2020 IEEE 21st International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) 2020
DOI: 10.1109/spawc48557.2020.9154254
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning Approaches for Open Set Wireless Transmitter Authorization

Abstract: Wireless signals contain transmitter specific features, which can be used to verify the identity of transmitters and assist in implementing an authentication and authorization system. Most recently, there has been wide interest in using deep learning for transmitter identification. However, the existing deep learning work has posed the problem as closed set classification, where a neural network classifies among a finite set of known transmitters. No matter how large this set is, it will not include all transm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 25 publications
0
1
0
Order By: Relevance
“…In reality, however, it is impossible to obtain all potential devices in advance when training a classifier since the number of devices in the system is unlikely to remain unchanged -a problem known as openset authentication [34]. An obvious solution is to retrain the classifier whenever a new device enters the system [35], [36]. While this approach is theoretically sound, it may incur huge system resources (e.g., time, energy) in a practical deployment.…”
Section: B Open-set Physical Layer Authenticationmentioning
confidence: 99%
“…In reality, however, it is impossible to obtain all potential devices in advance when training a classifier since the number of devices in the system is unlikely to remain unchanged -a problem known as openset authentication [34]. An obvious solution is to retrain the classifier whenever a new device enters the system [35], [36]. While this approach is theoretically sound, it may incur huge system resources (e.g., time, energy) in a practical deployment.…”
Section: B Open-set Physical Layer Authenticationmentioning
confidence: 99%