参考文献 [1] 袁红林. 射频指纹识别系统的数学模型研究[J]. 通信技术, 2009, 42(6): 113-114, 117. [2] 袁红林. 射频指纹的产生机理与唯一性[J]. 东南大学学报: 自然科学版, 2009, 39(2): 230-233. [3] 袁红林, 胡爱群, 陈开志. 射频指纹的唯一性研究[J]. 应用科学学报, 2009, 27(1): 1-5. [4] Rasmussen K B, Capkun S. Implication of Radio Finger- printing on the Security of Sensor Networks[C]//Proc. of International Conference on Security and Privacy in Communi- cations Networks and the Workshops. Nice, France: [s. n.], 2007. [5] Ureten O, Serinken N. Wireless Security Through RF Finger- printing[J]. Canadian Journal of Electrical and Computer Engineering, 2007, 32(1): 27-33. [6] Ureten O, Serinken N. Bayesian Detection of Radio Trans- mitter Turn-on transients[C]//Proc. of NSIP’99. Antalya, Turkey: [s. n.], 1999. [7] Hall J, Barbeau M, Kranakis E. Enhancing Intrusion Detection in Wireless Networks Using Radio Frequency Fingerprinting (Extended Abstract)[C]//Proc. of IEEE Congress on Com- munications, Internet, and Information Technology. [S. l.]: IEEE Press, 2004. [8] Haartsen J C. The Bluetooth Radio System[J]. IEEE Personal Communications, 2000, 7(1): 28-36. [9] Hall J, Barbeau M, Kranakis E. Detection of Transient in Radio Frequency Fingerprinting Using Signal Phase[C]//Proc. of Conference on Wireless and Optical Communications. [S. l.]: ACTA Press, 2003. [10] Ureten O, Serinken N. Detection of Radio Transmitter Turn- on Transients[J]. Electronics Letters, 1999, 35(23): 1996-1997. [11] Hu Yih-Chun, Perrig A, Johnson D B. Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks[C]// Proc. of IEEE Conference on Computer Communications. [S. l.]: IEEE Press, 2003. [12] Wang Xia, Wong J. An End-to-end Detection of Wormhole Attacks in Wireless Ad-hoc Networks[C]//Proc. of COMPSAC’07. Beijing, China: [s. n.], 2007. 编辑 金胡考 |