2021
DOI: 10.1109/access.2021.3114191
|View full text |Cite
|
Sign up to set email alerts
|

Differential Complex-Valued Convolutional Neural Network-Based Individual Recognition of Communication Radiation Sources

Abstract: Data assaults from unauthorized access to the Internet of Things will induce severe intrusion and hazard to the whole network. Employing only traditional application layer password authentication approaches cannot guarantee the security of the communication system. Therefore, it is critical to develop a capable and efficient radio frequency fingerprints based physical layer authentication system. To incorporate the domain knowledge in more capable feature extracting and reduce information loss caused by conver… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…When extracting steady-state features, sample fragments need to have a long duration. The transmitter needs to extract a large amount of RF information, which can be extracted in time domain, frequency domain, and transform domain [8], such as frequency features obtained through Empirical Mode Decomposition (EMD) [9], fractal features, high-order cumulants of signals nonlinear characteristics of power amplifier, I/Q offset characteristics [10], etc.…”
Section: A Features Extractionmentioning
confidence: 99%
“…When extracting steady-state features, sample fragments need to have a long duration. The transmitter needs to extract a large amount of RF information, which can be extracted in time domain, frequency domain, and transform domain [8], such as frequency features obtained through Empirical Mode Decomposition (EMD) [9], fractal features, high-order cumulants of signals nonlinear characteristics of power amplifier, I/Q offset characteristics [10], etc.…”
Section: A Features Extractionmentioning
confidence: 99%
“…Xie Cunxiang et al [5] established a model integrating Hilbert-Huang transform and adversarial training in the research process, which can achieve good recognition results even when the training samples are small. Qu Lingzhi et al [6] proposed a communication radiation source identification method by embedding a double-layer attention mechanism in the residual network, which improved the recognition accuracy and stability. In literature [7] , the network is first trained on labeled samples, and then semi-supervised learning is used to detect unlabeled samples and automatically label new samples, thus realizing dynamic identification of individual unknown radiation sources.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, machine learning (ML) has been applied in the field of signal processing, including signal modulation pattern recognition [13][14][15][16], CRS individual recognition [17][18][19], communication specific signal type recognition [20,21], and other fields, and a series of achievements have been achieved. However, research on CRS behavior recognition is still in the beginning stage.…”
Section: Introductionmentioning
confidence: 99%