Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 473178, 9 pages
http://dx.doi.org/10.1155/2014/473178
Research Article

Compressed Sensing Based Fingerprint Identification for Wireless Transmitters

1Department of Communication Engineering, Xiamen University, Xiamen, Fujian 361005, China
2Department of Computer Science and Information Engineering, National Taitung University, Taitung 95092, Taiwan

Received 12 March 2014; Accepted 1 April 2014; Published 29 April 2014

Academic Editor: Han-Chieh Chao

Copyright © 2014 Caidan Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S.-C. Kwon, Y.-T. Lee, and J.-S. Seo, “A novel transmitter identification technique for use in distributed 8 VSB DTV system,” in Proceedings of the 63rd IEEE Vehicular Technology Conference (VTC '06), pp. 2211–2215, July 2006. View at Scopus
  2. H. H. Cho, C. Y. Chen, T. K. Shih, and H. C. Chao, “A survey on underwater delay/disruption tolerant wireless sensor network routing,” to be published in IET Wireless Sensor Systems.
  3. H.-C. Chu, D.-J. Deng, and H.-C. Chao, “The digital forensics of portable electronic communication devices based on a Skype im session of a pocket PC for NGC,” Wireless Communications and Mobile Computing, vol. 11, no. 2, pp. 211–225, 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. C.-Y. Chen, K.-D. Chang, and H.-C. Chao, “Transaction-pattern-based anomaly detection algorithm for IP multimedia subsystem,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 152–161, 2011. View at Publisher · View at Google Scholar · View at Scopus
  5. Y. C. Chang, “Heterogeneous wireless sensor network with EPC network architecture for U-life environment,” to be published in Journal of Internet Technology.
  6. Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung, and J. H. Park, “Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks,” IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 400–411, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. C. Chang and H. W. Wang, “Mobile business via cross layer approach toward intelligent RFID purchasing system,” Journal of Internet Technology, vol. 11, no. 7, pp. 965–973, 2010. View at Google Scholar
  8. C.-S. Li, Y.-C. Tseng, H.-C. Chao, and Y.-M. Huang, “A neighbor caching mechanism for handoff in IEEE 802.11 wireless networks,” Journal of Supercomputing, vol. 45, no. 1, pp. 1–14, 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. N.-N. Lu, H.-K. Zhang, Y.-C. Chang, and H.-C. Chao, “IPas++: a novel accountable and scalable Internet Protocol for future internet,” Journal of Internet Technology, vol. 12, no. 5, pp. 769–780, 2011. View at Google Scholar · View at Scopus
  10. L. Shu, M. Hauswirth, H.-C. Chao, M. Chen, and Y. Zhang, “NetTopo: a framework of simulation and visualization for wireless sensor networks,” Ad Hoc Networks, vol. 9, no. 5, pp. 799–820, 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. H.-C. Chu and W. D. Lin, “Live information discovery of the P2P instant messaging based on Skype's finger printing,” Journal of Internet Technology, vol. 11, no. 2, pp. 193–202, 2010. View at Google Scholar · View at Scopus
  12. Z.-W. Cai and J.-D. Li, “Study of transmitter individual identification based on bispectra,” Journal on Communications, vol. 28, no. 2, pp. 75–79, 2007. View at Google Scholar · View at Scopus
  13. D. Xu, H. Xu, Q. Lu et al., “A specific emitter identification method based on self-excitation oscillator mode,” Signal Processing, vol. 24, no. 1, pp. 122–126, 2008. View at Google Scholar
  14. L. Xiao, W. S. Lin, Y. Chen, and K. J. R. Liu, “Indirect reciprocity security game for large-scale mobile wireless networks,” IEEE Transactions on Information Forensics & Security, vol. 7, no. 4, pp. 1368–1380, 2012. View at Publisher · View at Google Scholar
  15. L. Xiao, H. Dai, and P. Ning, “MAC design of uncoordinated FH-based collaborative broadcast,” IEEE Wireless Communications Letters, vol. 1, no. 3, pp. 261–264, 2012. View at Publisher · View at Google Scholar
  16. Z. Shi, M. Liu, and L. Huang, “Transient-based identification of 802.11 b wireless device,” in Proceedings of the International Conference on Wireless Communications and Signal Processing (WCSP '11), November 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. H. C. Choe, C. E. Poole, A. M. Yu, and H. H. Szu, “Novel identification of intercepted signals from unknown radio transmitters,” in Wavelet Applications II, vol. 2491 of Proceedings of SPIE, pp. 504–517, April 1995. View at Scopus
