Cited 46 time in
Deep-Learning-Aided RF Fingerprinting for NFC Security
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Lee, Woongsup | - |
| dc.contributor.author | Baek, Seon Yeob | - |
| dc.contributor.author | Kim, Seong Hwan | - |
| dc.date.accessioned | 2022-12-26T10:30:43Z | - |
| dc.date.available | 2022-12-26T10:30:43Z | - |
| dc.date.issued | 2021-05 | - |
| dc.identifier.issn | 0163-6804 | - |
| dc.identifier.issn | 1558-1896 | - |
| dc.identifier.uri | https://scholarworks.gnu.ac.kr/handle/sw.gnu/3818 | - |
| dc.description.abstract | Given the ever increasing use of near field communication (NEC), the security of this system is becoming increasingly important. Recently, radio frequency (RF) fingerprinting, where the physical RF characteristics of a communication device are used as a means to provide guarantees of authenticity and security, has received serious consideration due to the uniqueness of these characteristics, making cloning difficult. In this article, we discuss the feasibility of RF fingerprinting assisted by deep learning for use in identifying NFC tags. To this end, we implement a hardware testbed with an off-the-shelf NFC reader and software defined radio. An RI signal corresponding to one-bit transmission from the NFC tag is used to extract the RF characteristics, which enables rapid identification. Three different types of deep neural network are used, namely fully connected layer-based neural network, convolutional neural network, and recurrent neural network. By experiment, we confirm that deep-learning-based algorithms can uniquely distinguish 50 NFC tags with up to 96.16 percent accuracy. We also discuss some of the key technical challenges involved in the use of deep-learning-based RF fingerprinting for NFC. | - |
| dc.format.extent | 6 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Institute of Electrical and Electronics Engineers | - |
| dc.title | Deep-Learning-Aided RF Fingerprinting for NFC Security | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1109/MCOM.001.2000912 | - |
| dc.identifier.scopusid | 2-s2.0-85107508023 | - |
| dc.identifier.wosid | 000658334600019 | - |
| dc.identifier.bibliographicCitation | IEEE Communications Magazine, v.59, no.5, pp 96 - 101 | - |
| dc.citation.title | IEEE Communications Magazine | - |
| dc.citation.volume | 59 | - |
| dc.citation.number | 5 | - |
| dc.citation.startPage | 96 | - |
| dc.citation.endPage | 101 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Gyeongsang National University Central Library, 501, Jinju-daero, Jinju-si, Gyeongsangnam-do, 52828, Republic of Korea+82-55-772-0532
COPYRIGHT 2022 GYEONGSANG NATIONAL UNIVERSITY LIBRARY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
