2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers 2010
DOI: 10.1109/acssc.2010.5757798
|View full text |Cite
|
Sign up to set email alerts
|

Identification of wireless users via power amplifier imperfections

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 24 publications
(18 citation statements)
references
References 4 publications
0
18
0
Order By: Relevance
“…When such a distortion is employed, the correctly detected data symbols, chosen at the receiver as elements of the constellation, differ from the symbols at the transmitter directly before the pulse-shaping and the exposure to the PA nonlinearities. This intentional distortion, while causing only slight signal quality degradation (see SectionV), causes significant degradation of the identification methods from [1] and [2], which makes the attack very attractive for the strong adversary. In particular, in [1] and [2] we assumed that for the PA, which dominates the transmitter's nonlinearity, the input samples are accessible, as they can be reconstructed from the correctly decoded data at the receiver if the rest of the transmitter chain is assumed linear.…”
Section: Problem Statementmentioning
confidence: 99%
See 4 more Smart Citations
“…When such a distortion is employed, the correctly detected data symbols, chosen at the receiver as elements of the constellation, differ from the symbols at the transmitter directly before the pulse-shaping and the exposure to the PA nonlinearities. This intentional distortion, while causing only slight signal quality degradation (see SectionV), causes significant degradation of the identification methods from [1] and [2], which makes the attack very attractive for the strong adversary. In particular, in [1] and [2] we assumed that for the PA, which dominates the transmitter's nonlinearity, the input samples are accessible, as they can be reconstructed from the correctly decoded data at the receiver if the rest of the transmitter chain is assumed linear.…”
Section: Problem Statementmentioning
confidence: 99%
“…Exploitation of imperfections of hardware caused by inaccuracies of production processes is especially attractive for identification purposes, because it makes identification independent from the location of wireless users, as opposed to the methods based on channel properties [6]- [9] that require a strong assumption on users' stationarity. Physical-layer identification techniques that exploit hardware imperfections can generally be divided into two groups: transient signal techniques [10]- [17] and steady state signal techniques [1], [2], [18]- [21]. A transient is a radio emission generated while the power of the output of an radio frequency (RF) transmitter goes from zero to the level required for data communication.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations