Real-time identification of rogue WiFi connections using environment-independent physical features

P Liu, P Yang, WZ Song, Y Yan… - IEEE INFOCOM 2019 …, 2019 - ieeexplore.ieee.org
WiFi has become a pervasive communication medium in connecting various devices of
WLAN and IoT. However, WiFi connections are vulnerable to the impersonation attack from …

How physicality enables trust: A new era of trust-centered cyberphysical systems

S Gil, M Yemini, A Chorti, A Nedić, HV Poor… - arXiv preprint arXiv …, 2023 - arxiv.org
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and
security. The unique characteristics of these systems prompt a reevaluation of their security …

Guaranteeing spoof-resilient multi-robot networks

S Gil, S Kumar, M Mazumder, D Katabi, D Rus - Autonomous Robots, 2017 - Springer
Multi-robot networks use wireless communication to provide wide-ranging services such as
aerial surveillance and unmanned delivery. However, effective coordination between …

Reliable detection of location spoofing and variation attacks

C Kim, SY Chang, D Lee, J Kim, K Park, J Kim - IEEE Access, 2023 - ieeexplore.ieee.org
Location spoofing is a critical attack in mobile communications. While several previous
studies investigated the detection of location spoofing attacks, they are limited in their …

Characterizing trust and resilience in distributed consensus for cyberphysical systems

M Yemini, A Nedić, AJ Goldsmith… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This work considers the problem of resilient consensus, where stochastic values of trust
between agents are available. Specifically, we derive a unified mathematical framework to …

P3-LOC: A Privacy-Preserving Paradigm-Driven Framework for Indoor Localization

P Zhao, H Jiang, JCS Lui, C Wang… - IEEE/ACM …, 2018 - ieeexplore.ieee.org
Indoor localization plays an important role as the basis for a variety of mobile applications,
such as navigating, tracking, and monitoring in indoor environments. However, many such …

A survey: Spoofing attacks in physical layer security

MH Yılmaz, H Arslan - 2015 IEEE 40th Local Computer …, 2015 - ieeexplore.ieee.org
Increasing demand on wireless communications also increases the issues related to
communication security. Among different security solutions, physical layer security have …

Real-time identification of rogue WiFi connections in the wild

D Yan, Y Yan, P Yang, WZ Song… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
WiFi connections are vulnerable to simulated attacks from rogue access points (APs) or
devices whose SSID and/or MAC/IP address are the same as legitimate devices. This kind of …

Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures

D Moser, P Leu, V Lenders, A Ranganathan… - Proceedings of the …, 2016 - dl.acm.org
Multilateration techniques have been proposed to verify the integrity of unprotected location
claims in wireless localization systems. A common assumption is that the adversary is …

Multi-lateral privacy-preserving localization in pervasive environments

T Shu, Y Chen, J Yang… - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
Location based services (LBSs) have raised serious privacy concerns in the society, due to
the possibility of leaking a mobile user's location information in enabling location-dependent …