2014
DOI: 10.1049/iet-com.2013.0568
|View full text |Cite
|
Sign up to set email alerts
|

Radio‐frequency fingerprinting for mitigating primary user emulation attack in low‐end cognitive radios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 53 publications
(40 citation statements)
references
References 46 publications
0
40
0
Order By: Relevance
“…We used a fixed power in the experiments because the connection present fails when the power is variable and the location is dynamic. The experiments focus on selfish attack, because the malicious can be seen as a jammer [14,15]. A USRP is used for the PUE network due to the sensing and transmission capabilities.…”
Section: Primary User Emulation Attackmentioning
confidence: 99%
“…We used a fixed power in the experiments because the connection present fails when the power is variable and the location is dynamic. The experiments focus on selfish attack, because the malicious can be seen as a jammer [14,15]. A USRP is used for the PUE network due to the sensing and transmission capabilities.…”
Section: Primary User Emulation Attackmentioning
confidence: 99%
“…In other words, the RF fingerprints collected with one receiver cannot be used to track a wireless device using another receiver. As described in [13], these differences impact the identification or the verification accuracy not only when receivers with different quality are used (high-end receiver and low-end receivers) but also across receivers of the similar quality. This is still an open research problem at the time of writing this paper.…”
Section: Related Workmentioning
confidence: 99%
“…All the values are assigned randomly using a uniform distribution from the given range. The collected signals from our previous work [5] were passed through a simulated multipath channel and its effect on the performance of RF fingerprinting was analyzed. We have used seven similar transmitter and receivers for collecting the signals but results are shown for one receiver only 1 .…”
Section: Channelmentioning
confidence: 99%