User Capacity of Wireless Physical-Layer Identification

被引:10
|
作者
Wang, Wenhao [1 ,2 ]
Sun, Zhi [2 ]
Ren, Kui [3 ]
Zhu, Bocheng [1 ]
机构
[1] Peking Univ, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
[2] SUNY Buffalo, Dept Elect Engn, Buffalo, NY 14260 USA
[3] SUNY Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
来源
IEEE ACCESS | 2017年 / 5卷
基金
美国国家科学基金会;
关键词
Radio frequency fingerprinting; physical-layer security; mutual information; wireless communication; AUTHENTICATION;
D O I
10.1109/ACCESS.2017.2674967
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A wireless physical layer identification (WPLI) system aims at identifying or classifying authorized devices of different users based on the unique radio frequency fingerprints (RFFs) extracted from their radio frequency signals at physical layer. Most existing works mainly focus on demonstrating feasibility of system by presenting the classification performance of a fixed-user-number network. However, the real-world WPLI systems are expected to work in various scenarios with different scales of user numbers, dynamic changes in user numbers, and various choices of user combinations. Hence, an important question needs to be answered: what's the user number that a WPLI system can support, i.e. the user capacity, under the condition that the minimum system performance is guaranteed. In this paper, we theoretically characterize the user capacity of WPLI. A theoretical approach is proposed based on ensemble mutual information between RFF and user identity. With this approach and one-time RFF training, the user capacity of WPLI can be characterized under various real-world constraints. Extensive experiments are conducted to validate the accuracy and tightness of the theoretically derived WPLI user capacity.
引用
收藏
页码:3353 / 3368
页数:16
相关论文
共 50 条
  • [1] Wireless Physical-Layer Identification: Modeling and Validation
    Wang, Wenhao
    Sun, Zhi
    Piao, Sixu
    Zhu, Bocheng
    Ren, Kui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) : 2091 - 2106
  • [2] Joint jammer and user scheduling scheme for wireless physical-layer security
    Ding X.
    Song T.
    Zou Y.
    Chen X.
    Journal of Southeast University (English Edition), 2016, 32 (03) : 261 - 266
  • [3] A Survey of Physical-Layer Authentication in Wireless Communications
    Xie, Ning
    Li, Zhuoyuan
    Tan, Haijun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (01): : 282 - 310
  • [4] Physical-layer security wireless transmission synthesis scheme for proximal desired receiver user and eavesdropper
    Gao J.
    Yuan Z.
    Qiu B.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2020, 42 (05): : 1160 - 1165
  • [5] Physical-Layer Identification of Wired Ethernet Devices
    Gerdes, Ryan M.
    Mina, Mani
    Russell, Steve F.
    Daniels, Thomas E.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (04) : 1339 - 1353
  • [6] Physical-layer security of underwater wireless optical communication
    Wei, Yixin
    Yang, Changgang
    Wei, Amin
    Zhang, Guofeng
    Qin, Chengbing
    Chen, Ruiyun
    Hu, Jianyong
    Xiao, Liantuan
    Jia, Suotang
    ACTA PHYSICA SINICA, 2025, 74 (06)
  • [7] Lightweight Machine Learning and Embedded Security Engine for Physical-Layer Identification of Wireless IoT Nodes
    Rui, Qiufeng
    Elzner, Noah
    Zhou, Qiang
    Wen, Ziyuan
    He, Yan
    Yang, Kaiyuan
    Chi, Taiyun
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 2865 - 2870
  • [8] Hybrid Physical-Layer Authentication
    Xie, Ning
    Zhang, Jiaheng
    Zhang, Qihong
    Tan, Haijun
    Liu, Alex X.
    Niyato, Dusit
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (02) : 1295 - 1311
  • [9] Polarization Fingerprint: A Novel Physical-Layer Authentication in Wireless IoT
    Xu, Jinlong
    Wei, Dong
    Huang, Weiqing
    2022 IEEE 23RD INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2022), 2022, : 434 - 443
  • [10] Mean physical-layer secrecy capacity in mobile communication systems
    Li, Tao
    Zhang, Yan
    Xu, Xibin
    Zhou, Shidong
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2015, 55 (11): : 1241 - 1245and1252