Identifying Wireless Users via Transmitter Imperfections

作者: Adam C. Polak , Sepideh Dolatshahi , Dennis L. Goeckel

DOI: 10.1109/JSAC.2011.110812

关键词:

摘要: … a modelbased approach, which uses statistical models of RF … the nonlinearities of power amplifiers, even these of the same … information theory, communication systems, systems biology, …

参考文章(15)
Jeyanthi Hall, Detection of rogue devices in wireless networks Carleton University. ,(2006)
Nur Serinken, Oktay Ureten, Bayesian detection of radio transmitter turn-on transients. NSIP. pp. 830- 834 ,(1999)
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis, Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. communications, internet, and information technology. pp. 201- 206 ,(2004)
Piet Wambacq, Willy M. Sansen, Distortion analysis of analog integrated circuits ,(1998)
A. Mehrnia, Optimum DAC resolution for WMAN, WLAN and WPAN OFDM-based standards international conference on consumer electronics. pp. 355- 356 ,(2005) , 10.1109/ICCE.2005.1429864
Zang Li, Wenyuan Xu, Rob Miller, Wade Trappe, Securing wireless systems via lower layer enforcements workshop on wireless security. pp. 33- 42 ,(2006) , 10.1145/1161289.1161297
A. Tomko, C. Rieser, L. Buell, Physical-Layer Intrusion Detection in Wireless Networks military communications conference. pp. 1040- 1046 ,(2006) , 10.1109/MILCOM.2006.302476
Georgi I. Radulov, Markus Heydenreich, Remco W. van der Hofstad, Johannes A. Hegt, Arthur H. M. van Roermund, Brownian-Bridge-Based Statistical Analysis of the DAC INL Caused by Current Mismatch IEEE Transactions on Circuits and Systems Ii-express Briefs. ,vol. 54, pp. 146- 150 ,(2007) , 10.1109/TCSII.2006.886900
T. Kohno, A. Broido, K.C. Claffy, Remote physical device fingerprinting IEEE Transactions on Dependable and Secure Computing. ,vol. 2, pp. 93- 108 ,(2005) , 10.1109/TDSC.2005.26
Liang Xiao, L.J. Greenstein, N.B. Mandayam, W. Trappe, Channel-Based Detection of Sybil Attacks in Wireless Networks IEEE Transactions on Information Forensics and Security. ,vol. 4, pp. 492- 503 ,(2009) , 10.1109/TIFS.2009.2026454