[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Li et al., 2022 - Google Patents

RadioNet: Robust deep-learning based radio fingerprinting

Li et al., 2022

View PDF
Document ID
12194445985229683224
Author
Li H
Gupta K
Wang C
Ghose N
Wang B
Publication year
Publication venue
2022 IEEE Conference on Communications and Network Security (CNS)

External Links

Snippet

Radio fingerprinting identifies wireless devices by leveraging hardware imperfections embedded in radio frequency (RF) signals. While neural networks have been applied to radio fingerprinting to improve accuracy, existing studies are not robust due to two major …
Continue reading at par.nsf.gov (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2647Arrangements specific to the receiver
    • H04L27/2655Synchronisation arrangements
    • H04L27/2668Details of algorithms
    • H04L27/2673Details of algorithms characterised by synchronisation parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Similar Documents

Publication Publication Date Title
Li et al. RadioNet: Robust deep-learning based radio fingerprinting
Riyaz et al. Deep learning convolutional neural networks for radio identification
Wang et al. Far field EM side-channel attack on AES using deep learning
Bassey et al. Intrusion detection for IoT devices based on RF fingerprinting using deep learning
Li et al. Location-invariant physical layer identification approach for WiFi devices
Zhou et al. A robust radio-frequency fingerprint extraction scheme for practical device recognition
CN111866876A (en) Wireless equipment identification method and device based on frequency offset preprocessing and storage medium
Zhao et al. A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks
Peng et al. A differential constellation trace figure based device identification method for ZigBee nodes
Wu et al. DSLN: Securing Internet of Things through RF fingerprint recognition in low-SNR settings
Merchant et al. Enhanced RF fingerprinting for IoT devices with recurrent neural networks
Comert et al. Analysis of augmentation methods for RF fingerprinting under impaired channels
Andrews Extensions to radio frequency fingerprinting
Wang et al. Specific emitter identification based on deep adversarial domain adaptation
Shi et al. Fedrfid: Federated learning for radio frequency fingerprint identification of wifi signals
Gul et al. On the impact of CDL and TDL augmentation for RF fingerprinting under impaired channels
Mohammad et al. Learning-Based RF Fingerprinting for Device Identification using Amplitude-Phase Spectrograms
Aminuddin et al. Securing wireless communication using RF fingerprinting
Hu et al. Machine learning for RF fingerprinting extraction and identification of soft-defined radio devices
Lin et al. Using SDR Platform to Extract the RF Fingerprint of the Wireless Devices for Device Identification
Zha et al. Specific emitter identification based on paired sample and complex Fourier neural operator
Papangelo et al. Adversarial Machine Learning for Image-Based Radio Frequency Fingerprinting: Attacks and Defenses
Zanetti et al. Types and origins of fingerprints
Zheng et al. A Method for Cross-receiver Specific Emitter Identification Based on CBAM-CNN-BDA
Ma et al. White-Box Adversarial Attacks on Deep Learning-Based Radio Frequency Fingerprint Identification