@TechReport{01i7, author = "Jen Hall", institution = "HomeRF Working Group", title = {{A} {C}omparison of {S}ecurity in {H}ome{RF} versus {I}{E}{E}{E}802.11b}, year = "2001", publisher = "", keywords = "", number = "" } @TechReport{01i16, author = "Jen Hall", institution = "Wireless Ethernet Compatibility Alliance", title = "{802.11b {W}ired {E}quivalent {P}rivacy ({W}{E}{P}) {S}ecurity}, year = "2001", publisher = "", keywords = "", number = "" } @Misc{, author = "Jen Hall", title = {{O}verview: {W}ireless {L}{A}{N} {S}ecurity}, howpublished = "{http://www.cisco.com/warp/public/cc/pd/witc/ao350ap/prodlit/a350w_ov.html}", year = "2001" } @misc{802.1199i2, title = {{I}{E}{E}{E} 802.11 {S}tandard, {W}ireless {L}{A}{N} {S}tandard}, year = "1999", howpublished = "{http://www.wlana.org/learn}" } @TechReport{Abadis12, author = "Martin Abadi", institution = "Digital Equipment Corporation, Systems Research Center", title = {{T}wo {F}acets of {A}uthentication}, year = "Jen Hall", publisher = "", keywords = "", number = "" } @Article{Akiyama93a5, author = "Ryota Akiyama and Susumu Sasaki", title = {{A}uthentication and {E}ncryption in a {M}obile {C}ommunication {S}ystem", journal = "Jen Hall", volume = "", year = "1993", pages = "927-930", publisher = "IEEE" } @InProceedings{Al-hajeri03, author = "Salem Al-hajeri and Madjid Merabti and Bob Askwith", title = {{A}nalysis of {I}{P}{S}ec {S}ervices}, booktitle = "Proceedings of the Wireless and Optical Communications Conference", pages = "326--331", year = "2003", month = "July", address = "Banff, Canada", publisher = "ACTA Press" } @Article{Al-Muhtadi02a4, author = "Jalal Al-Muhtadi and Dennis Mickunas and Roy Campbell", title = {{A} {L}ightweight {R}econfigurable {S}ecurity {M}echanism for 3G/4G {M}obile {D}evices}, journal = "IEEE Wireless Communications", volume = "", year = "2002", pages = "60--65", publisher = "IEEE" } @Article{Arbaugh02i8, author = "William A. Arbaugh and Narendar Shankar and Y.C. Justin Wan", title = {{Y}our 802.11 {W}ireless network has no clothes", journal = "IEEE Wireless Communications", volume = "", year = "2002", pages = "44--51", publisher = "IEEE" } @Article{Arbaugh03, author = "William A. Arbaugh", title = {{S}ecurity - {W}ireless {S}ecurity is {D}ifferent}, journal = "IEEE Computer Magazine", volume = "36", year = "2003", pages = "99--101", publisher = "IEEE" } @TechReport{Ashleys3, author = "Paul Ashley and Heather Hinton and Mark Vandenwauver", institution = "IBM Software Group - Tivoli", title = {{W}ired versus {W}ireless {S}ecurity: {T}he {I}nternet, {W}AP and iMode for {E}-{C}ommerce}, year = "1995", publisher = "", keywords = "", number = "" } @misc{BTBasebandb4, title = {{B}luetooth specification V1.1, baseband specification}, date = "2001", howpublished = "{http://www.bluetooth.org}" } @misc{BTSecurityb5, title = {{B}luetooth {S}ecurity {A}rchitecture Volume 1}, date = "1999", howpublished = "{http://www.bluetooth.org}" } @misc{BTSpecv1b10, title = {{S}pecification of the {B}luetooth {S}ystem, Volume 1}, date = "2001", howpublished = "{http://www.bluetooth.org}" } @misc{BTSpecv1b12, title = {{S}pecification of the {B}luetooth {S}ystem, Volume 2}, date = "2001", howpublished = "{http://www.bluetooth.org}" } @misc{BTSecWPb11, title = {{B}luetooth {S}ecurity {W}hite {P}aper}, date = "2002", howpublished = "{http://www.bluetooth.org}" } @misc{BTProtocolb14, title = {{B}luetooth {P}rotocol {A}rchitecture", date = "1999", howpublished = "{http://www.bluetooth.org}" } @misc{BTSecWPb15, title = {{I}nteroperability {R}equirements for {B}luetooth as a {W}{A}{P} bearer", date = "Jen Hall", howpublished = "{http://www.bluetooth.org}" } @Article{Barber01b7, author = "Richard Barber", title = {{S}ecurity in a {M}obile {W}orld - is {B}luetooth the {A}nswer?