[1] Kavianpour A, Anderson M.An overview of wireless network security [C] //Proc of the 4th IEEE Int Conf on Cyber Security and Cloud Computing (CSCloud).Piscataway, NJ: IEEE, 2017: 306-309
[2] Moualeu J, Hamouda W, Takawira F.Intercept probability analysis of wireless networks in the presence of eavesdropping attack with co-channel interference [J].IEEE Access, 2018, 6(1): 41490-41503
[3] Wang Xiaohui, Li Na, Li Meng, et al.A physical layer spoofing attack in spatial modulation [C] //Proc of the 2019 IEEE Globecom Workshops.Piscataway, NJ: IEEE, 2019: 1-5
[4] Aldaghri N, Mahdavifar H. Physical layer secret key generation in static environments [J].IEEE Trans on Information Forensics and Security, 2020, 15(1): 2692-2705
[5] 宋宇波,胡爱群,姚冰心.802.11i认证协议可验安全性形式化分析 [J] .中国工程科学,2010,12(1):67-73
[6] Chatterjee U, Sadhukhan R, Mukhopadhyay D, et al.Stupify: A hardware countermeasure of kracks in WPA2 using physically unclonable functions [C] //Proc of the Web Conf 2020 (WWW’20).New York: ACM, 2020: 217–221
[7] Song Yubo, Gao Shang, Hu Aiqun, et al.Novel attacks in OSPF networks to poison routing table [C] //Proc of the 2017 IEEE Int Conf on Communications (ICC).Piscataway, NJ: IEEE, 2017: 1-6
[8] 郑瑞环,潘亚雄,胡勇.基于无线设备指纹的伪AP检测技术研究[J].信息安全研究,2020,6(5):441-447
[9] 冯鑫,胡勇.在智能家居环境下基于CSI的伪AP检测研究[J] .信息安全研究,2018,4(02):163-169
[10] Wan Xiaoyue, Xiao Liang, Li Qiangda, et al.FHY-layer authentication with multiple landmarks with reduced communication overhead [C] //Proc of the 2017 IEEE Int Conf on Communications (ICC).Piscataway, NJ: IEEE, 2017: 1-6
[11] Mahmood A, Aman W, Iqbal M, et al.Channel impulse response-based distributed physical layer authentication [C] //Proc of the 85th IEEE Vehicular Technology Conf (VTC).Piscataway, NJ: IEEE, 2017: 1-5
[12] Yi C, Wen H, Song H, et al.Lightweight one-time password authentication scheme based on radio-frequency fingerprinting [J].IET Communications, 2018, 12(12): 1477-1484
[13] Rahman M, Yasmeen A, Gross J.PHY layer authentication via drifting oscillators [C] //Proc of the IEEE Global Communications Conf (GLOBECOM).Piscataway, NJ: IEEE, 2014: 716-721
[14] Liao Runfa, Wen Hong, Pan Fei, et al.A novel physical layer authentication method with convolutional neural network [C] //Proc of the IEEE Int Conf on Artificial Intelligence and Computer Applications (ICAICA).Piscataway, NJ: IEEE, 2019: 231–235
[15] Shi Cong, Liu Jian, Liu Hongbo, et al.Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT [C] //Proc of the 18th ACM Int Symp on Mobile Ad Hoc Networking and Computing (Mobihoc’17).New York: ACM, 2017: 1–10
|