2010
DOI: 10.1007/978-3-642-17080-5_22
|View full text |Cite
|
Sign up to set email alerts
|

Steady State RF Fingerprinting for Identity Verification: One Class Classifier versus Customized Ensemble

Abstract: Abstract.Mobile phone proliferation and increasing broadband penetration presents the possibility of placing small cellular base stations within homes to act as local access points. This can potentially lead to a very large increase in authentication requests hitting the centralized authentication infrastructure unless access is mediated at a lower protocol level. A study was carried out to examine the effectiveness of using Support Vector Machines to accurately identify if a mobile phone should be allowed acc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…They compared the performance of one-class classifiers (OCC) and customized ensemble classifiers. However, the true negative rate and the true positive rate can not simultaneously reach a high level [23].…”
Section: Fingerprint Classification and Identificationmentioning
confidence: 99%
“…They compared the performance of one-class classifiers (OCC) and customized ensemble classifiers. However, the true negative rate and the true positive rate can not simultaneously reach a high level [23].…”
Section: Fingerprint Classification and Identificationmentioning
confidence: 99%
“…The FB technique extracts higher-order cumulants (HOC) and analyzed the features for each modulation scheme [5]. As a decision method, the modulation method is predicted by applying machine learning techniques such as SVM [6]. Wenwu et al [18] improves classification performance by constructing a deep belief neural network (DBN) based on a new feature parameter as the sixth-order cumulants of the extracted signal.…”
Section: Related Workmentioning
confidence: 99%
“…The expert features identify the signal type by finding repeated fundamental frequencies [4], [5]. Therefore, the machine learning techniques, such as support vector machine (SVM) and knearest neighbor (KNN), classify the modulation schemes using a combination of the extracted features [6]. However, the aforementioned methods degrade the classification accuracy due to the dynamic channel environment [7].…”
Section: Introductionmentioning
confidence: 99%
“…SVM-based ID verification, using RF fingerprints drawn from the preambles of the Random Access Channel (RACH) waveforms, of five 3GPP UMTS mobile radios is presented in [45]. For ID verification, SVM is employed using both a single and ensemble-based approach.…”
Section: Related Workmentioning
confidence: 99%
“…The flaw of radio classification has led to the proposal of a "one-to-one" comparison known as radio identity (ID) verification (a.k.a., authentication) [15], [30], [45]- [49], [51]- [54]. In radio ID verification the RF fingerprint(s) of the unknown radio are compared only to the stored reference model associated with the presented digital ID [49].…”
Section: Introductionmentioning
confidence: 99%