[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Polak et al., 2011 - Google Patents

Identifying wireless users via transmitter imperfections

Polak et al., 2011

View PDF
Document ID
5618572336937777432
Author
Polak A
Dolatshahi S
Goeckel D
Publication year
Publication venue
IEEE Journal on selected areas in communications

External Links

Snippet

Variations in the RF chain of radio transmitters can be used as a signature to uniquely associate wireless devices with a given transmission. Previous approaches, which have varied from transient analysis to machine learning, do not provide verifiable accuracy, which …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Polak et al. Identifying wireless users via transmitter imperfections
Polak et al. Identification of wireless devices of users who actively fake their RF fingerprints with artificial data distortion
Zhang et al. Radio frequency fingerprint identification for narrowband systems, modelling and classification
Chatterjee et al. RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning
Polak et al. Wireless device identification based on RF oscillator imperfections
Shan et al. PHY-CRAM: Physical layer challenge-response authentication mechanism for wireless networks
Chatterjee et al. RF-PUF: Enhancing IoT security through authentication of wireless nodes using in-situ machine learning
Li et al. Location-invariant physical layer identification approach for WiFi devices
Hao et al. A collaborative PHY-aided technique for end-to-end IoT device authentication
Zhao et al. A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks
Hou et al. Physical layer authentication in OFDM systems based on hypothesis testing of CFO estimates
Xing et al. Design of a channel robust radio frequency fingerprint identification scheme
Zoli et al. Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation
Hao et al. Performance enhancement of I/Q imbalance based wireless device authentication through collaboration of multiple receivers
Le et al. Cross-layer design for primary user emulation attacks detection in mobile cognitive radio networks
Lee et al. A novel cross-layer authentication protocol for the Internet of Things
He et al. Radio frequency fingerprint identification with hybrid time-varying distortions
Huang et al. Theoretical performance analysis of radio frequency fingerprinting under receiver distortions
Li et al. Radio frequency fingerprinting exploiting non-linear memory effect
Polak et al. RF fingerprinting of users who actively mask their identities with artificial distortion
Rehman et al. Portability of an RF fingerprint of a wireless transmitter
Dolatshahi et al. Identification of wireless users via power amplifier imperfections
Zeng et al. Physical layer authentication based on cfo and visibility graph
He et al. Channel-agnostic radio frequency fingerprint identification using spectral quotient constellation errors
Han et al. FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN