Polak et al., 2011 - Google Patents
Identifying wireless users via transmitter imperfectionsPolak et al., 2011
View PDF- Document ID
- 5618572336937777432
- Author
- Polak A
- Dolatshahi S
- Goeckel D
- Publication year
- Publication venue
- IEEE Journal on selected areas in communications
External Links
Snippet
Variations in the RF chain of radio transmitters can be used as a signature to uniquely associate wireless devices with a given transmission. Previous approaches, which have varied from transient analysis to machine learning, do not provide verifiable accuracy, which …
- 230000001702 transmitter 0 title abstract description 46
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Polak et al. | Identifying wireless users via transmitter imperfections | |
Polak et al. | Identification of wireless devices of users who actively fake their RF fingerprints with artificial data distortion | |
Zhang et al. | Radio frequency fingerprint identification for narrowband systems, modelling and classification | |
Chatterjee et al. | RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning | |
Polak et al. | Wireless device identification based on RF oscillator imperfections | |
Shan et al. | PHY-CRAM: Physical layer challenge-response authentication mechanism for wireless networks | |
Chatterjee et al. | RF-PUF: Enhancing IoT security through authentication of wireless nodes using in-situ machine learning | |
Li et al. | Location-invariant physical layer identification approach for WiFi devices | |
Hao et al. | A collaborative PHY-aided technique for end-to-end IoT device authentication | |
Zhao et al. | A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks | |
Hou et al. | Physical layer authentication in OFDM systems based on hypothesis testing of CFO estimates | |
Xing et al. | Design of a channel robust radio frequency fingerprint identification scheme | |
Zoli et al. | Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation | |
Hao et al. | Performance enhancement of I/Q imbalance based wireless device authentication through collaboration of multiple receivers | |
Le et al. | Cross-layer design for primary user emulation attacks detection in mobile cognitive radio networks | |
Lee et al. | A novel cross-layer authentication protocol for the Internet of Things | |
He et al. | Radio frequency fingerprint identification with hybrid time-varying distortions | |
Huang et al. | Theoretical performance analysis of radio frequency fingerprinting under receiver distortions | |
Li et al. | Radio frequency fingerprinting exploiting non-linear memory effect | |
Polak et al. | RF fingerprinting of users who actively mask their identities with artificial distortion | |
Rehman et al. | Portability of an RF fingerprint of a wireless transmitter | |
Dolatshahi et al. | Identification of wireless users via power amplifier imperfections | |
Zeng et al. | Physical layer authentication based on cfo and visibility graph | |
He et al. | Channel-agnostic radio frequency fingerprint identification using spectral quotient constellation errors | |
Han et al. | FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN |