2018
DOI: 10.1016/j.cose.2017.10.001
|View full text |Cite
|
Sign up to set email alerts
|

Detecting rogue attacks on commercial wireless Insteon home automation systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 23 publications
(33 citation statements)
references
References 4 publications
0
31
0
1
Order By: Relevance
“…TD-DNA Fingerprinting utilizes various machine learning algorithms and concepts such as feature selection via DRA which has been the subject of prior related works [9,18,28]. The demonstration here focuses on examining DRA methods for use with an MDA/ML classifier, given the MDA/ML classification process has been shown to be computationally efficient while reliably discriminating IIoT signals [9,13].…”
Section: Td-dna Fingerprintingmentioning
confidence: 99%
See 3 more Smart Citations
“…TD-DNA Fingerprinting utilizes various machine learning algorithms and concepts such as feature selection via DRA which has been the subject of prior related works [9,18,28]. The demonstration here focuses on examining DRA methods for use with an MDA/ML classifier, given the MDA/ML classification process has been shown to be computationally efficient while reliably discriminating IIoT signals [9,13].…”
Section: Td-dna Fingerprintingmentioning
confidence: 99%
“…Results here are based on TD-DNA fingerprints generated from WirelessHART burst preamble responses and are generated using a methodology consistent with prior related works [9][10][11][12][13][14][15][16][17][18]. The instantaneous amplitude (AMP), phase (PHZ), and frequency (FRQ) responses of the PreAmbRgn ROI are divided into NR = 26 subregions.…”
Section: Td-dna Fingerprintingmentioning
confidence: 99%
See 2 more Smart Citations
“…While the cross‐device uniqueness of electronic device fingerprints may not be totally on par with cross‐human fingerprint uniqueness, results such as provided in Deng et al (), Hall et al (), Huang and Zheng (); Lopez Jr. et al, ; Mirowski et al, ; Rehman et al, ; Reising et al, ; Rondeau et al, ; Suski et al, ; Talbot et al, ; Zhuo et al, ) routinely demonstrate near 100% discrimination for selected scenarios and have been sufficiently promising to sustain progressive RDD over the past 10 years. Collectively, these and other related RFF works have addressed nearly all common communication signaling schemes, including Bluetooth (Hall et al, ), automation (Lopez Jr. et al, ; Talbot et al, ) and ZigBee (Rondeau et al, ) Personal Area Networks (PANs); WiFi (Huang & Zheng, ; Rehman et al, ; Suski et al, ; Zhuo et al, ) Wireless Local Area Network (WLANs), and WiMAX (Deng et al, ; Reising et al, ) Wide Area Networks (WANs), to name a few. For the references provided, the unique RFF features have been reliably extracted from various signal domains, including (a) time (Deng et al, ; Hall et al, ; Lopez Jr. et al, ; Rehman et al, ; Suski et al, ), (b) frequency (Lopez Jr. et al, ; Suski et al, ; Talbot et al, ), (c) joint time–frequency (Reising et al, ; Zhuo et al, ), and (d) constellation (Huang & Zheng, ; Rondeau et al, ).…”
Section: Lowest‐layer Phymentioning
confidence: 99%