2016
DOI: 10.1109/tifs.2016.2552146
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Physical-Layer Identification: Modeling and Validation

Abstract: Abstract-The wireless physical-layer identification (WPLI) techniques utilize the unique features of the physical waveforms of wireless signals to identify and classify authorized devices. As the inherent physical layer features are difficult to forge, WPLI is deemed as a promising technique for wireless security solutions. However, as of today it still remains unclear whether existing WPLI techniques can be applied under real-world requirements and constraints. In this paper, through both theoretical modeling… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
72
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 184 publications
(81 citation statements)
references
References 38 publications
0
72
0
Order By: Relevance
“…The imperfections that enable this differentiation between transmitters arise from clock jitter, digital to analog converters, sampling errors, mixers or local frequency synthesizers, power amplifiers' non-linearity, device antennas, etc. The power amplifier's non-linearity is considered as the most significant source of differences [1].…”
Section: Introductionmentioning
confidence: 99%
“…The imperfections that enable this differentiation between transmitters arise from clock jitter, digital to analog converters, sampling errors, mixers or local frequency synthesizers, power amplifiers' non-linearity, device antennas, etc. The power amplifier's non-linearity is considered as the most significant source of differences [1].…”
Section: Introductionmentioning
confidence: 99%
“…• C3. In practical wireless communication, the typical authentication schemes rely on nonlinear techniques, as exemplified by the binary hypothesis tests of [13]- [15] and by the generalized likelihood ratio test of [12];…”
Section: B Challenges For Physical Layer Authenticationmentioning
confidence: 99%
“…In practical scenarios as the one investigated in this paper in Section 4, these conditions are usually not met because a privacy attacker could be obliged to use less expensive equipment (like an Universal Software Radio Platform (USRP) Software Defined Radio (SDR)) and it would be subject to attenuation and fading effects because the DSRC signals must be tracked at a distance. Note that some papers have investigated the impact of White Gaussian Noise on the RF fingerprinting in a simulated way but not fading effects apart from the recent paper of [12] where a fading model has been applied but not to DSRC devices. As a consequence, a novel aspect of this paper is the application of fading models to RF fingerprinting for DSRC devices.…”
Section: Related Workmentioning
confidence: 99%