@ARTICLE{1,
author={Li, Qing and Trappe, Wade},
journal={IEEE Transactions on Information Forensics and Security},
title={Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships},
year={2007},
volume={2},
number={4},
pages={793-808},
doi={10.1109/TIFS.2007.910236}}
@ARTICLE{2,
author={Ureten, Oktay and Serinken, Nur},
journal={Canadian Journal of Electrical and Computer Engineering},
title={Wireless security through RF fingerprinting},
year={2007},
volume={32},
number={1},
pages={27-33},
doi={10.1109/CJECE.2007.364330}}
@ARTICLE{3,
author={Bertoncini, Crystal and Rudd, Kevin and Nousain, Bryan and Hinders, Mark},
journal={IEEE Transactions on Industrial Electronics},
title={Wavelet Fingerprinting of Radio-Frequency Identification (RFID) Tags},
year={2012},
volume={59},
number={12},
pages={4843-4850},
doi={10.1109/TIE.2011.2179276}}
@INPROCEEDINGS{4,
author={Toonstra, J. and Kinsner, W.},
booktitle={IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings},
title={Transient analysis and genetic algorithms for classification},
year={1995},
volume={2},
number={},
pages={432-437 vol.2},
doi={10.1109/WESCAN.1995.494069}}
@ARTICLE{5,
author={Zeng, Kai and Govindan, Kannan and Mohapatra, Prasant},
journal={IEEE Wireless Communications},
title={Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks]},
year={2010},
volume={17},
number={5},
pages={56-62},
doi={10.1109/MWC.2010.5601959}}
@INPROCEEDINGS{6,
author={Xiao, L. and Greenstein, L. and Mandayam, N. and Trappe, W.},
booktitle={2008 IEEE International Conference on Communications},
title={A Physical-Layer Technique to Enhance Authentication for Mobile Terminals},
year={2008},
volume={},
number={},
pages={1520-1524},
doi={10.1109/ICC.2008.294}}
@INPROCEEDINGS{7,
author={Nikitin, Pavel V. and Martinez, Rene and Ramamurthy, Shashi and Leland, Hunter and Spiess, Gary and Rao, K. V. S.},
booktitle={2010 IEEE International Conference on RFID (IEEE RFID 2010)},
title={Phase based spatial identification of UHF RFID tags},
year={2010},
volume={},
number={},
pages={102-109},
doi={10.1109/RFID.2010.5467253}}
@ARTICLE{8,
author={Larionov, Andrey A. and Ivanov, Roman E. and Vishnevsky, Vladimir M.},
journal={IEEE Journal of Radio Frequency Identification},
title={UHF RFID in Automatic Vehicle Identification: Analysis and Simulation},
year={2017},
volume={1},
number={1},
pages={3-12},
doi={10.1109/JRFID.2017.2751592}}
@ARTICLE{9,
author={},
journal={ANSI/IEEE Std 802.11, 1999 Edition (R2003)},
title={IEEE Standard for Information Technology- Telecommunications and Information Exchange Between Systems- Local and Metropolitan Area Networks- Specific Requirements- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications},
year={2003},
volume={},
number={},
pages={i-513},
doi={10.1109/IEEESTD.2003.95617}}
@INPROCEEDINGS{10,
author={Kauffmann, B. and Baccelli, F. and Chaintreau, A. and Mhatre, V. and Papagiannaki, K. and Diot, C.},
booktitle={IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications},
title={Measurement-Based Self Organization of Interfering 802.11 Wireless Access Networks},
year={2007},
volume={},
number={},
pages={1451-1459},
doi={10.1109/INFCOM.2007.171}}
@INPROCEEDINGS{11,
author={Candore, Andrea and Kocabas, Ovunc and Koushanfar, Farinaz},
booktitle={2009 IEEE International Workshop on Hardware-Oriented Security and Trust},
title={Robust stable radiometric fingerprinting for wireless devices},
year={2009},
volume={},
number={},
pages={43-49},
doi={10.1109/HST.2009.5224969}}
@INPROCEEDINGS{12,
author={Debbah, Merouane},
booktitle={2008 International Conference on Advanced Technologies for Communications},
title={Mobile Flexible Networks: The challenges ahead},
year={2008},
volume={},
number={},
pages={3-7},
doi={10.1109/ATC.2008.4760505}}
@INPROCEEDINGS{13,
author={Hu, Nansai and Yao, Yu-Dong},
booktitle={2012 IEEE International Conference on Communications (ICC)},
title={Identification of legacy radios in a cognitive radio network using a radio frequency fingerprinting based method},
year={2012},
volume={},
number={},
pages={1597-1602},
doi={10.1109/ICC.2012.6364436}}
@ARTICLE{14,
author={Gard, K.G. and Larson, L.E. and Steer, M.B.},
journal={IEEE Transactions on Microwave Theory and Techniques},
title={The impact of RF front-end characteristics on the spectral regrowth of communications signals},
year={2005},
volume={53},
number={6},
pages={2179-2186},
