007 On exploiting asymmetric wireless links via one-way estimation MobiHoc '07: Proceedings of the 8th ACM International Symposium on Mobile ad hoc Networking and Computing, pp. 11-21. ACM, New York, NY.

Seada K, Zuniga M, Helmy A and Krishnamachari B 2004 Energy efficient forwarding strategies for geographic routing in wireless sensor networks ACM Sensys '04, Baltimore, MD.

Sheng Y, Tan K, Chen G, Kotz D and Campbell A 2008 Detecting 802.11 mac layer spoofing using received signal strength The 27th Conference on Computer Communications INFOCOM, pp. 1768–1776.

Xiao L, Greenstein L, Mandayam N and Trappe W 2007 Fingerprints in the ether: Using the physical layer for wireless authentication IEEE International Conference on Communications, ICC, pp. 4646–4651.

Xiao L, Greenstein L, Mandayam N and Trappe W 2008a A Physical-Layer Technique to Enhance Authentication for Mobile Terminals IEEE International Conference on Communications, ICC, pp. 1520–1524.

Xiao L, Greenstein L, Mandayam N and Trappe W 2008b Using the physical layer for wireless authentication in time-variant channels IEEE Transactions on Wireless Communication 7(7), 2571–2579.

Xiao L, Greenstein LJ, Mandayam NB and Trappe W 2008c MIMO-assisted channel-based authentication in wireless networks 42nd Annual Conference on Information Sciences and Systems, CISS, pp. 642–646.

Yang J, Chen Y, Trappe W and Cheng J 2009 Determining the number of attackers and localizing multiple adversaries in wireless spoofing attacks The 28th Conference on Computer Communications INFOCOM, pp. 666–674.

Zeng K, Govindan K and Mohapatra P 2010 Non-cryptographic authentication and identification in wireless networks. IEEE Wireless Communications Magazine 17(5), 56–62.

Zeng K, Govindan K, Wu D and Mohapatra P 2011 Identity-based attack detection in mobile wireless networks IEEE Infocom 2011, Shanghai, China.

Zeng K, Lou W, Yang J and Brown DR 2007a On throughput efficiency of geographic opportunistic routing in multihop wireless networks QShine '07, Vancouver, British Columbia, Canada.

Zeng K, Ren K, Lou W and Moran PJ 2007b Energy aware efficient geographic routing in lossy wireless sensor networks with environmental energy supply. Wireless Networks (WINET) pp. 477–486.

Zeng X, Bagrodia R and Gerla M 1998 Glomosim: a library for parallel simulation of large-scale wireless networks Proceedings of PADS '98, Banff, Canada.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset