{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:24:14Z","timestamp":1742999054030,"version":"3.40.3"},"publisher-location":"Cham","reference-count":139,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030987947"},{"type":"electronic","value":"9783030987954"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-98795-4_9","type":"book-chapter","created":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T18:03:58Z","timestamp":1649354638000},"page":"181-213","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Machine Learning and\u00a0Deep Learning for\u00a0Hardware Fingerprinting"],"prefix":"10.1007","author":[{"given":"Carlos Javier","family":"Hernandez-Castro","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,8]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Abdolmaleki, B., Baghery, K., Akhbari, B., Aref, M.R.: Cryptanalysis of two EPC-based RFID security schemes. In: International ISC Conference on Information Security and Cryptology - ISCISC2015, pp. 1\u20136. IEEE, September 2015","DOI":"10.1109\/ISCISC.2015.7387908"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Abdolmaleki, B., Baghery, K., Akhbari, B., Reza Aref, M.: Attacks and improvements on two new-found RFID authentication protocols. In: International Symposium on Telecommunications - IST 2014, pp. 1\u20136, July 2014","DOI":"10.1109\/ISTEL.2014.7000830"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-41332-2_6","volume-title":"Radio Frequency Identification","author":"SF Aghili","year":"2013","unstructured":"Aghili, S.F., Bagheri, N., Gauravaram, P., Safkhani, M., Sanadhya, S.K.: On the security of two RFID mutual authentication protocols. In: Hutter, M., Schmidt, J.-M. (eds.) RFIDSec 2013. LNCS, vol. 8262, pp. 86\u201399. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41332-2_6"},{"key":"9_CR4","unstructured":"Ahmadian, Z., Salmasizadeh, M., Aref, M.R.: Desynchronization attack on RAPP ultralightweight authentication protocol. Cryptology ePrint Archive, Report 2012\/490 (2012)"},{"key":"9_CR5","unstructured":"Ahmadian, Z., Salmasizadeh, M., Aref, M.R.: Recursive linear and differential cryptanalysis of ultralightweight authentication protocols. Cryptology ePrint Archive, Report 2012\/489 (2012)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Ain, Q.U., Mahmood, Y., Mujahid, U., Najam-ul islam, M.: Cryptanalysis of mutual ultralightweight authentication protocols: SASI and RAPP. In: International Conference on Open Source Systems and Technologies - ICOSST 2014, Lahore, Pakistan, pp. 136\u2013145, December 2014","DOI":"10.1109\/ICOSST.2014.7029334"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"4028","DOI":"10.1002\/sec.1319","volume":"8","author":"M Akg\u00fcn","year":"2015","unstructured":"Akg\u00fcn, M., Bayrak, A.O., \u00c7a\u01e7layan, M.U.: Attacks and improvements to chaotic map-based RFID authentication protocol. Secur. Commun. Netw. 8, 4028\u20134040 (2015)","journal-title":"Secur. Commun. Netw."},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Akgun, M., Caglayan, M.U.: Weaknesses of two RFID protocols regarding de-synchronization attacks. In: International Wireless Communications and Mobile Computing Conference IWCMC - 2015, Dubrovnik, Croatia, August 2015","DOI":"10.1109\/IWCMC.2015.7289190"},{"key":"9_CR9","unstructured":"Akg\u00fcn, M., \u00c7a\u01e7layan, M.U.: On the security of recently proposed RFID protocols. Cryptology ePrint Archive, Report 2013\/820 (2013)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Akg\u00fcn, M., \u00c7a\u01e7layan, M.U.: Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Networks, February 2015","DOI":"10.1016\/j.adhoc.2015.02.001"},{"issue":"6","key":"9_CR11","first-page":"51","volume":"3","author":"SM Alavi","year":"2014","unstructured":"Alavi, S.M., Abdolmaleki, B., Baghery, K.: Vulnerabilities and improvements on HRAP$$^+$$, a hash-based RFID authentication protocol. Adv. Comput. Sci. Int. J. 3(6), 51\u201356 (2014)","journal-title":"Adv. Comput. Sci. Int. J."},{"issue":"5","key":"9_CR12","first-page":"44","volume":"3","author":"SM Alavi","year":"2014","unstructured":"Alavi, S.M., Baghery, K., Abdolmaleki, B.: Security and privacy flaws in a recent authentication protocol for EPC C1 G2 RFID tags. Adv. Comput. Sci. Int. J. 3(5), 44\u201352 (2014)","journal-title":"Adv. Comput. Sci. Int. J."