doi={10.1109/TMTT.2005.848801}}
@INPROCEEDINGS{15,
author={Toonstra, J. and Kinsner, W.},
booktitle={Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering},
title={A radio transmitter fingerprinting system ODO-1},
year={1996},
volume={1},
number={},
pages={60-63 vol.1},
doi={10.1109/CCECE.1996.548038}}
@INPROCEEDINGS{16,
author={Xu, Shuhua and Xu, Lina and Xu, Zhengguang and Huang, Benxiong},
booktitle={MILCOM 2008 - 2008 IEEE Military Communications Conference},
title={Individual radio transmitter identification based on spurious modulation characteristics of signal envelop},
year={2008},
volume={},
number={},
pages={1-5},
doi={10.1109/MILCOM.2008.4753446}}
@INPROCEEDINGS{17,
author={Ur Rehman, Saeed and Sowerby, Kevin and Coghill, Colin},
booktitle={2012 Australian Communications Theory Workshop (AusCTW)},
title={RF fingerprint extraction from the energy envelope of an instantaneous transient signal},
year={2012},
volume={},
number={},
pages={90-95},
doi={10.1109/AusCTW.2012.6164912}}
@ARTICLE{18,
author={Ellis, K. J. and Serinken, N.},
journal={Radio Science},
title={Characteristics of radio transmitter fingerprints},
year={2001},
volume={36},
number={4},
pages={585-597},
doi={10.1029/2000RS002345}}
@ARTICLE{19,
author={Tekbas, O.H. and Serinken, N. and Ureten, O.},
journal={Canadian Journal of Electrical and Computer Engineering},
title={An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions},
year={2004},
volume={29},
number={3},
pages={203-209},
doi={10.1109/CJECE.2004.1532524}}
@INPROCEEDINGS{20,
author={Bonne Rasmussen, Kasper and Capkun, Srdjan},
booktitle={2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007},
title={Implications of radio fingerprinting on the security of sensor networks},
year={2007},
volume={},
number={},
pages={331-340},
doi={10.1109/SECCOM.2007.4550352}}
@INPROCEEDINGS{21,
author={Shaw, D. and Kinsner, W.},
booktitle={IEEE WESCANEX 97 Communications, Power and Computing. Conference Proceedings},
title={Multifractal modelling of radio transmitter transients for classification},
year={1997},
volume={},
number={},
pages={306-312},
doi={10.1109/WESCAN.1997.627159}}
@INPROCEEDINGS{22,
author={Huang, Lianfen and Gao, Minghui and Zhao, Caidan and Wu, Xiongpeng},
booktitle={2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013)},
title={Detection of Wi-Fi transmitter transients using statistical method},
year={2013},
volume={},
number={},
pages={1-5},
doi={10.1109/ICSPCC.2013.6664128}}
@INPROCEEDINGS{23,
author={Klein, R. and Temple, M. A. and Mendenhall, M. J. and Reising, D. R.},
booktitle={2009 IEEE International Conference on Communications},
title={Sensitivity Analysis of Burst Detection and RF Fingerprinting Classification Performance},
year={2009},
volume={},
number={},
pages={1-5},
doi={10.1109/ICC.2009.5199451}}
@ARTICLE{24,
author={Shi, Yan and Jensen, Michael A.},
journal={IEEE Transactions on Information Forensics and Security},
title={Improved Radiometric Identification of Wireless Devices Using MIMO Transmission},
year={2011},
volume={6},
number={4},
pages={1346-1354},
doi={10.1109/TIFS.2011.2162949}}
@INPROCEEDINGS{25,
author={Kennedy, Irwin O. and Scanlon, Patricia and Mullany, Francis J. and Buddhikot, Milind M. and Nolan, Keith E. and Rondeau, Thomas W.},
booktitle={2008 IEEE 68th Vehicular Technology Conference},
title={Radio Transmitter Fingerprinting: A Steady State Frequency Domain Approach},
year={2008},
volume={},
number={},
pages={1-5},
doi={10.1109/VETECF.2008.291}}
@ARTICLE{26,
author={Scanlon, Patricia and Kennedy, Irwin O. and Liu, Yongheng},
journal={Bell Labs Technical Journal},
title={Feature extraction approaches to RF fingerprinting for device identification in femtocells},
year={2010},
volume={15},
number={3},
pages={141-151},
doi={10.1002/bltj.20462}}
@ARTICLE{27,
author={Jana, Suman and Kasera, Sneha K.},
journal={IEEE Transactions on Mobile Computing},
title={On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews},
year={2010},
volume={9},
number={3},
pages={449-462},
doi={10.1109/TMC.2009.145}}
@ARTICLE{28,
author={Klein, Randall W. and Temple, Michael A. and Mendenhall, Michael J.},
journal={Journal of Communications and Networks},
title={Application of wavelet-based RF fingerprinting to enhance wireless network security},
year={2009},
volume={11},
number={6},
pages={544-555},
doi={10.1109/JCN.2009.6388408}}
@INPROCEEDINGS{29,
