Radio frequency fingerprints vs. physical unclonable functions - are they twins, competitors, or allies?
Privacy breaches and online frauds are grave concerns in pervasive computing. Device identification is the first line of defense to detect and stop fraud. Conventional device authentication schemes using software addresses as identities or static pre-programmed secret keys are vulnerable to tamperin...
Saved in:
Main Authors: | Zhang, Junqing, Chang, Chip Hong, Gu, Chongya, Hanzo, Lajos |
---|---|
Other Authors: | School of Electrical and Electronic Engineering |
Format: | Article |
Language: | English |
Published: |
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/174141 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Optimal status update for caching enabled IoT networks: a dueling deep R-network approach
by: Xu, Chao, et al.
Published: (2022) -
Internet of things in the Philippines: A review
by: Illahi, Ana Antoniette C., et al.
Published: (2019) -
Development of an integrated and multi-sensor IoT device for smart toilets and smart facilities
by: Tan, Kevin Jan Ming
Published: (2024) -
Digital twin-assisted edge computation offloading in industrial internet of things with NOMA
by: Zhang, Long, et al.
Published: (2023) -
Development of energy harvesting system for self-powered Internet of Things
by: Ku, Guo Sheng
Published: (2024)