{"title":"Detecting Wireless Intrusions With RF Watermarks","authors":"J. Betances, Yousuke Z. Matsui","doi":"10.1109/NAECON46414.2019.9057818","DOIUrl":null,"url":null,"abstract":"Validation of devices at the physical layer can be accomplish with radio frequency (RF) watermarks to enhance wireless network security. For this application, RF watermarks are implemented as small signal offsets below the noise floor which are superimposed onto the signal transmitted from a wireless device. A receiver equipped to detect the offsets is then utilized to determine whether the anticipated RF watermarks are present in the received signal. Through this process, the integrity of the originally transmitted data is maintained while simultaneously validating the authenticity of the transmitting device.","PeriodicalId":193529,"journal":{"name":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE National Aerospace and Electronics Conference (NAECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON46414.2019.9057818","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Validation of devices at the physical layer can be accomplish with radio frequency (RF) watermarks to enhance wireless network security. For this application, RF watermarks are implemented as small signal offsets below the noise floor which are superimposed onto the signal transmitted from a wireless device. A receiver equipped to detect the offsets is then utilized to determine whether the anticipated RF watermarks are present in the received signal. Through this process, the integrity of the originally transmitted data is maintained while simultaneously validating the authenticity of the transmitting device.