This paper presents novel methodologies which allow robust secret key extraction from radio channel measurements which suffer from real-world non-reciprocities and a priori unkno...
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
In this work, we investigate the security of anonymous wireless sensor networks. To lay down the foundations of a formal framework, we propose a new model for analyzing and evalua...