},{"key":"9_CR13","doi-asserted-by":"publisher","unstructured":"Arackaparambil, C., Bratus, S., Shubina, A., Kotz, D.: On the reliability of wireless fingerprinting using clock skews, pp. 169\u2013174, January 2010. https:\/\/doi.org\/10.1145\/1741866.1741894","DOI":"10.1145\/1741866.1741894"},{"key":"9_CR14","unstructured":"Avatefipour, O.: Physical-fingerprinting of electronic control unit (ECU) based on machine learning algorithm for in-vehicle network communication protocol \u201ccan-bus\u201d (2017)"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2825026","volume":"48","author":"G Avoine","year":"2016","unstructured":"Avoine, G., Beaujeant, A., Hernandez-Castro, J., Demay, L., Teuwen, P.: A survey of security and privacy issues in ePassport protocols. ACM Comput. Surv. 48, 1\u201337 (2016). https:\/\/doi.org\/10.1145\/2825026","journal-title":"ACM Comput. Surv."},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/3041749","volume":"2017","author":"G Baldini","year":"2017","unstructured":"Baldini, G., Giuliani, R., Cano, E.: An analysis of the privacy threat in vehicular ad hoc networks due to radio frequency fingerprinting. Mob. Inf. Syst. 2017, 1\u201313 (2017). https:\/\/doi.org\/10.1155\/2017\/3041749","journal-title":"Mob. Inf. Syst."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Bauer, K., Mccoy, D., Anderson, E., Breitenbach, M., Grunwald, G.G.D.: The directional attack on wireless localization: how to spoof your location with a tin can. In: Proceedings of IEEE Conference on Global Telecommunications, pp. 4125\u20134130 (2009)","DOI":"10.1109\/GLOCOM.2009.5425737"},{"key":"9_CR18","doi-asserted-by":"publisher","unstructured":"Bayar, B., Stamm, M.: A deep learning approach to universal image manipulation detection using a new convolutional layer, pp. 5\u201310, June 2016. https:\/\/doi.org\/10.1145\/2909827.2930786","DOI":"10.1145\/2909827.2930786"},{"key":"9_CR19","unstructured":"Beale, J., Meer, H., van der Walt, C., Deraison, R.: Nessus Network Auditing: Jay Beale Open Source Security Series. Elsevier (2004)"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 93","author":"M Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232\u2013249. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48329-2_21"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Bennabhaktula, G., Alegre, E., Karastoyanova, D., Azzopardi, G.: Device-based image matching with similarity learning by convolutional neural networks that exploit the underlying camera sensor pattern noise, April 2020","DOI":"10.5220\/0009155505780584"},{"issue":"12","key":"9_CR22","doi-asserted-by":"publisher","first-page":"4843","DOI":"10.1109\/TIE.2011.2179276","volume":"59","author":"C Bertoncini","year":"2011","unstructured":"Bertoncini, C., Rudd, K., Nousain, B., Hinders, M.: Wavelet fingerprinting of radio-frequency identification (RFID) tags. IEEE Trans. Ind. Electron. 59(12), 4843\u20134850 (2011)","journal-title":"IEEE Trans. Ind. Electron."},{"key":"9_CR23","unstructured":"Biham, E., Bitan, S., Gavril, E.: TCAN: authentication without cryptography on a can bus based on nodes location on the bus. In: Embedded Security in Cars - ESCAR Europe 2018 Conference. ESCAR (2018)"},{"key":"9_CR24","unstructured":"Bojinov, H., Michalevsky, Y., Nakibly, G., Boneh, D.: Mobile device identification via sensor fingerprinting. arXiv abs\/1408.1416 (2014)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Bolliger, P.: Redpin-adaptive, zero-configuration indoor localization through user collaboration. In: Proceedings of the First ACM International Workshop on Mobile Entity Localization and Tracking in GPS-Less Environments, pp. 55\u201360 (2008)","DOI":"10.1145\/1410012.1410025"},{"key":"9_CR26","doi-asserted-by":"publisher","unstructured":"Bratus, S., Cornelius, C., Kotz, D., Peebles, D.: Active behavioral fingerprinting of wireless devices. In: Proceedings of the ACM Conference on Wireless Network Security (WiSec), pp. 56\u201361. ACM, March 2008. https:\/\/doi.org\/10.1145\/1352533.1352543. https:\/\/www.cs.dartmouth.edu\/~kotz\/research\/bratus-fingerprint\/index.html","DOI":"10.1145\/1352533.1352543"},{"issue":"6","key":"9_CR27","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1016\/j.comnet.2004.09.004","volume":"47","author":"M Brunato","year":"2005","unstructured":"Brunato, M., Battiti, R.: Statistical learning theory for location fingerprinting in wireless LANs. Comput. Netw. 47(6), 825\u2013845 (2005)","journal-title":"Comput. Netw."