Abstract—Physical-layer identification utilizes unique features of wireless devices as their fingerprints, providing authentic-ity and security guarantee. Prior physical-layer identification techniques on RFID tags require non-generic equipments and are not fully compatible with existing standards. In this pa-per, we propose a novel physical-layer identification system, GenePrint, for UHF passive tags. The GenePrint prototype system is implemented by a commercial reader, a USRP-based monitor, and off-the-shelf UHF passive tags. Our solution is generic and completely compatible with the existing standard, EPCglobal C1G2 specification. GenePrint leverages the internal similarity among pulses of tags ’ RN16 preamble signals to extract a hardwa...
The design and application of novel physical-layer security techniques have been increasing in the l...
Radio-Frequency Distinct Native Attributes fingerprinting for wireless device identification is enha...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
In conventional wireless networks, security issues are primarily considered above the physical layer...
Radio-frequency distinct native attribute (RF-DNA) fingerprinting is adapted as a physical-layer tec...
Abstract—In conventional wireless networks, security issues are primarily considered above the physi...
Part 3: Access Control, Trust and Identity ManagementInternational audienceNetwork complexity contin...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
Radio frequency identification (RFID) tags are low-cost devices that are used to uniquely identify t...
Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transm...
The Internet of Things (IoT) concept is widely used today. As IoT becomes more widely adopted, the n...
Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transm...
Authentication is challenging in the IoT because most advanced cryptographic algorithms are difficul...
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the phys...
Several previous works in wireless network security have demonstrated the weakness of conventional s...
The design and application of novel physical-layer security techniques have been increasing in the l...
Radio-Frequency Distinct Native Attributes fingerprinting for wireless device identification is enha...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
In conventional wireless networks, security issues are primarily considered above the physical layer...
Radio-frequency distinct native attribute (RF-DNA) fingerprinting is adapted as a physical-layer tec...
Abstract—In conventional wireless networks, security issues are primarily considered above the physi...
Part 3: Access Control, Trust and Identity ManagementInternational audienceNetwork complexity contin...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
Radio frequency identification (RFID) tags are low-cost devices that are used to uniquely identify t...
Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transm...
The Internet of Things (IoT) concept is widely used today. As IoT becomes more widely adopted, the n...
Radio Frequency (RF) wireless devices can be identified by the RF emissions they produce when transm...
Authentication is challenging in the IoT because most advanced cryptographic algorithms are difficul...
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the phys...
Several previous works in wireless network security have demonstrated the weakness of conventional s...
The design and application of novel physical-layer security techniques have been increasing in the l...
Radio-Frequency Distinct Native Attributes fingerprinting for wireless device identification is enha...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...