On physical-layer identification of wireless devices

B Danev, D Zanetti, S Capkun - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Physical-layer device identification aims at identifying wireless devices during radio
communication by exploiting unique characteristics of their analog (radio) circuitry. This work …

Prominent unicast routing protocols for Mobile Ad hoc Networks: Criterion, classification, and key attributes

TK Saini, SC Sharma - Ad Hoc Networks, 2019 - Elsevier
Abstract Mobile Ad hoc Networks are decentralized networks in which participating nodes
are mobile, small form-factor, equipped with the wireless interface, and have forwarding …

The security and privacy of smart vehicles

JP Hubaux, S Capkun, J Luo - IEEE Security & Privacy, 2004 - ieeexplore.ieee.org
The security and privacy of smart vehicles Page 1 Making Wireless Work Current traffic-safety
statistics are notoriously horrific. Approximately 40,000 people are killed each year on the …

Discrete-continuous optimization for large-scale structure from motion

D Crandall, A Owens, N Snavely, D Huttenlocher - CVPR 2011, 2011 - ieeexplore.ieee.org
Recent work in structure from motion (SfM) has successfully built 3D models from large
unstructured collections of images downloaded from the Internet. Most approaches use …

Secure positioning in wireless networks

S Capkun, JP Hubaux - IEEE Journal on Selected Areas in …, 2006 - ieeexplore.ieee.org
So far, the problem of positioning in wireless networks has been studied mainly in a
nonadversarial setting. In this paper, we analyze the resistance of positioning techniques to …

ALARM: Anonymous location-aided routing in suspicious MANETs

K El Defrawy, G Tsudik - IEEE Transactions on Mobile …, 2010 - ieeexplore.ieee.org
In most common mobile ad hoc networking (MANET) scenarios, nodes establish
communication based on long-lasting public identities. However, in some hostile and …

Anonymous communications in mobile ad hoc networks

Y Zhang, W Liu, W Lou - … IEEE 24th Annual Joint Conference of …, 2005 - ieeexplore.ieee.org
Due to the broadcast nature of radio transmissions, communications in mobile ad hoc
networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we …

ARM: Anonymous routing protocol for mobile ad hoc networks

S Seys, B Preneel - International Journal of Wireless and …, 2009 - inderscienceonline.com
In this paper we describe a novel anonymous on-demand routing protocol for wireless
Mobile Ad Hoc Networks (MANETs) that is secure against both nodes that actively …

Securing mobile ad hoc networks with certificateless public keys

Y Zhang, W Liu, W Lou, Y Fang - IEEE transactions on …, 2006 - ieeexplore.ieee.org
This paper studies key management, a fundamental problem in securing mobile ad hoc
networks (MANETs). We present IKM, an ID-based key management scheme as a novel …

ALERT: an anonymous location-based efficient routing protocol in MANETs

H Shen, L Zhao - IEEE transactions on mobile computing, 2012 - ieeexplore.ieee.org
Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node
identities and/or routes from outside observers in order to provide anonymity protection …