2020 International Conference on Wireless Communications and Signal Processing (WCSP) 2020
DOI: 10.1109/wcsp49889.2020.9299859
|View full text |Cite
|
Sign up to set email alerts
|

Radio Frequency Fingerprint Based Wireless Transmitter Identification Against Malicious Attacker: An Adversarial Learning Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Extensive simulations then demonstrate that the proposed GAN can help to avoid complex jamming attacks and outperform conventional DRLbased approaches with incomplete spectrum information. The lack of training data problem of conventional physical layer security approaches is also discussed and addressed by using GAN in [81], [91], [85], and [92].…”
Section: Channel Equalizationmentioning
confidence: 99%
“…Extensive simulations then demonstrate that the proposed GAN can help to avoid complex jamming attacks and outperform conventional DRLbased approaches with incomplete spectrum information. The lack of training data problem of conventional physical layer security approaches is also discussed and addressed by using GAN in [81], [91], [85], and [92].…”
Section: Channel Equalizationmentioning
confidence: 99%
“…SEI processes can be assigned to two general categories, which are designated here as (i) constellation-based and (ii) signal-based. Constellation-based SEI processes extract discriminatory emitter features (e.g., phase and amplitude shifts from the ideal point) from an individual constellation point, collection of constellation points, or distributions associated with the employed digital modulation scheme's two-dimensional, complex plane scatter diagram [98,[108][109][110]. A digital modulation scheme's constellation is a byproduct of the demodulation process, and its corresponding points are generated by sampling each signal symbol at a specific time.…”
Section: The Essence Of Specific Emitter Identificationmentioning
confidence: 99%
“…Traditionally, SEI research has assumed the exploited features are difficult to mimic [53,[81][82][83]110] and the emitter being identified is passive or benign. However, the works reviewed in this section indicate that this is no longer the case and that ongoing SEI research must consider and contend with strong adversaries.…”
Section: Technical Gaps-threats To Seimentioning
confidence: 99%
“…Most SEI research assumes the identified emitters are passive and their identifying features immutable and difficult to mimic, which suggests they are reluctant and incapable of developing and implementing effective SEI countermeasures [3,4]. However, when considering DL's ability to learn emitter-specific features directly from the raw IQ signal samples and coupling it with readily available "off-the-shelf" DL architectures and the flexibility of Software-Defined Radio (SDR), one must reconsider the degree to which these assumptions hold true [5,6].…”
Section: Introductionmentioning
confidence: 99%