author={Suski II, William C. and Temple, Michael A. and Mendenhall, Michael J. and Mills, Robert F.},
booktitle={IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference},
title={Using Spectral Fingerprints to Improve Wireless Network Security},
year={2008},
volume={},
number={},
pages={1-5},
doi={10.1109/GLOCOM.2008.ECP.421}}
@ARTICLE{30,
author={Chinnappa Gounder Periaswamy, Senthilkumar and Thompson, Dale R. and Di, Jia},
journal={IEEE Transactions on Dependable and Secure Computing},
title={Fingerprinting RFID Tags},
year={2011},
volume={8},
number={6},
pages={938-943},
doi={10.1109/TDSC.2010.56}}
@ARTICLE{31,
author={Kohno, T. and Broido, A. and Claffy, K.C.},
journal={IEEE Transactions on Dependable and Secure Computing},
title={Remote physical device fingerprinting},
year={2005},
volume={2},
number={2},
pages={93-108},
doi={10.1109/TDSC.2005.26}}
@INPROCEEDINGS{32,
author={Williams, McKay D. and Temple, Michael A. and Reising, Donald R.},
booktitle={2010 IEEE Global Telecommunications Conference GLOBECOM 2010},
title={Augmenting Bit-Level Network Security Using Physical Layer RF-DNA Fingerprinting},
year={2010},
volume={},
number={},
pages={1-6},
doi={10.1109/GLOCOM.2010.5683789}}
@INPROCEEDINGS{33,
author={Reising, Donald R. and Temple, Michael A. and Mendenhall, Michael J.},
booktitle={2010 IEEE Wireless Communication and Networking Conference},
title={Improving Intra-Cellular Security Using Air Monitoring with RF Fingerprints},
year={2010},
volume={},
number={},
pages={1-6},
doi={10.1109/WCNC.2010.5506229}}
@INPROCEEDINGS{34,
author={Dolatshahi, Sepideh and Polak, Adam and Goeckel, Dennis L.},
booktitle={2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers},
title={Identification of wireless users via power amplifier imperfections},
year={2010},
volume={},
number={},
pages={1553-1557},
doi={10.1109/ACSSC.2010.5757798}}
@ARTICLE{35,
author={Xu, Qiang and Zheng, Rong and Saad, Walid and Han, Zhu},
journal={IEEE Communications Surveys & Tutorials},
title={Device Fingerprinting in Wireless Networks: Challenges and Opportunities},
year={2016},
volume={18},
number={1},
pages={94-104},
doi={10.1109/COMST.2015.2476338}}
@ARTICLE{36,
author={Polak, Adam C. and Dolatshahi, Sepideh and Goeckel, Dennis L.},
journal={IEEE Journal on Selected Areas in Communications},
title={Identifying Wireless Users via Transmitter Imperfections},
year={2011},
volume={29},
number={7},
pages={1469-1479},
doi={10.1109/JSAC.2011.110812}}
@INPROCEEDINGS{37,
author={Nguyen, Nam Tuan and Zheng, Guanbo and Han, Zhu and Zheng, Rong},
booktitle={2011 Proceedings IEEE INFOCOM},
title={Device fingerprinting to enhance wireless security using nonparametric Bayesian method},
year={2011},
volume={},
number={},
pages={1404-1412},
doi={10.1109/INFCOM.2011.5934926}}
@INPROCEEDINGS{38,
author={Remley, K.A. and Grosvenor, C.A. and Johnk, R.T. and Novotny, D.R. and Hale, P.D. and McKinley, M.D. and Karygiannis, A. and Antonakakis, E.},
booktitle={Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.},
title={Electromagnetic signatures of WLAN cards and network security},
year={2005},
volume={},
number={},
pages={484-488},
doi={10.1109/ISSPIT.2005.1577145}}
@INPROCEEDINGS{39,
author={Sheng, Y. and Tan, K. and Chen, G. and Kotz, D. and Campbell, A.},
booktitle={IEEE INFOCOM 2008 - The 27th Conference on Computer Communications},
title={Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength},
year={2008},
volume={},
number={},
pages={1768-1776},
doi={10.1109/INFOCOM.2008.239}}
@ARTICLE{40,
author={Baldini, Gianmarco and Steri, Gary},
journal={IEEE Communications Surveys & Tutorials},
title={A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components},
year={2017},
volume={19},
number={3},
pages={1761-1789},
doi={10.1109/COMST.2017.2694487}}
@ARTICLE{41,
author={Widrow, B. and Lehr, M.A.},
journal={Proceedings of the IEEE},
title={30 years of adaptive neural networks: perceptron, Madaline, and backpropagation},
year={1990},
volume={78},
number={9},
pages={1415-1442},
doi={10.1109/5.58323}}
@ARTICLE{42,
author={Reising, Donald R. and Temple, Michael A. and Jackson, Julie A.},
journal={IEEE Transactions on Information Forensics and Security},
title={Authorized and Rogue Device Discrimination Using Dimensionally Reduced RF-DNA Fingerprints},
year={2015},
volume={10},
number={6},
pages={1180-1192},
doi={10.1109/TIFS.2015.2400426}}