2019
DOI: 10.1109/jiot.2019.2908759
|View full text |Cite
|
Sign up to set email alerts
|

Groundwork for Neural Network-Based Specific Emitter Identification Authentication for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 84 publications
(40 citation statements)
references
References 56 publications
0
29
0
Order By: Relevance
“…Recently, in order to further improve the authentication rate of RFFID, machine learning method is taken as a recognition algorithm [27,28,29]. However, this method consumes resources in offline samples learning due to a large number of samples training required to ensure the authentication effect.…”
Section: Background Of Rffid-mecmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, in order to further improve the authentication rate of RFFID, machine learning method is taken as a recognition algorithm [27,28,29]. However, this method consumes resources in offline samples learning due to a large number of samples training required to ensure the authentication effect.…”
Section: Background Of Rffid-mecmentioning
confidence: 99%
“…Hall et al [23] and Ureten et al [25,26] used RF fingerprinting technology to achieve wireless positioning and access control for wireless network. In order to further improve the authentication rate of RFFID, a machine learning algorithm has been introduced in extensive research as the classification algorithm of RFFID [27,28,29]. However, a machine learning algorithm needs a certain amount of computing resources to ensure a higher recognition and authentication rate.…”
Section: Introductionmentioning
confidence: 99%
“…The DL in IOT helps in predicting future insights, discovering new information, and taking control actions in the IOT to make it worthy for business and to improve the quality of the technology. In McGinthy et al, the difficulty in the proper trusting and the authenticating of the sensed information in the internet of things is carefully addressed using the machine learning techniques. The convolution neural network is presented in this method to secure the sensed information's with much low latency in the resource rich and the resource constrained devices.…”
Section: Related Workmentioning
confidence: 99%
“…Then, the fingerprint feature is extracted to obtain the fine features containing the individual information of the emitter; finally, compared with the database, the specific emitter of the signal is determined by the classification and recognition algorithm, and the individual emitter is identified. In recent years, the theory and practical application of emitter individual identification technology are constantly improved, and the research of fingerprint feature extraction method has made great progress [4][5][6][7][8][9][10][11][12][13][14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%