  18. M.-J. Lu, Y. Zhan, X.-C. Si, and X.-N. Yang, “Extraction of the transient characteristics of the communication radiating source and individual identification,” Journal of Xidian University, vol. 36, no. 4, pp. 736–740, 2009. View at Google Scholar · View at Scopus
  19. S. Ur Rehman, K. Sowerby, and C. Coghill, “RF fingerprint extraction from the energy envelope of an instantaneous transient signal,” in Proceedings of the Australian Communications Theory Workshop (AusCTW '12), pp. 90–95, February 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. C. Zhao, L. Huang, L. Hu, and Y. Yao, “Transient fingerprint feature extraction for WLAN cards based on polynomial fitting,” in Proceedings of the 6th International Conference on Computer Science and Education (ICCSE '11), pp. 1099–1102, August 2011. View at Publisher · View at Google Scholar · View at Scopus
  21. L. Huang, X. Wu, C. Zhao, and M. Gao, “Identification of radio transmitters fingerprint based on curve fitting,” in Proceedings of the IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC '13), 2013.
  22. D. L. Donoho, “Compressed sensing,” IEEE Transactions on Information Theory, vol. 52, no. 4, pp. 1289–1306, 2006. View at Publisher · View at Google Scholar · View at Scopus
  23. L. Huang, M. Gao, C. Zhao, and X. Wu, “Detection of Wi-Fi transmitter transients using statistical method,” in Proceedings of the IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC '13), 2013.
  24. J. Hall, M. Barbeau, and E. Kranakis, “Detection of transient in radio frequency fingerprinting using signal phase,” in Proceedings of the 3rd IASTED International Conference on Wireless and Optical Communications, pp. 13–18, July 2003. View at Scopus
  25. D. Shaw and W. Kinsner, “Multifractal modelling of radio transmitter transients for classification,” in Proceedings of the IEEE WESCANEX Conference on Communications, Power and Computing Conference, pp. 306–312, May 1997. View at Publisher · View at Google Scholar · View at Scopus
  26. T. Hou, “Detection of signal envelope based on the complex analytical wavelet transform,” Journal of Xi’an University of Posts and Telecommunication, vol. 16, no. 3, pp. 18–21, 2011. View at Google Scholar
  27. C. Liu and Z. Qiu, “Extracting vibration signal envelopes based on Morlet wavelet transform,” Journal of Circuits and Systems, vol. 5, no. 1, pp. 68–71, 2000. View at Google Scholar
  28. X. Yuan and J. Yu, “Complex analytical wavelet transform for the extraction and analysis of speech signal envelops,” Acta Electronica Sinica, vol. 27, no. 5, pp. 142–144, 1999. View at Google Scholar
  29. I. Naseem, R. Togneri, and M. Bennamoun, “Sparse representation for speaker identification,” in Proceedings of the 20th International Conference on Pattern Recognition (ICPR '10), pp. 4460–4463, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  30. Y.-G. Cen and L.-H. Cen, “Sparse representation and reconstruction of signals based on the peak transform,” Journal of Electronics & Information Technology, vol. 33, no. 2, pp. 326–331, 2011. View at Publisher · View at Google Scholar · View at Scopus
  31. Y. Tsaig and D. L. Donoho, “Extensions of compressed sensing,” Signal Processing, vol. 86, no. 3, pp. 549–571, 2006. View at Publisher · View at Google Scholar · View at Scopus
  32. H. Rauhut, “Circulant and Toeplitz matrices in compressed sensing,” in Proceedings of the Signal Processing with Adaptive Sparse Structured Representations (SPARS '09), 2009.
  33. M. C. Angelini, F. Ricci-Tersenghi, and Y. Kabashima, “Compressed sensing with sparse, structured matrices,” in Proceedings of the 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton '12), pp. 808–814, 2012.
  34. C. Schüldt, I. Laptev, and B. Caputo, “Recognizing human actions: a local SVM approach,” in Proceedings of the 17th International Conference on Pattern Recognition (ICPR '04), pp. 32–36, August 2004. View at Publisher · View at Google Scholar · View at Scopus
  35. S.-Z. Qin, H.-T. Su, and T. J. McAvoy, “Comparison of four neural net learning methods for dynamic system identification,” IEEE Transactions on Neural Networks, vol. 3, no. 1, pp. 122–130, 1992. View at Publisher · View at Google Scholar · View at Scopus
  36. Y. Cai, T. Huang, L. Hu, X. Shi, L. Xie, and Y. Li, “Prediction of lysine ubiquitination with mRMR feature selection and analysis,” Amino Acids, vol. 42, no. 4, pp. 1387–1395, 2012. View at Publisher · View at Google Scholar · View at Scopus