Pervasive Wireless Environments: Detecting and Localizing User Spoofing
This Springer Brief provides a new approach to prevent user spoofing by using the physical properties associated with wireless transmissions to detect the presence of user spoofing. The most common method, applying cryptographic authentication, requires additional management and computational power...
| Main Authors: | Yang, Jie (Author), Chen, Yingying (Author), Trappe, Wade (Author), Cheng, Jerry (Author) |
|---|---|
| Corporate Author: | SpringerLink (Online service) |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2014.
|
| Series: | SpringerBriefs in Computer Science,
|
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Similar Items
-
Wireless Sensor Networks Security, Coverage, and Localization /
by: Selmic, Rastko R., et al.
Published: (2016) -
Pervasive Computing 7th International Conference, Pervasive 2009, Nara, Japan, May 11-14, 2009. Proceedings /
Published: (2009) -
Pervasive Computing 5th International Conference, PERVASIVE 2007, Toronto, Canada, May 13-16, 2007. Proceedings /
Published: (2007) -
Pervasive Computing 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedings /
Published: (2008) -
Wired/Wireless Internet Communications 8th International Conference, WWIC 2010, Luleå, Sweden, June 1-3, 2010. Proceedings /
Published: (2010)