2012 IEEE International Conference on Communications (ICC) 2012
DOI: 10.1109/icc.2012.6364039
|View full text |Cite
|
Sign up to set email alerts
|

WiMAX mobile subscriber verification using Gabor-based RF-DNA fingerprints

Abstract: Considerable effort has been put forth to exploit physical layer attributes to augment network bit-level security mechanisms. RF-DNA fingerprints possess such attributes and can be used to uniquely identify authorized users and mitigate unauthorized network activity. These attributes are unique to a given electronic device and difficult to replicate for cloning, spoofing, etc. Device discrimination (identification) of WiMAX devices has been successfully demonstrated using a one-to-many comparison against a poo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(24 citation statements)
references
References 16 publications
0
16
0
Order By: Relevance
“…And the future work could also focus on the method of extracting fingerprint and the classifier chosen. For example, recent researches took short-time Fourier transforms [22] and discrete Gabor transform [10] to generate RF-DNA fingerprint. Besides, some neural network model [17,20] could also be used as classifiers.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…And the future work could also focus on the method of extracting fingerprint and the classifier chosen. For example, recent researches took short-time Fourier transforms [22] and discrete Gabor transform [10] to generate RF-DNA fingerprint. Besides, some neural network model [17,20] could also be used as classifiers.…”
Section: Discussionmentioning
confidence: 99%
“…Firstly, research [2,6] enabled both identification and verification device issues and extended the process from the three-class to general N-class problems. By setting a priori distribution of multivariate Gaussian distribution, posteriori probability could be calculated [2,10] to achieve authentication simulation. Previous studies showed the impact on the number of dimensions [7,11] and the number of subregion [8] on classification accuracy.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…An approach to improve the security of data communication through a vulnerable network channel consists in defining RF Distinct Native Attributes (RF-DNA) features of hardware devices (PHY layers) [6], which are inherently unique for a given device [7]. In this paper, these RF-DNA features are analyzed and processed for the discrimination and rejection of spoofing devices.…”
Section: Introductionmentioning
confidence: 99%
“…On one hand, the statistical characteristics of the original RF signal, such as the high order spectrum, have been used as the features to identify different emitters [7,8]. On the other hand, the Time-Frequency Analysis (TFA) methods [9,10], Wavelet Transform (WT) [11,12], and Hilbert-Huang Transform (HHT) [13,14] are successively applied to extract the transform domain characteristics from the received RF signals. However, these methods have little knowledge of impairments inside the individual emitter, and the performance can be easily affected by the wireless channels.…”
Section: Introductionmentioning
confidence: 99%