收稿日期: 2015-03-04
网络出版日期: 2017-06-30
基金资助
国家自然科学基金重点项目面上资助项目(61171086); 上海大学创新基金资助项目(sdcx2012041)
RF fingerprinting identification with feature fusion
Received date: 2015-03-04
Online published: 2017-06-30
刘燕平, 田金鹏, 陈泳 . 特征融合的射频指纹识别方法[J]. 上海大学学报(自然科学版), 2017 , 23(3) : 408 -413 . DOI: 10.12066/j.issn.1007-2861.1624
Considering the intra-robustness and inter-difference of transmitters in a radio frequency fingerprinting (RFF) identification system, this paper fuses the second-order spectra, i.e., power spectral density and cross-power spectral density of signals as fingerprints, and uses a radial basis probabilistic neural network as the classifier. The classification performance of the wireless network in two different series has been evaluated in simulation experiments. Compared with other feature extraction methods and classifiers, it is demonstrated that accuracy of the proposed method makes a great improvement.
[1] 袁红林, 胡爱群, 陈开志. 射频指纹的唯一性研究[J]. 应用科学学报, 2009, 27(1): 1-5.
[2] 周洁, 石志东, 张震, 等. WSN中一种基于LEACH协议的改进算法[J]. 上海大学学报(自然科学版), 2013, 19(2): 116-119.
[3] Harmer P K, Reising D R, Temple M A. Classification selection for physical layer security augmentation in cognitive radio networks [C]// IEEE International Conference on Communications. 2013: 2846-2851.
[4] Norman J, Joseph P. Secure neighbour authentication in wireless sensor networks [C]// 2011 2nd International Conference on Wireless Communication. 2011: 1-4.
[5] Shiu Y S, Chang S Y, Wu H C, et al. Physical layer security in wireless networks: a tutorial [J]. IEEE Wireless Communications, 2011, 18(2): 66-74.
[6] Lakafosis V, Traille A, Lee H, et al. RF fingerprinting physical objects for anticounterfeiting applications [J]. IEEE Transactions on Microwave Theory and Techniques, 2011, 59(2): 504-514.
[7] Hall J. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting[C]// Lasted International Conference on Communications. 2004: 201-206.
[8] Ureten O, Serinken N. Wireless security through RF fingerprinting [J]. Canadian Journal of Electrical and Computer Engineering, 2007, 32(1): 27-33.
[9] Afolaolabi O R, Kim K, Ahmad A. On secure spectrum sensing in cognitive radio networks using emitters electromagnetic signature [C]// 2009 Proceedings of 18th International Conference on Computer Communications and Networks. 2009: 1-5.
[10] 李文龙, 梁涛, 许金勇. 跳频通信中的射频指纹识别技术[J]. 解放军理工大学学报(自然科学版), 2009, 10(S1): 1-5.
[11] Knox D A, Kunz T. Practical RF fingerprints for wireless sensor network authentication [C]//2012 8th International Wireless Communications and Mobile Computing Conference. 2012: 531-536.
[12] Ur R S, Sowerby K, Coghill C. RF fingerprint extraction from the energy envelope of an instantaneous transient signal [C]// 2012 Australian Communications Theory Workshop. 2012:
90-95.
[13] Huang L F, Wu X P, Zhao C D, et al. Identification of radio transmitters fingerprint based on curve fitting [C]// 2013 IEEE International Conference on Signal Processing, Communication and Computing. 2013: 1-5.
[14] 梁江海, 黄知涛, 袁英俊, 等. 一种基于经验模态分解的通信辐射源个体识别方法[J]. 中国电子科学研究院学报, 2013, 8(4): 393-398.
[15] 袁红林, 包志华, 严燕. 基于对数谱射频指纹的RFID系统信息监测方法[J]. 通信学报, 2014, 35(7): 86-93.
[16] Padilla J L, Padilla P, Valenzuela-Valds J F. RF fingerprint measurements for the identification of devices in wireless communication networks based on feature reduction and subspace transformation [J]. Measurement, 2014, 58: 468-475.
/
| 〈 |
|
〉 |