基于射频指纹的移动设备认证方法研究

Xinghao Guo, Zhen Zhang, Jie Chang
{"title":"基于射频指纹的移动设备认证方法研究","authors":"Xinghao Guo, Zhen Zhang, Jie Chang","doi":"10.1109/infocomwkshps47286.2019.9093755","DOIUrl":null,"url":null,"abstract":"Radio frequency (RF) fingerprint is the physical layer nature of wireless communication devices. It is like different people have different fingerprints, different wireless devices also have different RF fingerprints, which can be used for identification and access authentication of wireless devices in mobile communication. This paper mainly reviews the research progress of RF fingerprint technology in the past ten years. According to the typical process of RF fingerprint authentication, the basic concept of RF fingerprint and the overall framework of identity authentication are introduced. Then, the paper expounds two kinds of RF fingerprint authentication models of \"1 to 1\" and \"1 to N\" respectively, and briefly describes its implementation process. Subsequently, this paper has reviewed the papers on RF fingerprint authentication in recent years, and we select representative papers for introduction. This paper also conducts experiments on 10 communication devices of the same model, and we divide them into legal devices and illegal devices. The RF fingerprint authentication model is used to classify legal devices and reject illegal devices.","PeriodicalId":321862,"journal":{"name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Survey of Mobile Device Authentication Methods Based on RF Fingerprint\",\"authors\":\"Xinghao Guo, Zhen Zhang, Jie Chang\",\"doi\":\"10.1109/infocomwkshps47286.2019.9093755\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Radio frequency (RF) fingerprint is the physical layer nature of wireless communication devices. It is like different people have different fingerprints, different wireless devices also have different RF fingerprints, which can be used for identification and access authentication of wireless devices in mobile communication. This paper mainly reviews the research progress of RF fingerprint technology in the past ten years. According to the typical process of RF fingerprint authentication, the basic concept of RF fingerprint and the overall framework of identity authentication are introduced. Then, the paper expounds two kinds of RF fingerprint authentication models of \\\"1 to 1\\\" and \\\"1 to N\\\" respectively, and briefly describes its implementation process. Subsequently, this paper has reviewed the papers on RF fingerprint authentication in recent years, and we select representative papers for introduction. This paper also conducts experiments on 10 communication devices of the same model, and we divide them into legal devices and illegal devices. The RF fingerprint authentication model is used to classify legal devices and reject illegal devices.\",\"PeriodicalId\":321862,\"journal\":{\"name\":\"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/infocomwkshps47286.2019.9093755\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/infocomwkshps47286.2019.9093755","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

射频(RF)指纹是无线通信设备的物理层特性。就像不同的人有不同的指纹一样,不同的无线设备也有不同的射频指纹,可以用于移动通信中无线设备的识别和接入认证。本文主要综述了近十年来射频指纹技术的研究进展。根据射频指纹认证的典型过程,介绍了射频指纹的基本概念和身份认证的总体框架。然后分别阐述了“1对1”和“1对N”两种射频指纹认证模型,并简要描述了其实现过程。随后,本文对近年来有关射频指纹认证的论文进行了综述,并选取了具有代表性的论文进行介绍。本文还对10台相同型号的通信设备进行了实验,并将其分为合法设备和非法设备。射频指纹认证模型用于对合法设备进行分类,对非法设备进行拒绝。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Survey of Mobile Device Authentication Methods Based on RF Fingerprint
Radio frequency (RF) fingerprint is the physical layer nature of wireless communication devices. It is like different people have different fingerprints, different wireless devices also have different RF fingerprints, which can be used for identification and access authentication of wireless devices in mobile communication. This paper mainly reviews the research progress of RF fingerprint technology in the past ten years. According to the typical process of RF fingerprint authentication, the basic concept of RF fingerprint and the overall framework of identity authentication are introduced. Then, the paper expounds two kinds of RF fingerprint authentication models of "1 to 1" and "1 to N" respectively, and briefly describes its implementation process. Subsequently, this paper has reviewed the papers on RF fingerprint authentication in recent years, and we select representative papers for introduction. This paper also conducts experiments on 10 communication devices of the same model, and we divide them into legal devices and illegal devices. The RF fingerprint authentication model is used to classify legal devices and reject illegal devices.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信