},{"key":"9_CR28","unstructured":"Butti, L.: Raw wireless tools homepage (2006). http:\/\/rfakeap.tuxfamily.org\/"},{"key":"9_CR29","doi-asserted-by":"publisher","unstructured":"Butti, L., Tinn\u00e9s, J.: Discovering and exploiting 802.11 wireless driver vulnerabilities. J. Comput. Virol. 4, 25\u201337 (2008). https:\/\/doi.org\/10.1007\/s11416-007-0065-x","DOI":"10.1007\/s11416-007-0065-x"},{"key":"9_CR30","doi-asserted-by":"publisher","unstructured":"Cao, Y., Li, S., Wijmans, E.: (Cross-)browser fingerprinting via OS and hardware level features, January 2017. https:\/\/doi.org\/10.14722\/ndss.2017.23152","DOI":"10.14722\/ndss.2017.23152"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Carlotto, A., Parodi, M., Bonamico, C., Lavagetto, F., Valla, M.: Proximity classification for mobile devices using Wi-Fi environment similarity. In: Proceedings of the First ACM International Workshop on Mobile Entity Localization and Tracking in GPS-Less Environments, pp. 43\u201348 (2008)","DOI":"10.1145\/1410012.1410023"},{"issue":"3","key":"9_CR32","doi-asserted-by":"publisher","first-page":"1860","DOI":"10.1109\/TCE.2010.5606338","volume":"56","author":"N Chang","year":"2010","unstructured":"Chang, N., Rashidzadeh, R., Ahmadi, M.: Robust indoor positioning using differential Wi-Fi access points. IEEE Trans. Consum. Electron. 56(3), 1860\u20131867 (2010)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"9_CR33","unstructured":"Checkoway, S., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: Proceedings of the 20th USENIX Conference on Security, SEC 2011, p. 6. USENIX Association (2011)"},{"issue":"1","key":"9_CR34","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/JIOT.2016.2619679","volume":"4","author":"D Chen","year":"2017","unstructured":"Chen, D., et al.: S2M: a lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet Things J. 4(1), 88\u2013100 (2017)","journal-title":"IEEE Internet Things J."},{"key":"9_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1464420.1464422","volume":"5","author":"Y Chen","year":"2009","unstructured":"Chen, Y., Kleisouris, K., Li, X., Trappe, W., Martin, R.: A security and robustness performance analysis of localization algorithms to signal strength attacks. TOSN 5, 1\u201337 (2009). https:\/\/doi.org\/10.1145\/1464420.1464422","journal-title":"TOSN"},{"key":"9_CR36","unstructured":"Cho, K.T., Shin, K.G.: Fingerprinting electronic control units for vehicle intrusion detection. In: Proceedings of the 25th USENIX Conference on Security Symposium, SEC 2016, pp. 911\u2013927. USENIX Association (2016)"},{"key":"9_CR37","doi-asserted-by":"publisher","first-page":"11551","DOI":"10.1364\/OE.14.011551","volume":"14","author":"K Choi","year":"2006","unstructured":"Choi, K., Lam, E., Wong, K.: Automatic source camera identification using the intrinsic lens radial distortion. Opt. Express 14, 11551\u201311565 (2006). https:\/\/doi.org\/10.1364\/OE.14.011551","journal-title":"Opt. Express"},{"key":"9_CR38","doi-asserted-by":"publisher","unstructured":"Choi, K., Lam, E., Wong, K.: Source camera identification using footprints from lens aberration. In: Proceedings of the SPIE, vol. 6069, February 2006. https:\/\/doi.org\/10.1117\/12.649775","DOI":"10.1117\/12.649775"},{"key":"9_CR39","doi-asserted-by":"publisher","first-page":"4757","DOI":"10.1109\/TVT.2018.2810232","volume":"67","author":"W Choi","year":"2016","unstructured":"Choi, W., Jo, H., Woo, S., Chun, J., Park, J.: Identifying ECUs using inimitable characteristics of signals in controller area networks. IEEE Trans. Veh. Technol. 67, 4757\u20134770 (2016). https:\/\/doi.org\/10.1109\/TVT.2018.2810232","journal-title":"IEEE Trans. Veh. Technol."