Real-time identification of rogue WiFi connections using environment-independent physical features
WiFi has become a pervasive communication medium in connecting various devices of
WLAN and IoT. However, WiFi connections are vulnerable to the impersonation attack from …
WLAN and IoT. However, WiFi connections are vulnerable to the impersonation attack from …
How physicality enables trust: A new era of trust-centered cyberphysical systems
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and
security. The unique characteristics of these systems prompt a reevaluation of their security …
security. The unique characteristics of these systems prompt a reevaluation of their security …
Guaranteeing spoof-resilient multi-robot networks
Multi-robot networks use wireless communication to provide wide-ranging services such as
aerial surveillance and unmanned delivery. However, effective coordination between …
aerial surveillance and unmanned delivery. However, effective coordination between …
Reliable detection of location spoofing and variation attacks
Location spoofing is a critical attack in mobile communications. While several previous
studies investigated the detection of location spoofing attacks, they are limited in their …
studies investigated the detection of location spoofing attacks, they are limited in their …
Characterizing trust and resilience in distributed consensus for cyberphysical systems
This work considers the problem of resilient consensus, where stochastic values of trust
between agents are available. Specifically, we derive a unified mathematical framework to …
between agents are available. Specifically, we derive a unified mathematical framework to …
P3-LOC: A Privacy-Preserving Paradigm-Driven Framework for Indoor Localization
Indoor localization plays an important role as the basis for a variety of mobile applications,
such as navigating, tracking, and monitoring in indoor environments. However, many such …
such as navigating, tracking, and monitoring in indoor environments. However, many such …
A survey: Spoofing attacks in physical layer security
Increasing demand on wireless communications also increases the issues related to
communication security. Among different security solutions, physical layer security have …
communication security. Among different security solutions, physical layer security have …
Real-time identification of rogue WiFi connections in the wild
WiFi connections are vulnerable to simulated attacks from rogue access points (APs) or
devices whose SSID and/or MAC/IP address are the same as legitimate devices. This kind of …
devices whose SSID and/or MAC/IP address are the same as legitimate devices. This kind of …
Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures
Multilateration techniques have been proposed to verify the integrity of unprotected location
claims in wireless localization systems. A common assumption is that the adversary is …
claims in wireless localization systems. A common assumption is that the adversary is …
Multi-lateral privacy-preserving localization in pervasive environments
Location based services (LBSs) have raised serious privacy concerns in the society, due to
the possibility of leaking a mobile user's location information in enabling location-dependent …
the possibility of leaking a mobile user's location information in enabling location-dependent …