Sa et al., 2019 - Google Patents
Specific emitter identification techniques for the internet of thingsSa et al., 2019
View PDF- Document ID
- 9070860091300953704
- Author
- Sa K
- Lang D
- Wang C
- Bai Y
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
Specific Emitter Identification (SEI) detects the individual emitter according its varied signal characteristics. The method operates in the physical layer of the internet and can effectively improve the security of the Internet of Things (IoT). Generally, SEI identifies the uniqueness …
- 238000000034 method 0 title description 22
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/26—Systems using multi-frequency codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sa et al. | Specific emitter identification techniques for the internet of things | |
Lin et al. | Adversarial attacks in modulation recognition with convolutional neural networks | |
Zhang et al. | Wi-Fi sensing for joint gesture recognition and human identification from few samples in human-computer interaction | |
CN108764077B (en) | Digital signal modulation classification method based on convolutional neural network | |
Li et al. | Wireless transmitter identification based on device imperfections | |
Zhou et al. | Design of a robust RF fingerprint generation and classification scheme for practical device identification | |
Comert et al. | Analysis of augmentation methods for RF fingerprinting under impaired channels | |
Guo et al. | Survey of mobile device authentication methods based on RF fingerprint | |
Gul et al. | Fine-grained augmentation for RF fingerprinting under impaired channels | |
Li et al. | Differential contour stellar-based radio frequency fingerprint identification for Internet of Things | |
Wang et al. | Specific emitter identification based on deep adversarial domain adaptation | |
Bassey et al. | Device authentication codes based on RF fingerprinting using deep learning | |
Zhang et al. | Data augmentation aided few-shot learning for specific emitter identification | |
Xia et al. | Radar waveform recognition based on a two‐stream convolutional network and software defined radio | |
Gul et al. | On the impact of CDL and TDL augmentation for RF fingerprinting under impaired channels | |
Feng et al. | FCGCN: Feature Correlation Graph Convolution Network for Few-Shot Individual Identification | |
Ying et al. | Differential complex-valued convolutional neural network-based individual recognition of communication radiation sources | |
Huang et al. | Radio frequency fingerprint identification method based on ensemble learning | |
Liu et al. | RF fingerprint recognition based on spectrum waterfall diagram | |
Li et al. | Study on radio-frequency signal gene characteristics from the perspective of fractal theory | |
Horne et al. | Classification of LoRa signals with real-time validation using the Xilinx Radio Frequency System-on-Chip | |
Harmer et al. | Using differential evolution to optimize'learning from signals' and enhance network security | |
Wang et al. | A radio frequency fingerprinting identification method based on energy entropy and color moments of the bispectrum | |
CN113905383B (en) | IFF signal identification method, device and medium based on radio frequency fingerprint | |
Wu et al. | Specific Emitter Identification Based on Multi-Scale Attention Feature Fusion Network |