},{"key":"9_CR40","unstructured":"Cinefra, N.: An adaptive indoor positioning system based on Bluetooth low energy RSSI (2013)"},{"key":"9_CR41","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/TIFS.2019.2916364","volume":"15","author":"D Cozzolino","year":"2019","unstructured":"Cozzolino, D., Verdoliva, L.: Noiseprint: a CNN-based camera model fingerprint. IEEE Trans. Inf. Forensics Secur. 15, 144\u2013159 (2019). https:\/\/doi.org\/10.1109\/TIFS.2019.2916364","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR42","unstructured":"Danev, B., Heydt-Benjamin, T.S., \u010capkun, S.: Physical-layer identification of RFID devices. In: Proceedings of the 18th Conference on USENIX Security Symposium, SSYM 2009, pp. 199\u2013214. USENIX Association (2009)"},{"key":"9_CR43","doi-asserted-by":"publisher","unstructured":"Das, A., Borisov, N., Caesar, M.: Do you hear what I hear? Fingerprinting smart devices through embedded acoustic components. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 441\u2013452. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2660267.2660325","DOI":"10.1145\/2660267.2660325"},{"key":"9_CR44","doi-asserted-by":"publisher","first-page":"2043","DOI":"10.1109\/TIFS.2019.2891223","volume":"14","author":"J Delvaux","year":"2019","unstructured":"Delvaux, J.: Machine-learning attacks on PolyPUFs, OB-PUFs, RPUFs, LHS-PUFs, and PUF\u2013FSMs. IEEE Trans. Inf. Forensics Secur. 14, 2043\u20132058 (2019). https:\/\/doi.org\/10.1109\/TIFS.2019.2891223","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR45","doi-asserted-by":"publisher","unstructured":"Devernay, F., Faugeras, O.: Automatic calibration and removal of distortion from scenes of structured environments. In: Proceedings of the SPIE, vol. 2567, July 1995. https:\/\/doi.org\/10.1117\/12.218487","DOI":"10.1117\/12.218487"},{"key":"9_CR46","doi-asserted-by":"publisher","unstructured":"Dey, S., Roy, N., Xu, W., Choudhury, R., Nelakuditi, S.: AccelPrint: imperfections of accelerometers make smartphones trackable, January 2014. https:\/\/doi.org\/10.14722\/ndss.2014.23059","DOI":"10.14722\/ndss.2014.23059"},{"key":"9_CR47","unstructured":"Ellch, J.P.: Fingerprinting 802.11 devices (2006). https:\/\/calhoun.nps.edu\/handle\/10945\/2592"},{"key":"9_CR48","doi-asserted-by":"publisher","unstructured":"Englehardt, S., Narayanan, A.: Online tracking: a 1-million-site measurement and analysis, pp. 1388\u20131401, October 2016. https:\/\/doi.org\/10.1145\/2976749.2978313","DOI":"10.1145\/2976749.2978313"},{"key":"9_CR49","doi-asserted-by":"publisher","unstructured":"Ferrara, P., Beslay, L.: Multimodal fingerprinting of imaging devices -inception report project AVICAO - authors and victims identification of child abuse on-line, December 2016. https:\/\/doi.org\/10.2760\/751517","DOI":"10.2760\/751517"},{"key":"9_CR50","doi-asserted-by":"crossref","unstructured":"Foruhandeh, M., Mohammed, A.Z., Kildow, G., Berges, P., Gerdes, R.: Spotr: GPS spoofing detection via device fingerprinting (2020)","DOI":"10.1145\/3395351.3399353"},{"key":"9_CR51","unstructured":"Franklin, J., McCoy, D., Tabriz, P., Neagoe, V., Van Randwyk, J., Sicker, D.: Passive data link layer 802.11 wireless device driver fingerprinting. In: Proceedings of the 15th Conference on USENIX Security Symposium, USENIX-SS 2006, vol. 2015. USENIX Association (2006)"},{"key":"9_CR52","unstructured":"Goodfellow, I.J., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. arXiv:1412.6572 (2014)"},{"key":"9_CR53","doi-asserted-by":"crossref","unstructured":"Gopalakrishnan, S., Cekic, M., Madhow, U.: Robust wireless fingerprinting via complex-valued neural networks (2019)","DOI":"10.1109\/GLOBECOM38437.2019.9013154"},{"key":"9_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-642-35404-5_15","volume-title":"Cryptology and Network Security","author":"B Groza","year":"2012","unstructured":"Groza, B., Murvay, S., van Herrewege, A., Verbauwhede, I.: LiBrA-CAN: a lightweight broadcast authentication protocol for controller area networks. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 185\u2013200. