[1] |
SHAH T, VENKATESAN S. Authentication of IoT Device and IoT Server Using Secure Vaults[C] //IEEE. 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, August 1-3, 2018, New York, USA. New York: IEEE, 2018: 819-824.
|
[2] |
MEKKI K, BAJIC E, CHAXEL F, et al. Overview of Cellular LPWAN Technologies for IoT Deployment: Sigfox, LoRaWAN, and NB-IoT[C] // IEEE. 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), March 19-23, 2018, Athens, Greece. New York: IEEE, 2018: 197-202.
|
[3] |
YU Xiaobo, ZHU Hongru, LIU Dapeng, et al. Analysis of LoRaWAN Security Echanism[J]. Telecommunications Science, 2019,35(8):152-157.
|
|
于小博, 朱红儒, 刘大鹏, 等. LoRa广域网安全机制剖析[J]. 电信科学, 2019,35(8):152-157.
|
[4] |
SANCHEZIBORRA R, SANCHEZGOMEZ J, PEREZ S, et al. Enhancing LoRaWAN Security Through a Lightweight and Authenticated Key Management Approach[J]. Sensors, 2018,18(6):1833.
|
[5] |
YANG Yang, WANG Yunbing, TANG Liuhua, et al. Security Architecture of LoRa Internet of Things Based on Reputation Evaluation Mechanism[J]. Computer & Digital Engineering, 2019,47(2):377-382.
|
|
杨阳, 王运兵, 唐六华, 等. 基于信誉评价机制的LoRa物联网安全架构[J]. 计算机与数字工程, 2019,47(2):377-382.
|
[6] |
YANG Jie, CHEN Yingying, TRAPPE W. Detecting Spoofing Attacks in Mobile Wireless Environments[C] //IEEE. In Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, Mesh, Ad Hoc Communication Network, July 21, 2009, Rome, Italy. New York: IEEE, 2009: 189-197.
|
[7] |
ZENG Kai, DANIEL W, CHAN A, et al. Exploiting Multiple Antenna Diversity for Shared Secret Key Generation in Wireless Networks[C] // IEEE. INFOCOM, 2010 Proceedings of IEEE, April 19, 2010, San Diego, CA, USA. New York: IEEE, 2010: 15-19.
|
[8] |
ZENG Kai, GOVINDAN K, MOHAPATRA P. Non-cryptographic Authentication and Identification in Wireless Networks[J]. IEEE Wireless Communications, 2010,17(5):56-62.
|
[9] |
PENG Linning, HU Aiqun, ZHANG Junqing, et al. Design of a Hybrid RF Fingerprint Extraction and Device Classification Scheme[J]. IEEE Internet of Things Journal, 2019,6(1):349-360.
|
[10] |
ZHUANG Zhou, JI Xiaoyu, ZHANG Taimin, et al. FBSleuth: Fake Base Station Forensics via Radio Frequency Fingerprinting[C] // ACM. The 2018 Asia Conference on Computer and Communications Security, June 4-8, 2018, Incheon, Korea. New York: ACM, 2018: 261-272.
|
[11] |
PENG Linning, ZHANG Junqing, LIU Ming, et al. Deep Learning -based RF Fingerprint Identification Using Differential Constellation Trace Figure[J]. IEEE Transactions on Vehicular Technology, 2020,69(1):1091-1095.
|
[12] |
SUSKI W, TEMPLE M A, MENDENHALL M J, et al. Using Spectral Fingerprints to Improve Wireless Network Security[C] // IEEE. 2008 IEEE Global Telecommunications Conference, November 30, 2008, New Orleans, LO, USA. New York: IEEE, 2008: 1-5.
|
[13] |
YUAN Yingjun, WANG Xiang, HUANG Zhitao, et al. Detection of Radio Transient Signal Based on Permutation Entropy and GLRT[J]. Wireless Personal Communications, 2015,82(2):1047-1057.
|
[14] |
DANEV B, HEYDTBENJAMIN T S, CAPKUN S, et al. Physical-layer Identification of RFID Devices[C] // ACM. The 18th Conference on USENIX Security Symposium, August 10-14, 2009, Montreal, Canada. Berkeley: USENIX Association, 2009: 199-214.
|
[15] |
GIANMARCO B, RAIMONDO G, GARY S, et al. Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform[J]. Applied Sciences, 2018,8(11):2167-2183.
doi: 10.3390/app8112167
URL
|
[16] |
KOSE M, TASCIOGLU S, TELATAR Z, et al. RF Fingerprinting of IoT Devices Based on Transient Energy Spectrum[J]. IEEE Access, 2019,2019(7):18715-18726.
|
[17] |
HAO Peng, WANG Xianbin, BEHNAD A. Relay Authentication by Exploiting I/Q Imbalance in Amplify-and-forward System[C] //IEEE. 2014 IEEE Global Communications Conference, December 8-12, 2014, Austin, TX, USA. New York: IEEE, 2014: 613-618.
|
[18] |
KNOX D A, KUNZ T. Wireless Fingerprints inside a Wireless Sensor Network[J]. ACM Transactions on Sensor Networks, 2015,11(2):1-30.
|
[19] |
XING Yuexiu, HU Aiqun, ZHANG Junqing, et al. On Radio Frequency Fingerprint Identification for DSSS Systems in Low SNR Scenarios[J]. IEEE Communications Letters, 2018,22(11):2326-2329.
|