Sorry, you need to enable JavaScript to visit this website.

A Novel Physical Layer Spoofing Detection Based on Sparse Signal Processing

Error message

  • The specified file temporary://filefza1E4 could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
  • The specified file temporary://fileeLdjOF could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
  • The specified file temporary://file3LkITD could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
  • The specified file temporary://fileaHGuuR could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
  • The specified file temporary://file1nqBSo could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
  • The specified file temporary://filetNc9Sg could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
  • The specified file temporary://fileNmyH0S could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
  • The specified file temporary://fileCalQYQ could not be copied, because the destination directory is not properly configured. This may be caused by a problem with file or directory permissions. More information is available in the system log.
Citation Author(s):
Shichao Lv; Ting Jiang; Ge Zhou
Submitted by:
Ning Wang
Last updated:
23 February 2016 - 1:44pm
Document Type:
Presentation Slides
Document Year:
2015
Event:
Presenters:
Ge Zhou
 

In wireless communication systems, spoofing attack significantly impact the information security, for this attack is not hard to launch with little effort. Although traditional cryptographic authentication can be utilized for node identification, it is not desirable in some low power requirements application scenarios such as Wireless Sensor Networks (WSNs). In this paper, we formulate this problem as one of sparse signal processing. In order to identify the existence of the spoofing attacker, we explore using the feature extraction and fusion
to establish an automatic representative selection algorithm. By examining the correlation between the two selected targets, we can determine the attacking situation. We evaluate our scheme through an experimental system, and the experimental results on
real measured data show that our sparse signal processing can reach desired identification performance.

up
0 users have voted: