Riyaz, 2018 - Google Patents
Radio Fingerprinting Using Convolutional Neural NetworksRiyaz, 2018
View PDF- Document ID
- 17279995202521227696
- Author
- Riyaz S
- Publication year
External Links
Snippet
In this thesis, we describe a method for uniquely identifying a specific radio among nominally similar devices using a combination of software defined radio (SDR) sensing capability and machine learning (ML) techniques. Our approach of radio fingerprinting …
- 230000001537 neural 0 title abstract description 24
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/26—Systems using multi-frequency codes
- H04L27/2601—Multicarrier modulation systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Riyaz et al. | Deep learning convolutional neural networks for radio identification | |
Sankhe et al. | ORACLE: Optimized radio classification through convolutional neural networks | |
Jagannath et al. | A comprehensive survey on radio frequency (RF) fingerprinting: Traditional approaches, deep learning, and open challenges | |
Yu et al. | A robust RF fingerprinting approach using multisampling convolutional neural network | |
Li et al. | A survey on deep learning techniques in wireless signal recognition | |
Rajendran et al. | Deep learning models for wireless signal classification with distributed low-cost spectrum sensors | |
Zhou et al. | A robust radio-frequency fingerprint extraction scheme for practical device recognition | |
Jafari et al. | IoT devices fingerprinting using deep learning | |
Davaslioglu et al. | DeepWiFi: Cognitive WiFi with deep learning | |
Bassey et al. | Intrusion detection for IoT devices based on RF fingerprinting using deep learning | |
Oyedare et al. | Estimating the required training dataset size for transmitter classification using deep learning | |
Agadakos et al. | Chameleons' oblivion: Complex-valued deep neural networks for protocol-agnostic RF device fingerprinting | |
Ayanoglu et al. | Machine learning in NextG networks via generative adversarial networks | |
Ponnusamy et al. | Primary user emulation attack mitigation using neural network | |
Furqan et al. | Primary user emulation and jamming attack detection in cognitive radio via sparse coding | |
Wu et al. | DSLN: Securing Internet of Things through RF fingerprint recognition in low-SNR settings | |
Rajendran et al. | Distributed deep learning models for wireless signal classification with low-cost spectrum sensors | |
Camelo et al. | A semi-supervised learning approach towards automatic wireless technology recognition | |
Saber et al. | Spectrum sensing for smart embedded devices in cognitive networks using machine learning algorithms | |
Zhang et al. | Modulated autocorrelation convolution networks for automatic modulation classification based on small sample set | |
Agadakos et al. | Deep complex networks for protocol-agnostic radio frequency device fingerprinting in the wild | |
Chen et al. | Generative adversarial network-based rogue device identification using differential constellation trace figure | |
Zeng et al. | Multi-channel attentive feature fusion for radio frequency fingerprinting | |
Shi et al. | Fedrfid: Federated learning for radio frequency fingerprint identification of wifi signals | |
Bouchenak et al. | A semi-supervised modulation identification in MIMO systems: A deep learning strategy |