Y Xing, A Hu, J Zhang, L Peng… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Radio frequency fingerprint (RFF) identification is an emerging device authentication technique that exploits the hardware imperfections resulting from the manufacturing process …
X Zhou, A Hu, G Li, L Peng, Y Xing… - 2019 IEEE Conference …, 2019 - ieeexplore.ieee.org
Radio frequency (RF) fingerprint has gained wide attention as it takes advantages of inherent characteristics in hardware for identification and verification. However, performance …
K Merchant, B Nousain - MILCOM 2019-2019 IEEE Military …, 2019 - ieeexplore.ieee.org
As the Internet of Things (IoT) continues to expand, there is a growing necessity for improved techniques to authenticate the identity of wireless transmitters. In this paper, we develop a …
W Wu, S Hu, D Lin, Z Liu - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The explosive growth of Internet of Things (IoT) has mandated the security of data access. Although authentication methods can enhance network security, their vulnerability to …
Radio frequency fingerprint identification (RFFI) can uniquely classify wireless devices by analyzing the received signal distortions caused by the intrinsic hardware impairments. The …
R Xie, W Xu, Y Chen, J Yu, A Hu… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Radio-frequency fingerprints (RFFs) are promising solutions for realizing low-cost physical layer authentication. Machine learning-based methods have been proposed for RFF …
F Xie, H Wen, J Wu, S Chen, W Hou… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this article, a convolutional neural network (CNN) enhanced radio frequency fingerprinting (RFF) authentication scheme is presented for Internet of things (IoT). RFF is a non …
Radio fingerprinting provides a reliable and energy-efficient IoT authentication strategy by leveraging the unique hardware-level imperfections imposed on the received wireless …
In this paper, a light-weight radio frequency fingerprinting identification (RFFID) scheme that combines with a two-layer model is proposed to realize authentications for a large number of …