[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sa et al., 2019 - Google Patents

Specific emitter identification techniques for the internet of things

Sa et al., 2019

View PDF
Document ID
9070860091300953704
Author
Sa K
Lang D
Wang C
Bai Y
Publication year
Publication venue
IEEE Access

External Links

Snippet

Specific Emitter Identification (SEI) detects the individual emitter according its varied signal characteristics. The method operates in the physical layer of the internet and can effectively improve the security of the Internet of Things (IoT). Generally, SEI identifies the uniqueness …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/00073Extracting features related to minutiae and pores

Similar Documents

Publication Publication Date Title
Sa et al. Specific emitter identification techniques for the internet of things
Lin et al. Adversarial attacks in modulation recognition with convolutional neural networks
Zhang et al. Wi-Fi sensing for joint gesture recognition and human identification from few samples in human-computer interaction
CN108764077B (en) Digital signal modulation classification method based on convolutional neural network
Li et al. Wireless transmitter identification based on device imperfections
Zhou et al. Design of a robust RF fingerprint generation and classification scheme for practical device identification
Comert et al. Analysis of augmentation methods for RF fingerprinting under impaired channels
Guo et al. Survey of mobile device authentication methods based on RF fingerprint
Gul et al. Fine-grained augmentation for RF fingerprinting under impaired channels
Li et al. Differential contour stellar-based radio frequency fingerprint identification for Internet of Things
Wang et al. Specific emitter identification based on deep adversarial domain adaptation
Bassey et al. Device authentication codes based on RF fingerprinting using deep learning
Zhang et al. Data augmentation aided few-shot learning for specific emitter identification
Xia et al. Radar waveform recognition based on a two‐stream convolutional network and software defined radio
Gul et al. On the impact of CDL and TDL augmentation for RF fingerprinting under impaired channels
Feng et al. FCGCN: Feature Correlation Graph Convolution Network for Few-Shot Individual Identification
Ying et al. Differential complex-valued convolutional neural network-based individual recognition of communication radiation sources
Huang et al. Radio frequency fingerprint identification method based on ensemble learning
Liu et al. RF fingerprint recognition based on spectrum waterfall diagram
Li et al. Study on radio-frequency signal gene characteristics from the perspective of fractal theory
Horne et al. Classification of LoRa signals with real-time validation using the Xilinx Radio Frequency System-on-Chip
Harmer et al. Using differential evolution to optimize'learning from signals' and enhance network security
Wang et al. A radio frequency fingerprinting identification method based on energy entropy and color moments of the bispectrum
CN113905383B (en) IFF signal identification method, device and medium based on radio frequency fingerprint
Wu et al. Specific Emitter Identification Based on Multi-Scale Attention Feature Fusion Network