DOI: 10.22215/etd/2013-09502
|View full text |Cite
|
Sign up to set email alerts
|

Measuring wireless fingerprints inside a wireless sensor network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 35 publications
(41 reference statements)
0
3
0
Order By: Relevance
“…In other work [Knox 2013], we use statistical analysis techniques to study the independence of classification errors made by different receivers. We show that the classification errors made by different receivers for the same message are statistically independent.…”
Section: Experimental Results: Performance Variationmentioning
confidence: 99%
See 1 more Smart Citation
“…In other work [Knox 2013], we use statistical analysis techniques to study the independence of classification errors made by different receivers. We show that the classification errors made by different receivers for the same message are statistically independent.…”
Section: Experimental Results: Performance Variationmentioning
confidence: 99%
“…The basic code structure is shown in Figure 6. A detailed analysis of the processing overhead and processing complexity of the code is given in Knox [2013].…”
Section: Experimental Platform (Ettus Research Inc Usrp1)mentioning
confidence: 99%
“…Hall et al 2 used frequency and amplitude information to create hardware fingerprints from ten different transient features to identify WLAN.Suski and other scholars extracted the power spectral density of the preamble signal transmitted by the wireless device terminal in the literature 3 . Afolabi et al used a simulation model and extracted six features from the preprocessed transient signal by using amplitude, phase and frequency curves to form a hardware fingerprint 4 .Knox et al extracted the phase information in the baseband signal transmitted by the wireless device terminal as the hardware fingerprint feature to identify the transmitter 5 . In addition, ROBYNS et al uses support vector machines, multilayer perceptrons and convolutional neural networks to identify each RF symbol of the signal frame, thus identifying 22 LoRa devices of three types 6 .…”
Section: Introductionmentioning
confidence: 99%