RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning
暂无分享,去创建一个
[1] Günhan Dündar,et al. Determining the quality metrics for PUFs and performance evaluation of Two RO-PUFs , 2012, 10th IEEE International NEWCAS Conference.
[2] P. Welch. The use of fast Fourier transform for the estimation of power spectra: A method based on time averaging over short, modified periodograms , 1967 .
[3] Srinivas Devadas,et al. Performance metrics and empirical results of a PUF cryptographic key generation ASIC , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.
[4] Roel Maes,et al. Physically Unclonable Functions , 2013, Springer Berlin Heidelberg.
[5] O. H. Tekbas,et al. An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions , 2004, Canadian Journal of Electrical and Computer Engineering.
[6] Arenberg Doctoral,et al. Physically Unclonable Functions: Constructions, Properties and Applications , 2012 .
[7] Irwin O. Kennedy,et al. Feature extraction approaches to RF fingerprinting for device identification in femtocells , 2010, Bell Labs Technical Journal.
[8] Mani Mina,et al. Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.
[9] Mark Mohammad Tehranipoor,et al. Bit selection algorithm suitable for high-volume production of SRAM-PUF , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[10] Catherine Rosenberg,et al. What is the right model for wireless channel interference? , 2006, IEEE Transactions on Wireless Communications.