期刊文献+

一种基于射频指纹的通信个体识别方法 被引量:4

A communication individual recognition method based on radio frequency fingerprint
下载PDF
导出
摘要 为了解决无线认证设备的安全问题,提出了一种基于射频指纹的通信个体识别方法。通过能量占比的角度比较主成分分析、鲁棒主成分分析和核主成分分析的方法,选择出适用于射频指纹特征的最佳降维方法进行进一步特征提取。比较了四种常用分类器,在不同信噪比环境下识别通信个体。仿真结果表明,提出的通信个体识别方法能够在信噪比大于15dB时达到高于98%的识别率,能够保证无线通信设备的接入安全问题。 In order to solve the security problem of wireless authentication equipment, a method of commu- nication individual recognition based on radio frequency fingerprint is proposed. Through the comparison of principal component analysis, robust principal component analysis and kernel principal component analysis, the best dimension reduction method suitable for RF fingerprint feature is selected for further feature extraction. Four commonly used classifiers are compared to identify the communication individual in different SNR environment. The simulation results show that the proposed communication individual recognition method can achieve the recognition rate higher than 98% when SNR is greater than 15dB, and it can ensure the access security of wireless communication devices.
出处 《航天电子对抗》 2018年第1期31-34,共4页 Aerospace Electronic Warfare
关键词 射频指纹 降维 个体识别 radio frequency fingerprints dimension reduction individual recognition
  • 相关文献

参考文献3

二级参考文献29

  • 1Shannon C E.Communication Theory of Secrecy Systems[J].Bell System Technical Journal,1949,28(04):656-715.
  • 2Wyner A D. The Wire-tap Channel[J].The Bell SystemTechnical Journal,1975,54(08): 1355-1387.
  • 3Goel S,Negi R.Guaranteeing Secrecy Using ArtificialNoise[J].IEEE Transactions on Wireless Communications,2008,7(06):2180-2189.
  • 4Li W,Ghogho M,Chen B,et al.Secure Communication ViaSending Artificial Noise By the Receiver:Outage SecrecyCapacityregion Analysis[J].IEEE CommunicationsLetters,2012,16(10):1628-1631.
  • 5Oohama Y.Capacity Theorems for Relay ChannelsWith Confidential Messages[C].IEEE InternationalSymposium on Information Theory,Seattle,USA:IEEEISIT,2007:926-930.
  • 6Dong L,Han Z,Petropulu A P,et al.Improving WirelessPhysical Layer Security Via Cooperating Relays[J].IEEETransactions on Signal Processing,2010,58(03):1875-1888.
  • 7Ekrem E,Ulukus S.Secrecy in Cooperative RelayBroadcast Channels[J].IEEE Transactions on InformationTheoiy,2011,57(01):137-155.
  • 8Huang J,Swindlehurst A L.Secure Communications ViaCooperative Jamming in Two-hop Relay Systems[C].IEEEGlobal Communications Conference,Miami,USA:IEEEPress,2010:1-5.
  • 9Jeong C,Kim I M,Kim D I.Joint Secure Beamfonning DesignAt the Source and the Relay for An Amplify-and-forwardMIMO Untrusted Relay System[J].IEEE Transaction onSignal Processing,2012,60(01):310-325.
  • 10Dong L,Han Z’Petropulu A P,et al.Cooperative Jammingfor Wireless Physical Layer Security[C].2009 IEEE/SP15th Workshop on Statistical Signal Processing,Cardiff,UK:IEEE,2009:417-420.

共引文献104

同被引文献46

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部