Li et al., 2022 - Google Patents
RadioNet: Robust deep-learning based radio fingerprintingLi et al., 2022
View PDF- Document ID
- 12194445985229683224
- Author
- Li H
- Gupta K
- Wang C
- Ghose N
- Wang B
- Publication year
- Publication venue
- 2022 IEEE Conference on Communications and Network Security (CNS)
External Links
Snippet
Radio fingerprinting identifies wireless devices by leveraging hardware imperfections embedded in radio frequency (RF) signals. While neural networks have been applied to radio fingerprinting to improve accuracy, existing studies are not robust due to two major …
- 230000004301 light adaptation 0 abstract description 32
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/26—Systems using multi-frequency codes
- H04L27/2601—Multicarrier modulation systems
- H04L27/2647—Arrangements specific to the receiver
- H04L27/2655—Synchronisation arrangements
- H04L27/2668—Details of algorithms
- H04L27/2673—Details of algorithms characterised by synchronisation parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | RadioNet: Robust deep-learning based radio fingerprinting | |
Riyaz et al. | Deep learning convolutional neural networks for radio identification | |
Wang et al. | Far field EM side-channel attack on AES using deep learning | |
Bassey et al. | Intrusion detection for IoT devices based on RF fingerprinting using deep learning | |
Li et al. | Location-invariant physical layer identification approach for WiFi devices | |
Zhou et al. | A robust radio-frequency fingerprint extraction scheme for practical device recognition | |
CN111866876A (en) | Wireless equipment identification method and device based on frequency offset preprocessing and storage medium | |
Zhao et al. | A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks | |
Peng et al. | A differential constellation trace figure based device identification method for ZigBee nodes | |
Wu et al. | DSLN: Securing Internet of Things through RF fingerprint recognition in low-SNR settings | |
Merchant et al. | Enhanced RF fingerprinting for IoT devices with recurrent neural networks | |
Comert et al. | Analysis of augmentation methods for RF fingerprinting under impaired channels | |
Andrews | Extensions to radio frequency fingerprinting | |
Wang et al. | Specific emitter identification based on deep adversarial domain adaptation | |
Shi et al. | Fedrfid: Federated learning for radio frequency fingerprint identification of wifi signals | |
Gul et al. | On the impact of CDL and TDL augmentation for RF fingerprinting under impaired channels | |
Mohammad et al. | Learning-Based RF Fingerprinting for Device Identification using Amplitude-Phase Spectrograms | |
Aminuddin et al. | Securing wireless communication using RF fingerprinting | |
Hu et al. | Machine learning for RF fingerprinting extraction and identification of soft-defined radio devices | |
Lin et al. | Using SDR Platform to Extract the RF Fingerprint of the Wireless Devices for Device Identification | |
Zha et al. | Specific emitter identification based on paired sample and complex Fourier neural operator | |
Papangelo et al. | Adversarial Machine Learning for Image-Based Radio Frequency Fingerprinting: Attacks and Defenses | |
Zanetti et al. | Types and origins of fingerprints | |
Zheng et al. | A Method for Cross-receiver Specific Emitter Identification Based on CBAM-CNN-BDA | |
Ma et al. | White-Box Adversarial Attacks on Deep Learning-Based Radio Frequency Fingerprint Identification |