}, journal = "Computers and Security", volume = "20", year = "2001", pages = "374-379", publisher = "Elsevier Sciences Ltd" } @Article{Barua00m7, author = "Susamma Barua", title = {{A}uthentication of {C}ellular {U}sers through {V}oice {V}erification}, journal = "Jen Hall", volume = "", year = "2000" publisher = "IEEE" } @InProceedings{Borisov01i20, author = "Nikita Borisov and Ian Goldberg and David Wagner", title = {{I}ntercepting {M}obile {C}ommunications: {T}he {I}nsecurity of 802.11}, booktitle = "Proceedings of the SIGMOBILE", pages = "180--188", year = "2001", month = "July", address = "Rome, Italy", publisher = "ACM" } @Article{Bria01s6, author = "Aurelian Bria and Fredrik Gessler and Olav Queseth and Richard Stridh and Matthias Unbehaun and Jiang Wu and Jens Zander", title = {4th-{G}eneration {W}ireless {I}nfrastructures: {S}cenarios and {R}esearch {C}hallenges}, journal = "Personal Communications", volume = "", year = "2001", publisher = "IEEE" } @Article{Brutcha10, author = "Tasneem G. Brutch and Paul C. Brutch", title = {{M}utual {A}uthentication, {C}onfidentiality and {K}ey {M}anagement (MACKMAN) {S}ystem for {M}obile {C}omputing and {W}ireless {C}ommunication}, journal = "Jen Hall", volume = "", year = "Jen Hall" } @Book{Burrus98, author = "C. Sidney Burrus and Ramesh A. Gopinath and Haitao Guo", title = {{I}ntroduction to {W}avelets and {W}avelet {T}ransforms}, publisher = "Prentice Hall", year = "1998" } @Article{Cam-Winget03, author = "Nancy Cam-Winget and Russ Housley and David Wagner and Jesse Walker", title = {{S}ecurity {F}laws in 802.11 {D}ata {L}ink {P}rotocols}, journal = "Communication of the ACM", volume = "46", year = "2003", pages = "35--39", publisher = "ACM" } @InProceedings{Choe95t1, author = "H. Choe and C.E. Poole and A.M. Yu and H.H. Szu", title = {{N}ovel identification of intercepted signals from unknown radio transmitters}, booktitle = "SPIE", pages = "504-717", year = "1995", month = "", address = "", publisher = "" } @Book{Chui92, author = "C. K. Chui", title = {{A}n {I}ntroducation to {W}avelets}, publisher = "Academic Press", year = "1992" } @Article{Crow97, author = "B.P. Crow and I. Widujaja and L.G. Kim and P.T. Sakai,", title = {{I}{E}{E}{E} 802.11 {W}ireless {L}ocal {A}rea {N}etworks}, journal = "IEEE Communications Magazine", volume = "", month = "August", year = "1997", publisher = "IEEE" } @Book{Daubechies92, author = "I. Daubechies", title = {{T}en {L}ectures on {W}avelets}, publisher = "SIAM", year = "1992" } @Article{Drabwell02b8, author = "Peter Drabwell", title = {{B}luetooth {S}ecurity - {F}act or {F}iction?}, journal = "Jen Hall", volume = "", year = "2002", pages = "221--228", publisher = "Springer-Verlag Berlin Heidelberg" } @TechReport{Droms01i8-1, author = "R. Droms and W. Arbauth", institution = "Jen Hall", title = {{A}uthentication for {D}{H}{C}{P} {M}essages}, year = "2001", publisher = " Internet Engineering Task Force (IETF)", keywords = "", number = "" } @Article{Ellis01t5, author = "K.J. Ellis and N. Serinken", title = "{{C}haracteristics of radio transmitter fingerprints}, journal = "'Radio Science", volume = "36", year = "2001", pages = "585--597", publisher = "" } @Article{Fisher02i15, author = "Dennis Fisher", title = {{W}ireless spec no security elixir}, journal = "eWeek", volume = "19", year = "2002", pages = "12", publisher = "" } @Book{Fausett94, author = "Laurene