2004
DOI: 10.1109/tbc.2004.834027
|View full text |Cite
|
Sign up to set email alerts
|

Transmitter Identification Using Embedded Pseudo Random Sequences

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
69
0
1

Year Published

2007
2007
2015
2015

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 125 publications
(70 citation statements)
references
References 4 publications
0
69
0
1
Order By: Relevance
“…If we assume the elements of to be independent Rayleigh block-stationary and quasi-static, then in (3) remains constant over the entire TFB for a total of symbols. Similarly, if the fingerprinting function is also designed to be block-stationary, then (4) can be written as (6) where , , is the fingerprinting function applied to the entire TFB, and is the block-stationary channel response experienced by the received TFB, . We construct as a composite signal composed of two components: the user-data signal and the embedded preamble and pilot signals used for channel estimation and equalization.…”
Section: System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…If we assume the elements of to be independent Rayleigh block-stationary and quasi-static, then in (3) remains constant over the entire TFB for a total of symbols. Similarly, if the fingerprinting function is also designed to be block-stationary, then (4) can be written as (6) where , , is the fingerprinting function applied to the entire TFB, and is the block-stationary channel response experienced by the received TFB, . We construct as a composite signal composed of two components: the user-data signal and the embedded preamble and pilot signals used for channel estimation and equalization.…”
Section: System Modelmentioning
confidence: 99%
“…In the simulation in Section V, we will use a time-multiplexed (TM) single symbol preamble structure [15], which is given as (9) where and are the identity matrix and the zero matrix, respectively, with dimensionality denoted in the superscript . The expanded form of the TFB signal at the receiver (4), using (3), (6), and (7), becomes (10) where is the aggregate channel-like distortion.…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, Kleider et al [9] proposed a scheme where a low-power watermark signal is added to the data signal with spread-spectrum techniques. Wang et al [10] proposed a scheme for broadcast television where each transmitter adds a unique low-power signal to its transmissions in order to prove its identity to the receivers. The transparent transmission of data may also be realized by using multiresolution transmissions, where varying levels of protection are guaranteed for multiple data streams [11]- [13].…”
Section: Introductionmentioning
confidence: 99%
“…A number of PHY-layer fingerprinting approaches for wireless digital communications have been investigated, using basic blind signal superposition methods. In [7] the superposition of low-power pseudo random sequences on digital television transmissions is discussed. In [8] and in [9] multiresolution approaches are considered for narrowband signals, where a low-power fingerprint constellation is superimposed onto the main signal constellation.…”
mentioning
confidence: 99%