2021
DOI: 10.1109/tccn.2020.3043332
|View full text |Cite
|
Sign up to set email alerts
|

Open Set Wireless Transmitter Authorization: Deep Learning Approaches and Dataset Considerations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
26
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 66 publications
(26 citation statements)
references
References 46 publications
0
26
0
Order By: Relevance
“…Having many transmitters can enable using more practical formulations of the problem. For instance, instead of classifying among a closed set of known transmitters, open set recognition enables rejecting unauthorized transmitters unseen in training [12]. The challenge in developing these systems is that different Tx are needed for training and testing, as unauthorized transmitters cannot be exposed during training.…”
Section: Impact Of Number Of Transmittersmentioning
confidence: 99%
See 1 more Smart Citation
“…Having many transmitters can enable using more practical formulations of the problem. For instance, instead of classifying among a closed set of known transmitters, open set recognition enables rejecting unauthorized transmitters unseen in training [12]. The challenge in developing these systems is that different Tx are needed for training and testing, as unauthorized transmitters cannot be exposed during training.…”
Section: Impact Of Number Of Transmittersmentioning
confidence: 99%
“…This dataset was used by many works [1], [10], [11]; however, it is not publicly accessible. In our previous work [12], we considered a WiFi dataset using 163 WiFi transmitters captured in the Orbit testbed [13], but it only considered one receiver. The previously discussed datasets are summarized in Table 1.…”
mentioning
confidence: 99%
“…In reality, however, it is impossible to obtain all potential devices in advance when training a classifier since the number of devices in the system is unlikely to remain unchanged -a problem known as openset authentication [34]. An obvious solution is to retrain the classifier whenever a new device enters the system [35], [36]. While this approach is theoretically sound, it may incur huge system resources (e.g., time, energy) in a practical deployment.…”
Section: B Open-set Physical Layer Authenticationmentioning
confidence: 99%
“…This dataset was used by many works [1], [10], [11]; however, it is not publicly accessible. In our previous work [12], we considered a WiFi dataset using 163 WiFi transmitters captured in the Orbit testbed [13], but it only considered one receiver.…”
Section: Introductionmentioning
confidence: 99%