2017
DOI: 10.1155/2017/1538728
|View full text |Cite
|
Sign up to set email alerts
|

Radio Frequency Fingerprint Extraction Based on Multidimension Permutation Entropy

Abstract: Radio frequency fingerprint (RF fingerprint) extraction is a technology that can identify the unique radio transmitter at the physical level, using only external feature measurements to match the feature library. RF fingerprint is the reflection of differences between hardware components of transmitters, and it contains rich nonlinear characteristics of internal components within transmitter. RF fingerprint technique has been widely applied to enhance the security of radio frequency communication. In this pape… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(29 citation statements)
references
References 12 publications
0
27
0
2
Order By: Relevance
“…The characteristics of entropy are frequently used features in RF fingerprint. For instance, the authors of [23] proposed recognition method of a new fingerprint established on multi-dimensional permutation entropy. According to this experiment, the transceiver distance is fixed to 10 meters, thus the signal can be propagated in the channel of short-wave line of sight.…”
Section: Rf Fingerprint Feature Extractionmentioning
confidence: 99%
“…The characteristics of entropy are frequently used features in RF fingerprint. For instance, the authors of [23] proposed recognition method of a new fingerprint established on multi-dimensional permutation entropy. According to this experiment, the transceiver distance is fixed to 10 meters, thus the signal can be propagated in the channel of short-wave line of sight.…”
Section: Rf Fingerprint Feature Extractionmentioning
confidence: 99%
“…Research has also been done in the field of radio identifications, for example in References [11][12][13]. The authors of Reference [11] study the hardware impairments and investigates the Convolutional Neural Networks (CNN).…”
Section: Related Work To Rffmentioning
confidence: 99%
“…The authors of Reference [11] study the hardware impairments and investigates the Convolutional Neural Networks (CNN). The authors of Reference [12] provide a tutorial of device fingerprinting in a wireless device context, while Reference [13] introduces Permutation Entropy (PE) methods to identify devices by evaluating the level of chaos in the received signals.…”
Section: Related Work To Rffmentioning
confidence: 99%
“…While the cross‐device uniqueness of electronic device fingerprints may not be totally on par with cross‐human fingerprint uniqueness, results such as provided in Deng et al (), Hall et al (), Huang and Zheng (); Lopez Jr. et al, ; Mirowski et al, ; Rehman et al, ; Reising et al, ; Rondeau et al, ; Suski et al, ; Talbot et al, ; Zhuo et al, ) routinely demonstrate near 100% discrimination for selected scenarios and have been sufficiently promising to sustain progressive RDD over the past 10 years. Collectively, these and other related RFF works have addressed nearly all common communication signaling schemes, including Bluetooth (Hall et al, ), automation (Lopez Jr. et al, ; Talbot et al, ) and ZigBee (Rondeau et al, ) Personal Area Networks (PANs); WiFi (Huang & Zheng, ; Rehman et al, ; Suski et al, ; Zhuo et al, ) Wireless Local Area Network (WLANs), and WiMAX (Deng et al, ; Reising et al, ) Wide Area Networks (WANs), to name a few. For the references provided, the unique RFF features have been reliably extracted from various signal domains, including (a) time (Deng et al, ; Hall et al, ; Lopez Jr. et al, ; Rehman et al, ; Suski et al, ), (b) frequency (Lopez Jr. et al, ; Suski et al, ; Talbot et al, ), (c) joint time–frequency (Reising et al, ; Zhuo et al, ), and (d) constellation (Huang & Zheng, ; Rondeau et al, ).…”
Section: Lowest‐layer Phymentioning
confidence: 99%
“…Collectively, these and other related RFF works have addressed nearly all common communication signaling schemes, including Bluetooth (Hall et al, ), automation (Lopez Jr. et al, ; Talbot et al, ) and ZigBee (Rondeau et al, ) Personal Area Networks (PANs); WiFi (Huang & Zheng, ; Rehman et al, ; Suski et al, ; Zhuo et al, ) Wireless Local Area Network (WLANs), and WiMAX (Deng et al, ; Reising et al, ) Wide Area Networks (WANs), to name a few. For the references provided, the unique RFF features have been reliably extracted from various signal domains, including (a) time (Deng et al, ; Hall et al, ; Lopez Jr. et al, ; Rehman et al, ; Suski et al, ), (b) frequency (Lopez Jr. et al, ; Suski et al, ; Talbot et al, ), (c) joint time–frequency (Reising et al, ; Zhuo et al, ), and (d) constellation (Huang & Zheng, ; Rondeau et al, ). A majority of RFF works available for forensic consideration are based on burst‐type communications, which when used for committing a cyberattack or electronic crime, may leave behind (1) only a single fingerprint—this may occur for a simple attack against a ZigBee control element that is designed to respond to a single command burst or (b) 10s–1000s of fingerprints—this may occur for a progressive multinode WiFi network attack with the actual number of fingerprints “left behind” by the perpetrator(s) depending on the extent and duration of the attack.…”
Section: Lowest‐layer Phymentioning
confidence: 99%