2022
DOI: 10.1109/lnet.2022.3167665
|View full text |Cite
|
Sign up to set email alerts
|

RF Fingerprinting-Based IoT Node Authentication Using Mahalanobis Distance Correlation Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…As the sampling frequency of PMU is not synchronous with SCADA data, so it is necessary to unify the two types of data under the same snapshot when combining them [17] . In this paper, the calculation method of optimal buffer length for PMU is used based on Mahalanobis distance [21]- [22] . All PMU measurement points are treated as a whole, so that the buffer length of each PMU measurement point is the same.…”
Section: Bthe Optimal Buffer Length Calculation Methods Based On the ...mentioning
confidence: 99%
“…As the sampling frequency of PMU is not synchronous with SCADA data, so it is necessary to unify the two types of data under the same snapshot when combining them [17] . In this paper, the calculation method of optimal buffer length for PMU is used based on Mahalanobis distance [21]- [22] . All PMU measurement points are treated as a whole, so that the buffer length of each PMU measurement point is the same.…”
Section: Bthe Optimal Buffer Length Calculation Methods Based On the ...mentioning
confidence: 99%
“…Anomaly detection has been addressed using different approaches namely multivariate statistical methods (e.g., Hoteling, Mahalanobis distance) [29], [30], variational autoencoders (VAE) [31], [32], Bayesian neural networks (BNN) [33], [34], ensemble learning [17], [35], among others. An extensive survey of the different methods for anomaly detection is found in [36].…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…Sun et al [29] propose using a confidence region to diagnose heart diseases using a Gaussian mixture model and the Mahalanobis distance. Nguyen et al [30] use the Mahalanobis distance and Chi-square distribution for IoT node authentication by setting a cut-off value in the Chi-square distribution to identify non-legitimate nodes. Cao et al [12] propose using clustering, a sub-region CVA, and Hoteling to identify faults.…”
Section: Anomaly Detectionmentioning
confidence: 99%
“…Considering the open nature of wireless vehicular communication, VANETs are susceptible to passive and active attacks such as interception, fabrication, and modification [3]. These attacks can be avoided by authenticating the received message to determine the legitimacy of the sender [4]. Generally, a VANET architecture involves a trusted authority (TA), roadside units (RSUs), and vehicles' wireless communication devices known as "onboard units" (OBUs) [3].…”
Section: Introductionmentioning
confidence: 99%