As wireless devices become increasingly pervasive and essential, they are becoming both a target for attacks and the very weapon with which such an attack can be carried out. Wireless networks have to face new kinds of intrusion that had not been considered previously because they are linked to the open nature of wireless networks. In particular, device identity management and intrusion detection are two of the most significant challenges in any network security solution but they are paramount for any wireless local area networks (WLANs) because of the inherent non-exclusivity of the transmission medium. The physical layer of 802.11-based wireless communication does not offer security guarantee because any electromagnetic signal transmitte...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
Secure wireless device identification is necessary if we want to ensure that any transmitted data re...
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the phys...
In the following thesis, we propose a set of techniques that allow us to create unique signatures fo...
Several previous works in wireless network security have demonstrated the weakness of conventional s...
Recently, RF fingerprinting has become an arousing and emerging technology in identifying multiple w...
The Internet of Things (IoT) concept is widely used today. As IoT becomes more widely adopted, the n...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
The design and application of novel physical-layer security techniques have been increasing in the l...
Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transm...
Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transm...
Wireless local area networks are particularly vulnerable to cyber attacks due to their contested tra...
We design, implement, and evaluate a technique to identify the source network interface card (NIC) o...
We demonstrate the feasibility of fingerprinting the radio of wireless sensor nodes (Chipcon 1000 ra...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
Secure wireless device identification is necessary if we want to ensure that any transmitted data re...
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the phys...
In the following thesis, we propose a set of techniques that allow us to create unique signatures fo...
Several previous works in wireless network security have demonstrated the weakness of conventional s...
Recently, RF fingerprinting has become an arousing and emerging technology in identifying multiple w...
The Internet of Things (IoT) concept is widely used today. As IoT becomes more widely adopted, the n...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
The design and application of novel physical-layer security techniques have been increasing in the l...
Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transm...
Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transm...
Wireless local area networks are particularly vulnerable to cyber attacks due to their contested tra...
We design, implement, and evaluate a technique to identify the source network interface card (NIC) o...
We demonstrate the feasibility of fingerprinting the radio of wireless sensor nodes (Chipcon 1000 ra...
We propose a simple active method for discovering facts about the chipset, the firmware or the drive...
Secure wireless device identification is necessary if we want to ensure that any transmitted data re...
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the phys...