Radio-frequency distinct native attribute (RF-DNA) fingerprinting is adapted as a physical-layer technique to improve the security of integrated circuit (IC)-based multifactor authentication systems. Device recognition tasks (both identification and verification) are accomplished by passively monitoring and exploiting the intrinsic features of an IC\u27s unintentional RF emissions without requiring any modification to the device being analyzed. Device discrimination is achieved using RF-DNA fingerprints comprised of higher order statistical features based on instantaneous amplitude, phase, and frequency responses as a device executes a sequence of operations. The recognition system is trained using multiple discriminant analysis to reduce d...
In conventional wireless networks, security issues are primarily considered above the physical layer...
In this thesis, I have investigated the problem of identification and authentication of electronic d...
Authentication is challenging in the IoT because most advanced cryptographic algorithms are difficul...
Network complexity continues to evolve and more robust measures are required to ensure network integ...
Programmable Logic Controllers are used to control and monitor automated process in many Supervisory...
Radio-Frequency Distinct Native Attributes fingerprinting for wireless device identification is enha...
It is estimated that the number of Internet of Things (IoT) devices will reach 75 billion in the nex...
Abstract—Physical-layer identification utilizes unique features of wireless devices as their fingerp...
RF-DNA fingerprints are a waveform-based approach capable of distinguishing one device from others o...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
Radio Frequency RF Distinct Native Attribute (RF-DNA) Fingerprinting is a PHY-based security method ...
This research was performed to expand AFIT\u27s Radio Frequency Distinct Native Attribute (RF-DNA) f...
This dissertation introduces a GRLVQI classifier into an RF-DNA fingerprinting process and demonstra...
The Industrial Internet of Things (IIoT) market is skyrocketing towards 100 billion deployed devices...
The ZigBee specification provides a niche capability, extending the IEEE 802.15.4 standard to provid...
In conventional wireless networks, security issues are primarily considered above the physical layer...
In this thesis, I have investigated the problem of identification and authentication of electronic d...
Authentication is challenging in the IoT because most advanced cryptographic algorithms are difficul...
Network complexity continues to evolve and more robust measures are required to ensure network integ...
Programmable Logic Controllers are used to control and monitor automated process in many Supervisory...
Radio-Frequency Distinct Native Attributes fingerprinting for wireless device identification is enha...
It is estimated that the number of Internet of Things (IoT) devices will reach 75 billion in the nex...
Abstract—Physical-layer identification utilizes unique features of wireless devices as their fingerp...
RF-DNA fingerprints are a waveform-based approach capable of distinguishing one device from others o...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
Radio Frequency RF Distinct Native Attribute (RF-DNA) Fingerprinting is a PHY-based security method ...
This research was performed to expand AFIT\u27s Radio Frequency Distinct Native Attribute (RF-DNA) f...
This dissertation introduces a GRLVQI classifier into an RF-DNA fingerprinting process and demonstra...
The Industrial Internet of Things (IIoT) market is skyrocketing towards 100 billion deployed devices...
The ZigBee specification provides a niche capability, extending the IEEE 802.15.4 standard to provid...
In conventional wireless networks, security issues are primarily considered above the physical layer...
In this thesis, I have investigated the problem of identification and authentication of electronic d...
Authentication is challenging in the IoT because most advanced cryptographic algorithms are difficul...