The proliferation of electronic devices supporting sensing, actuation, and wireless communication enables the monitoring and/or control of a variety of physical systems with digital communication. Such “cyber physical systems” blur the boundaries of the digital and physical worlds, where correct information about the physical world is needed for the correct operation of the digital system. Often in these systems the physical source or destination of information is as important as the information itself. However, the omni-directional and invisible nature of wireless communication makes it difficult to determine communication endpoints. This allows a malicious party to intercept wireless messages or pose as other entities in the system. As su...
The tremendous development in wireless technology has lead to accessing abundant information at one'...
This thesis focuses on the utilization of reliable location information in wireless physical layer s...
Mobile applications can benefit from increased awareness of the device's context. Unfortunately, exi...
Small, mobile devices or infrastructure devices without user interfaces, such as Bluetooth headsets,...
With the the emergence of the Internet-of-Things (IoT) and Cyber-Physical Systems (CPS), modern comp...
As various of wireless techniques have been proposed to achieve fast and efficient data communicatio...
This thesis argues that cyber-physical systems are, by their very nature, at risk from physical-laye...
We demonstrate how the multitude of sensors on a smart-phone can be used to construct a reliable har...
Abstract—Integration of NFC radios into smartphones is expediting the adoption of mobile devices as ...
For centuries, methods to obtain location information were crucial for our economic success. While i...
Mobility has become an integral feature of many wireless networks. Along with this mobility comes th...
This is an editorialInternational audienceThe ongoing paradigm shift from classical centralized wire...
In this thesis, we intend to promote the efficacy and tackle the vulnerabilities in three emerging w...
The development of low-cost, ubiquitous, wireless systems is leading to a future where location will...
Despite the availability of biometrics like face recognition and finger print scanners passwords are...
The tremendous development in wireless technology has lead to accessing abundant information at one'...
This thesis focuses on the utilization of reliable location information in wireless physical layer s...
Mobile applications can benefit from increased awareness of the device's context. Unfortunately, exi...
Small, mobile devices or infrastructure devices without user interfaces, such as Bluetooth headsets,...
With the the emergence of the Internet-of-Things (IoT) and Cyber-Physical Systems (CPS), modern comp...
As various of wireless techniques have been proposed to achieve fast and efficient data communicatio...
This thesis argues that cyber-physical systems are, by their very nature, at risk from physical-laye...
We demonstrate how the multitude of sensors on a smart-phone can be used to construct a reliable har...
Abstract—Integration of NFC radios into smartphones is expediting the adoption of mobile devices as ...
For centuries, methods to obtain location information were crucial for our economic success. While i...
Mobility has become an integral feature of many wireless networks. Along with this mobility comes th...
This is an editorialInternational audienceThe ongoing paradigm shift from classical centralized wire...
In this thesis, we intend to promote the efficacy and tackle the vulnerabilities in three emerging w...
The development of low-cost, ubiquitous, wireless systems is leading to a future where location will...
Despite the availability of biometrics like face recognition and finger print scanners passwords are...
The tremendous development in wireless technology has lead to accessing abundant information at one'...
This thesis focuses on the utilization of reliable location information in wireless physical layer s...
Mobile applications can benefit from increased awareness of the device's context. Unfortunately, exi...