2023
DOI: 10.1109/tmtt.2022.3223122
|View full text |Cite
|
Sign up to set email alerts
|

Rigorous Analysis of Data Orthogonalization for Self-Organizing Maps in Machine Learning Cyber Intrusion Detection for LoRa Sensors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 42 publications
(64 reference statements)
0
0
0
Order By: Relevance
“…Machine learning (ML) enabled RF fingerprinting has emerged as one of the most effective approaches for device authentication and RF cyber-physical security enhancement [5], [6]. Specifically, raw in-phase/quadrature (I/Q) samples derived after the down-conversion/heterodyning of an RF waveform can be applied to a convolutional neural network (CNN) for the purposes of classifying modulation schemes and radio identification.…”
Section: Rf Fingerprintingmentioning
confidence: 99%
See 3 more Smart Citations
“…Machine learning (ML) enabled RF fingerprinting has emerged as one of the most effective approaches for device authentication and RF cyber-physical security enhancement [5], [6]. Specifically, raw in-phase/quadrature (I/Q) samples derived after the down-conversion/heterodyning of an RF waveform can be applied to a convolutional neural network (CNN) for the purposes of classifying modulation schemes and radio identification.…”
Section: Rf Fingerprintingmentioning
confidence: 99%
“…One of the crucial requirements before applying data sets for RF fingerprinting assisted IoT device authentication is to understand of the attributes of the data set at hand, especially the correlation among I/Q samples. Failure to do so could result in inaccurate analytics [5], [6]. For example, the high correlation between the raw data sets of LoRa I/Q vectors is one of the most compelling factors facilitating the effective cyber intrusion by rogue devices when spoofing on LoRa waveforms.…”
Section: Testbed Configuration and Data Set Collectionmentioning
confidence: 99%
See 2 more Smart Citations
“…There are many personal data in these data, such as blood pressure, pulse, electrocardiograms, place environment data, area humidity, room temperature, etc. Another authentication scenario is to consider the types of entities involved in the remote client and server scenarios [13]. Clients want to access servers' services.…”
Section: Introductionmentioning
confidence: 99%