User Capacity of Wireless Physical-Layer Identification

被引:10
|
作者
Wang, Wenhao [1 ,2 ]
Sun, Zhi [2 ]
Ren, Kui [3 ]
Zhu, Bocheng [1 ]
机构
[1] Peking Univ, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
[2] SUNY Buffalo, Dept Elect Engn, Buffalo, NY 14260 USA
[3] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
来源
IEEE ACCESS | 2017年 / 5卷
基金
美国国家科学基金会;
关键词
Radio frequency fingerprinting; physical-layer security; mutual information; wireless communication; AUTHENTICATION;
D O I
10.1109/ACCESS.2017.2674967
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A wireless physical layer identification (WPLI) system aims at identifying or classifying authorized devices of different users based on the unique radio frequency fingerprints (RFFs) extracted from their radio frequency signals at physical layer. Most existing works mainly focus on demonstrating feasibility of system by presenting the classification performance of a fixed-user-number network. However, the real-world WPLI systems are expected to work in various scenarios with different scales of user numbers, dynamic changes in user numbers, and various choices of user combinations. Hence, an important question needs to be answered: what's the user number that a WPLI system can support, i.e. the user capacity, under the condition that the minimum system performance is guaranteed. In this paper, we theoretically characterize the user capacity of WPLI. A theoretical approach is proposed based on ensemble mutual information between RFF and user identity. With this approach and one-time RFF training, the user capacity of WPLI can be characterized under various real-world constraints. Extensive experiments are conducted to validate the accuracy and tightness of the theoretically derived WPLI user capacity.
引用
收藏
页码:3353 / 3368
页数:16
相关论文
共 50 条
  • [31] Applying Physical-Layer Network Coding in Wireless Networks
    Shengli Zhang
    Soung Chang Liew
    EURASIP Journal on Wireless Communications and Networking, 2010
  • [32] Physical-layer security of underwater wireless optical communication
    Wei, Yixin
    Yang, Changgang
    Wei, Amin
    Zhang, Guofeng
    Qin, Chengbing
    Chen, Ruiyun
    Hu, Jianyong
    Xiao, Liantuan
    Jia, Suotang
    ACTA PHYSICA SINICA, 2025, 74 (06)
  • [33] Optimizing Physical-Layer Parameters for Wireless Sensor Networks
    Holland, Matthew
    Wang, Tianqi
    Tavli, Bulent
    Seyedi, Alireza
    Heinzelman, Wendi
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2011, 7 (04)
  • [34] Practical Physical-Layer Group Secret-Key Generation in Three-User Wireless Networks
    Rao, Manish
    Harshan, J.
    2018 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS (SPCOM 2018), 2018, : 342 - 346
  • [35] Lightweight Machine Learning and Embedded Security Engine for Physical-Layer Identification of Wireless IoT Nodes
    Rui, Qiufeng
    Elzner, Noah
    Zhou, Qiang
    Wen, Ziyuan
    He, Yan
    Yang, Kaiyuan
    Chi, Taiyun
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 2865 - 2870
  • [36] Master Synchronization in Physical-Layer Communications of Wireless Sensor Networks
    Lin Zheng
    Wei Ge
    Hongbing Qiu
    EURASIP Journal on Wireless Communications and Networking, 2010
  • [37] Physical-Layer Network Coding: An Efficient Technique for Wireless Communications
    Chen, Pingping
    Xie, Zhaopeng
    Fang, Yi
    Chen, Zhifeng
    Mumtaz, Shahid
    Rodrigues, Joel J. P. C.
    IEEE NETWORK, 2020, 34 (02): : 270 - 276
  • [38] A Dataset of physical-layer measurements in indoor wireless jamming scenarios
    Alhazbi, Saeif
    Sciancalepore, Savio
    Oligeri, Gabriele
    DATA IN BRIEF, 2023, 46
  • [39] Polarization Fingerprint: A Novel Physical-Layer Authentication in Wireless IoT
    Xu, Jinlong
    Wei, Dong
    Huang, Weiqing
    2022 IEEE 23RD INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2022), 2022, : 434 - 443
  • [40] Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security
    Liu, Yupeng
    Li, Jiangyuan
    Petropulu, Athina P.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (04) : 682 - 694