Fausett", title = {{F}undamentals of {N}eural {N}etworks {A}rchitectures, {A}lgorithms and {A}pplications}, publisher = "Prentice-Hall, Inc.", year = "1994" } @Article{Gorrieria7, author = "Roberto Gorrieri and Paul Syverson", title = {{V}arieties of {A}uthentication}, journal = "Jen Hall", volume = "", year = "Jen Hall", pages = "", publisher = "" } @InProceedings{Graham02a2, author = "Joseph W. Graham II", title = {{A}uthenticating {P}ublic {A}ccess {N}etworking}, booktitle = "Proceedings of SIGUCCS", pages = "247--248", year = "2002", month = "November", address = "Providence, Rhode Island, USA", publisher = "ACM" } @InProceedings{Hall03, author = "Jeyanthi Hall and Michel Barbeau and Evangelos Kranakis", title = {{D}etection of {T}ransient in {R}adio {F}requency {F}ingerprinting using {S}ignal {P}hase}, booktitle = "Proceedings of the Wireless and Optical Communications Conference", pages = "13--18", year = "2003", month = "July", address = "Banff, Canada", publisher = "ACTA Press" } @TechReport{Hansel97, author = "Lee E. Hansel and Bruce Cook and Wayne Dietrich and Chuck Degarmo", institution = "Jen Hall", title = {{C}loning {P}revention in {P}re-1995 {P}hones: {A}uthentication vs. {R}{F} {F}ingerprinting}, year = "1997", publisher = "", keywords = "", number = "", } @Article{Harra99i22, author = "Kirsi Harra", title = {{E}nd-to-end security for the wireless network}, journal = "Computer Fraud and Security", volume = "", year = "1999", publisher = "Elsevier Science Ltd." } @Article{Harrington97s5, author = "John J. Harrington and Daniel A. Pritchard", title = {{C}oncepts and {A}pplications of {W}ireless {S}ecurity {S}ystems for {T}actical, {P}ortable, and {F}ixed {S}ites}, journal = "Jen Hall", volume = "", year = "1997", publisher = "IEEE" } @Article{Harris01i5, author = "Shon Harris", title = {802.11 {S}ecurity}, journal = "Windows 2000 Magazine", volume = "", year = "2001", pages = "47--51", publisher = "" } @Article{Higuchi887, author = "T. Higuchi", title = {{A}pproach to an irregular time series on the basis of the fractal theory}, journal = "Physica D", volume = "31", year = "1988", pages = "277--283", publisher = "Elsevier Science Publishers" } @InProceedings{Hippenstiel96t2, author = "R.D. Hippenstiel and Y. Payal", title = {{W}avelet {B}ased {T}ransmitter {I}dentification}, booktitle = "Proc. Information Symposium on Signal Processing and its Applications", pages = "", year = "1996", month = "", address = "Gold Coast, Australia", publisher = "" } @Misc{Holtby01b9, author = "Troy Holtby", title = {{B}luetooth 1.1 addresses earlier flaws}, howpublished = "{http://www.nwfusion.com/news/tech/2001/0813tech.html}", year = "2001" } @Article{Huckaby01i5-1, author = "Tim Huckaby", title = "Jen Hall", journal = "Windows 2000 Magazine", volume = "", year = "2001", pages = "", publisher = "" } @Article{Hunter00, author = "A. Hunter", title = {{F}eature {S}election {U}sing {P}robabilistic {N}eural {N}etworks}, journal = "Neural Computing and Applications", volume = "", year = "2000", pages = "", publisher = "Springer-Verlag" } @InProceedings{Hwang03m5, author = "David Hwang and Patrick Schaumont and Yi Fan and Alireza Hodjat and Bo-Cheng Lai and Kazuo Sakiyama and Shenglin Yang and Ingrid Verbauwhede", title = {{D}esign {F}low for {H}{W}/{S}{W} {A}cceleration {T}ransparency in the {T}humbPod {S}ecure {E}mbedded {S}ystem}, booktitle = "Proceedings of the DAC", pages = "60--65", year = "2003", month = "June", address = "Anaheim, California, USA", publisher = "ACM" } @Article{Jakobsson01b6, author = "Markus Jakobsson and Susanne Wetzel", title = {{S}ecurity {W}eaknesses in {B}luetooth}, journal = "Jen Hall", volume = "", year = "2001", pages = "176--191", publisher = "Springer-Verlag" } @TechReport{Karygiannis02i12-1, author = "T. Karygiannis and L. Owens", institution = "NIST", title = {{W}ireless {N}etwork {S}ecurity: 802.11, {B}luetooth and {H}andheld {D}evices}, year = "2002", publisher = "NIST", keywords = "", number = "" } @TechReport{Kinsner946, author = "W. Kinsner", institution = "University of Manitoba", title = {{A} unified approach to fractal and multifractal dimensions}, year = "2001", publisher = "", keywords = "", number = "" } @Article{Kitsos03b17, author = "Paraskevas Kitsos and Nicolas Sklavos and Kyriakos Papadomanolakis and Odysseas Koufopavlou", title = {{H}ardware implementation of {B}luetooth {S}ecurity}, journal = "Pervasive Computing", volume = "", year = "2003", pages = "21--29", publisher = "IEEE" } @Misc{Laing01i9, author = "Alicia Laing", title = {{T}he {S}ecurity {M}echanism for {I}{E}{E}{E} 802.11 {W}ireless {N}etworks}, howpublished = "{http://rr.sans.org/wireless/IEEE_80211.php}", year = "2001" } @Article{Leyden01i19, author = "John Leyden", title = {{T}ool dumbs down wireless hacking}, journal = "The Register", volume = "", year = "2001", pages = "", publisher = "" } @Article{Lin93a6, author = "Hung-Yu Lin and Lein Harn", title = {{A}uthentication in {W}ireless {C}ommunications}, journal = "Jen Hall", volume = "", year = "1993", pages = "550--554", publisher = "IEEE" } @Misc{Mehta01i18, author = "Princy C. Mehta", title = {{W}ired {E}quivalent {P}rivacy {V}ulnerability}, howpublished = "{http://rr.sans.org/wireless/equiv.php}", year = "2001" } @Book{Meyer93, author = "Y. Meyer", title = {{W}avelets: {A}lgorithms & {A}pplications}, publisher = "SIAM", year = "1993" } @Article{Miller01s2, author = "Sandra Kay Miller", title = {{F}acing the {C}hallenge of {W}ireless {S}ecurity}, journal = "Computer", volume = "", year = "2001" } @Book{Miller01, author = "Brent A. Miller and Chatschik Bisdikian", title = {{B}luetooth {R}evealed", publisher = "Prentice Hall PTR", year = "2001" } @Article{Mishra02i21, author = "Arunesh Mishra and William A. Arbaugh", title = {{A}n {I}nitial {S}ecurity {A}nalysis of the {I}{E}{E}{E} 802.1x {S}tandard}, journal = "Jen Hall", volume = "", year = "2002" publisher = "" } @Article{Molta02s1, author = "Dave Molta", title = {{W}LAN {S}ecurity on the {R}ise}, journal = "Network Computing", volume = "13", year = "2002" } @Book{Nichols02, author = "Randall K. Nichols and Panos C. Lekkas", title = {{W}ireless {S}ecurity {M}odels, {T}hreats, and {S}olutions}, publisher = "McGraw-Hill", year = "2002" } @Article{Nobel02i14, author = "Carmen Nobel", title = {{N}ew options help sort out 802.11}, journal = "eWeek", volume = "19", year = "2002", pages = "9--10", publisher = "" } @Article{O'Shea03, author = "Dan O'Shea", title = {{W}i-{F}i: {S}till {W}aiting in the {W}ings}, journal = "Telephony", volume = "244", year = "2003", pages = "28--29", publisher = "" } @Book{Pahlavan02, author = "Kaveh Pahlavan and Prashant Krishnamurthy", title = {{P}rinciples of {W}ireless {N}etworks}, publisher = "Prentice Hall PTR", year = "2002" } @Article{Park98i10, author = "Se Hyun Park and Aura Ganz and Zvi Ganz", title = {{S}ecurity protocol for {I}{E}{E}{E} 802.11 wireless local area network}, journal = "Mobile Networks and Applications", volume = "3", year = "1998", pages = "237--246", publisher = "Baltzer Science Publishers" } @InProceedings{Park03, author = "Sung I. Park and Vijay Raghunathan and Mani B. Srivastava", title = {{E}nergy {E}