引 言
一、技术背景
二、PAST-AI方案
(a)I-Q样本的二元直方图(b)I-Q样本二元直方图的等高线图
图1 I-Q样本的图像表示
图2 基于ResNet-18的深度卷积神经网络
三、基于3D-CNN的方案
图3 3D-CNN网络架构
四、结语
参考文献
[1]. P. Yue, J. An, J. Zhang, G. Pan, S. Wang, P. Xiao, and L. Hanzo,“On the security of leo satellite communication systems: Vulnerabilities,countermeasures, and future trends,” arXiv preprint arXiv:2201.03063,2022
[2].A.Mukherjee,S.A.A.Fakoorian,J.Huang,andA.L.Swindlehurst,Principlesofphysicallayersecurityinmultiuserwirelessnetworks:Asurvey,”IEEECommunicationsSurveys&Tutorials,vol.16,no.3,pp.1550–1573,2014
[3].X. Wang, P. Hao, and L. Hanzo, “Physical-layer authentication for wireless security enhancement: Current challenges and future developments,” IEEE Commun. Mag., vol. 54, no. 6, pp. 152–158, Jun. 2016.
[4].L. Xiao, L. Greenstein, N. Mandayam, and W. Trappe, “Fingerprints in the ether: Using the physical layer for wireless authentication,” in Proc. IEEE Int. Conf. Commun., Jun. 2007, pp. 4646–4651.
[5].K. Sankhe, M. Belgiovine, F. Zhou, S. Riyaz, S. Ioannidis, andK. Chowdhury, “Oracle: Optimized radio classification through convolutional neural networks,” in IEEE INFOCOM 2019-IEEE Conference on Computer Communications. IEEE, 2019, pp. 370–378.
[6].Wang, Y. Chen, and Q. Zhang, “Privacy-preserving location authentication in wi-fi networks using fine-grained physical layer signatures,” IEEE Transactions on Wireless Communications, vol. 15, no. 2, pp.1218–1225, 2015
[7].Y. Liu, P. Zhang, Y. Shen, L. Peng, and X. Jiang, “Online machine learning-based physical layer authentication for mmwave mimo systems,” Ad Hoc Networks, vol. 131, p. 102864, 2022.
[8].G. Oligeri, S. Sciancalepore, S. Raponi and R. D. Pietro, "PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning," in IEEE Transactions on Information Forensics and Security, vol. 18, pp. 274-289, 2023, doi: 10.1109/TIFS.2022.3219287.
[9].S. Zhu, Y. Zhang, J. Zhu, Y. Chen, Y. Shen and X. Jiang, "3D Convolution-Based Radio Frequency Fingerprinting for Satellite Authentication," GLOBECOM 2023 - 2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 2023, pp. 7586-7591, doi: 10.1109/GLOBECOM54140.2023.10436963.
[10].Schneider,“iridium:toolkit [muccc],” 2015. [Online]. Available: https://wiki.muc.ccc.de/iridium:toolkit#frame format
F. Restuccia, S. D’Oro, A. Al-Shawabka, M. Belgiovine, L. Angioloni, S. Ioannidis, K. Chowdhury, and T. Melodia, “Deepradioid: Real-time channel-resilient optimization of deep learning-based radio fingerprinting algorithms,” in Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019, pp. 51–60
中国保密协会
科学技术分会
长按扫码关注我们
作者:柴延磊 中国科学院信息工程研究所
责编:何洁
2023年精彩文章TOP5回顾
近期精彩文章回顾
原文始发于微信公众号(中国保密协会科学技术分会):卫星射频指纹识别技术综述(上篇)
- 左青龙
- 微信扫一扫
- 右白虎
- 微信扫一扫
评论