GENERAL |
|
|
|
|
Specific Emitter Identification Based on Visibility Graph Entropy |
Sheng-Li Zhu, Lu Gan** |
Center for Cyber Security, School of Electronic Engineering, University of Electronic Science and Technology of China, Chengdu 611731
|
|
Cite this article: |
Sheng-Li Zhu, Lu Gan 2018 Chin. Phys. Lett. 35 030501 |
|
|
Abstract The specific emitter identification (SEI) technique determines the unique emitter of a given signal by using some external feature measurements of the signal. It has recently attracted a great deal of attention because many applications can benefit from it. This work addresses the SEI problem using two methods, namely, the normalized visibility graph entropy (NVGE) and the normalized horizontal visibility graph entropy (NHVGE) based on treating emitters as nonlinear dynamical systems. Firstly, the visibility graph (VG) and the horizontal visibility graph (HVG) are used to convert the instantaneous amplitude, phase and frequency of received signals into graphs. Then, based on the information captured by the VG and the HVG, the normalized Shannon entropy (NSE) calculated from the corresponding degree distributions are utilized as the rf fingerprint. Finally, four emitters from the same manufacturer are utilized to evaluate the performance of the two methods. Experimental results demonstrate that both the NHVGE-based method and NVGE-based method are quite effective and they perform much better than the method based on the normalized permutation entropy (NPE) in the case of a small amount of data. The NVGE-based method performs better than the NHVGE-based method since the VG can extract more information than the HVG does. Moreover, our methods do not distinguish between the transient signal and the steady-state signal, making it practical.
|
|
Received: 24 October 2017
Published: 25 February 2018
|
|
|
|
Fund: Supported by the National Natural Science Foundation of China under Grant No U1530126, and the Fundamental Research Funds for the Central Universities under Grant No ZYGX2015J022. |
|
|
[1] | Talbot K I, Duley P R and Hyatt M H 2003 Technol. Rev. J. 1 113 | [2] | Ureten O and Serinken N 2007 Can. J. Electr. Comput. Eng. 32 27 | [3] | Afolabi O R, Kim K and Ahmad A 2009 ICCCN 2009 Proceedings 19 p 1 | [4] | Reising D R, Temple M A and Mendenhall M J 2010 Proc. Wireless Commun. Networking Conf. (WCNC 2010) p 1 | [5] | Polak A C, Dolatshahi S and Goeckel D L 2011 IEEE J. Sel. Areas Commun. 29 1469 | [6] | Bertoncini C, Rudd K, Nousain B and Hinders M 2012 IEEE Trans. Ind. Electron. 59 4843 | [7] | Danev B and Capkun S 2009 IPSN. ACM p 25 | [8] | Klein R, Temple M A, Mendenhall M J and Reising D R 2009 Proc. IEEE Int. Conf. Commun. (ICC) p 1 | [9] | Ureten O and Serinken N 1999 Electron. Lett. 35 1996 | [10] | Ellis K and Serinken N 2001 Radio Sci. 36 585 | [11] | Brik V, Banerjee S, Gruteser M and Oh S 2008 Proc. ACM MobiCom p 116 | [12] | Candore A, Kocabas O and Koushanfar F 2009 Proc. IEEE Int. Workshop Hardware-Oriented Security Trust P. 43 | [13] | Yuan H L and Hu A Q 2010 Electron. Lett. 46 1165 | [14] | Padilla P, Padilla J and Valenzuela-Valdes J 2013 Electron. Lett. 49 1409 | [15] | Scanlon P, Kennedy I O and Liu Y 2010 Bell Labs Tech. J. 15 141 | [16] | Carroll T 2007 Chaos 17 023109 | [17] | Huang G, Yuan Y, Wang X and Huang Z 2016 Can. J. Electr. Comput. Eng. 39 34 | [18] | Huang G, Yuan Y, Wang X and Huang Z 1996 Wireless Pers. Commun. 3 1 | [19] | Zhang J, Wang F, Dobre O A and Zhong Z 2016 IEEE Trans. Inf. Forensics Sec. 11 1192 | [20] | Lacasa L, Luque B, Ballesteros F, Luque J and Nuno J C 2008 Proc. Natl. Acad. Sci. USA 105 4972 | [21] | Flanagan R and Lacasa L 2016 Phys. Lett. A 380 1689 | [22] | Jiang W, Wei B Y, Zhan J, Xie C H and Zhou D Y 2016 Comput. Ind. Eng. 101 260 | [23] | Bhaduri A and Ghosh D 2016 Front. Physiol. 7 44 | [24] | Telesca L, Lovallo M, Aggarwal S, Khan P and Rastogi B 2016 Pure Appl. Geophys. 173 125 | [25] | Luque B, Lacasa L, Ballesteros F and Luque J 2009 Phys. Rev. E 80 046103 | [26] | Lacasa L and Toral R 2010 Phys. Rev. E 82 036120 | [27] | Zhu G H, Li Y, Wen P and Wang S F 2014 Brain Inf. 1 19 | [28] | Yang Z L, Feng Y, Xiong D F, Chen X and Zhang J 2015 Trans. Tianjing Univ. 21 299 | [29] | Danev B, Luecken H, Capkun S and El Defrawy K 2010 Proc. 3rd ACM Conf. Wireless Network Security p 89 | [30] | Wajs M, Kurzyński P and Kaszlikowski D 2015 Phys. Rev. A 91 012114 | [31] | Kong D R and Xie H B 2011 Chin. Phys. Lett. 28 090502 |
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|