RF impairment model-based IoT physical-layer identification for enhanced domain generalization

S Rajendran, Z Sun - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
For small, inexpensive, and power-constrained IoT devices, Radiofrequency fingerprinting
(RF-fingerprinting) has emerged as a cost-effective security solution. Robustness and …

Radio-frequency fingerprint extraction based on feature inhomogeneity

L Sun, X Wang, Z Huang, B Li - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
With the popularization of the Internet of Things (IoT), its security has become increasingly
prominent. Radio-frequency fingerprinting (RFF) is a promising approach to identify a …

Effect of plastic surgery on face recognition: A preliminary study

R Singh, M Vatsa, A Noore - 2009 IEEE Computer Society …, 2009 - ieeexplore.ieee.org
Variations in pose, expression, illumination, aging and disguise are considered as major
challenges in face recognition and several techniques have been proposed to address …

Reliable digital forensics in the air: Exploring an RF-based drone identification system

Z Li, B Chen, X Chen, C Xu, Y Chen, F Lin… - Proceedings of the …, 2022 - dl.acm.org
As the drone becomes widespread in numerous crucial applications with many powerful
functionalities (eg, reconnaissance and mechanical trigger), there are increasing cases …

Accelerometer-based joint user-device clone-resistant identity

S Mulhem, A Abadleh, W Adi - 2018 Second World Conference …, 2018 - ieeexplore.ieee.org
Unclonable identity, Security, and privacy issues are becoming fundamental requirements
for most smart application environment. Recently, several state-of-the-art approaches have …

Toward hardware-rooted smartphone authentication

K Ren, Z Qin, Z Ba - IEEE Wireless Communications, 2019 - ieeexplore.ieee.org
In recent years, an enormous amount of research has been carried out in an attempt to
identify smartphones through modeling the manufacturing imperfections of their built-in …

Antenna additively manufactured engineered fingerprinting for physical-layer security enhancement for wireless communications

N Miguélez-Gómez… - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Physical layer security is increasingly being exploited as a technique to enhance the
security of wireless communications. Well-known hardware security techniques leverage …

Behavior modeling and individual recognition of sonar transmitter for secure communication in UASNs

F Shi, Z Chen, X Cheng - IEEE Access, 2019 - ieeexplore.ieee.org
It is necessary to improve the safety of the underwater acoustic sensor networks (UASNs)
since it is mostly used in the military industry. Specific emitter identification is the process of …

Influence of axial mechanical stress on the magnetic properties of non-oriented electrical steel

G Von Pfingsten, K Hameyer… - 2016 6th international …, 2016 - ieeexplore.ieee.org
Axial mechanical stress on electrical steel significantly affects the magnetic properties of
electric steel. The magnetizability is reduced and the losses are increased. In electrical …

User capacity of wireless physical-layer identification

W Wang, Z Sun, K Ren, B Zhu - IEEE Access, 2017 - ieeexplore.ieee.org
A wireless physical layer identification (WPLI) system aims at identifying or classifying
authorized devices of different users based on the unique radio frequency fingerprints …