We demonstrate the feasibility of fingerprinting the radio of wireless sensor nodes (Chipcon 1000 radio, 433MHz). We show that, with this type of devices, a receiver can create device radio fingerprints and subsequently identify origins of messages exchanged between the devices, even if message contents and device identifiers are hidden. We further analyze the implications of device fingerprinting on the security of sensor networking protocols, specifically, we propose two new mechanisms for the detection of wormholes in sensor networks
To increase network security and mitigate identity theft attacks, much of the research is focused on...
Recently, RF fingerprinting has become an arousing and emerging technology in identifying multiple w...
Abstract — Wireless sensor networks have a wide range of potential applications, including security ...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
In conventional wireless networks, security issues are primarily considered above the physical layer...
Secure authentication in wireless sensor networks is complicated by the promiscuous nature of the wi...
As wireless devices become increasingly pervasive and essential, they are becoming both a target for...
Abstract—In conventional wireless networks, security issues are primarily considered above the physi...
Several previous works in wireless network security have demonstrated the weakness of conventional s...
In the following thesis, we propose a set of techniques that allow us to create unique signatures fo...
Secure authentication in wireless sensor networks is complicated by the promiscuous nature of the wi...
The development of wireless sensor devices in terms of low power and inexpensive data-relaying has b...
The design and application of novel physical-layer security techniques have been increasing in the l...
As the demand for cheaper electronic devices has increased, the location of manufacturing foundries ...
To increase network security and mitigate identity theft attacks, much of the research is focused on...
Recently, RF fingerprinting has become an arousing and emerging technology in identifying multiple w...
Abstract — Wireless sensor networks have a wide range of potential applications, including security ...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
In conventional wireless networks, security issues are primarily considered above the physical layer...
Secure authentication in wireless sensor networks is complicated by the promiscuous nature of the wi...
As wireless devices become increasingly pervasive and essential, they are becoming both a target for...
Abstract—In conventional wireless networks, security issues are primarily considered above the physi...
Several previous works in wireless network security have demonstrated the weakness of conventional s...
In the following thesis, we propose a set of techniques that allow us to create unique signatures fo...
Secure authentication in wireless sensor networks is complicated by the promiscuous nature of the wi...
The development of wireless sensor devices in terms of low power and inexpensive data-relaying has b...
The design and application of novel physical-layer security techniques have been increasing in the l...
As the demand for cheaper electronic devices has increased, the location of manufacturing foundries ...
To increase network security and mitigate identity theft attacks, much of the research is focused on...
Recently, RF fingerprinting has become an arousing and emerging technology in identifying multiple w...
Abstract — Wireless sensor networks have a wide range of potential applications, including security ...