{"title":"用于无线电认证的与数据相关的发射机指纹","authors":"Attiya Mahmood, M. Jensen","doi":"10.1109/RWS.2014.6830127","DOIUrl":null,"url":null,"abstract":"In radio frequency fingerprinting, observations of the impact of unique imperfections in the transmitter circuitry on the transmitted waveform are used to identify the device from which the data was transmitted. While this technique can be used to authenticate radios accessing a secure network, the security of the authentication can be enhanced if the transmitter fingerprint changes based on the transmitted data. This paper uses simulations and measurements to examine the behavior of a data-dependent filter response designed for such an application. The results show that the circuit holds promise for providing a data-dependent fingerprint useful for device authentication.","PeriodicalId":247495,"journal":{"name":"2014 IEEE Radio and Wireless Symposium (RWS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Data-dependent transmitter fingerprints for radio authentication\",\"authors\":\"Attiya Mahmood, M. Jensen\",\"doi\":\"10.1109/RWS.2014.6830127\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In radio frequency fingerprinting, observations of the impact of unique imperfections in the transmitter circuitry on the transmitted waveform are used to identify the device from which the data was transmitted. While this technique can be used to authenticate radios accessing a secure network, the security of the authentication can be enhanced if the transmitter fingerprint changes based on the transmitted data. This paper uses simulations and measurements to examine the behavior of a data-dependent filter response designed for such an application. The results show that the circuit holds promise for providing a data-dependent fingerprint useful for device authentication.\",\"PeriodicalId\":247495,\"journal\":{\"name\":\"2014 IEEE Radio and Wireless Symposium (RWS)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE Radio and Wireless Symposium (RWS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RWS.2014.6830127\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Radio and Wireless Symposium (RWS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RWS.2014.6830127","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data-dependent transmitter fingerprints for radio authentication
In radio frequency fingerprinting, observations of the impact of unique imperfections in the transmitter circuitry on the transmitted waveform are used to identify the device from which the data was transmitted. While this technique can be used to authenticate radios accessing a secure network, the security of the authentication can be enhanced if the transmitter fingerprint changes based on the transmitted data. This paper uses simulations and measurements to examine the behavior of a data-dependent filter response designed for such an application. The results show that the circuit holds promise for providing a data-dependent fingerprint useful for device authentication.