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35404-5_15"},{"key":"9_CR55","unstructured":"Hall, J., Barbeau, M., Kranakis, E.: Detecting rogue devices in Bluetooth networks using radio frequency fingerprinting, pp. 108\u2013113, January 2006"},{"key":"9_CR56","unstructured":"Hartkopp, O., Schilling, R.M.: Message authenticated CAN. In: Escar Conference, Berlin, Germany (2012)"},{"key":"9_CR57","doi-asserted-by":"crossref","unstructured":"Hasse, J., Gloe, T., Beck, M.: Forensic identification of GSM mobile phones. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, pp. 131\u2013140 (2013)","DOI":"10.1145\/2482513.2482529"},{"key":"9_CR58","unstructured":"Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Peris-Lopez, P., Quisquater, J.J.: Cryptanalysis of the SASI ultralightweight RFID authentication protocol with modular rotations. In: International Workshop on Coding and Cryptography - WCC 2009, Ullensvang, Norway, May 2009"},{"key":"9_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-642-16822-2_3","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"JC Hernandez-Castro","year":"2010","unstructured":"Hernandez-Castro, J.C., Peris-Lopez, P., Phan, R.C.-W., Tapiador, J.M.E.: Cryptanalysis of the David-Prasad RFID ultralightweight authentication protocol. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 22\u201334. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16822-2_3"},{"key":"9_CR60","doi-asserted-by":"crossref","unstructured":"Hernandez-Castro, J.C., Tapiador, J.E., Peris-Lopez, P., Clark, J.A., Talbi, E.G.: Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. In: Proceedings of the 23rd IEEE International Parallel and Distributed Processing Symposium - IPDPS 2009, Rome, Italy. IEEE Computer Society, May 2009","DOI":"10.1109\/IPDPS.2009.5161121"},{"key":"9_CR61","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-642-28879-1_17","volume-title":"Data Privacy Management and Autonomous Spontaneus Security","author":"JC Hernandez-Castro","year":"2012","unstructured":"Hernandez-Castro, J.C., Peris-Lopez, P., Aumasson, J.-P.: On the key schedule strength of PRESENT. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM\/SETOP -2011. LNCS, vol. 7122, pp. 253\u2013263. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28879-1_17"},{"key":"9_CR62","doi-asserted-by":"crossref","unstructured":"Hospodar, G., Maes, R., Verbauwhede, I.: Machine learning attacks on 65nm arbiter PUFs: accurate modeling poses strict bounds on usability. In: 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 37\u201342 (2012)","DOI":"10.1109\/WIFS.2012.6412622"},{"key":"9_CR63","unstructured":"Huo, Y., Zhu, X.: High dynamic range image forensics using CNN (2019)"},{"key":"9_CR64","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-319-40667-1_19","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"T Hupperich","year":"2016","unstructured":"Hupperich, T., Hosseini, H., Holz, T.: Leveraging sensor fingerprinting for mobile device authentication. In: Caballero, J., Zurutuza, U., Rodr\u00edguez, R.J. (eds.) DIMVA 2016. LNCS, vol. 9721, pp. 377\u2013396. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40667-1_19"},{"key":"9_CR65","doi-asserted-by":"publisher","unstructured":"Jana, S., Kasera, S.: On fast and accurate detection of unauthorized wireless access points using clock skews, vol. 9, pp. 104\u2013115, January 2008. https:\/\/doi.org\/10.1109\/TMC.2009.145","DOI":"10.1109\/TMC.2009.145"},{"key":"9_CR66","unstructured":"Jenkins, I.R., Shapiro, R., Bratus, S., Speers, R., Goodspeed, T.: Fingerprinting IEEE 802.15.4 devices with commodity radios. Technical report. TR2014-746, Dartmouth College, Computer Science, Hanover, NH, March 2014. http:\/\/www.cs.dartmouth.edu\/reports\/TR2014-746-rev2.pdf"},{"key":"9_CR67","doi-asserted-by":"crossref","unstructured":"Kaemarungsi, K., Krishnamurthy, P.: Modeling of indoor positioning systems based on location fingerprinting. In: IEEE Infocom 2004, vol. 2, pp. 1012\u20131022. IEEE (2004)","DOI":"10.1109\/INFCOM.2004.1356988"},{"key":"9_CR68","doi-asserted-by":"crossref","unstructured":"Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark, vol. 35, pp. 229\u2013240, January 2005","DOI":"10.1145\/1090191.1080119"},{"key":"9_CR69","doi-asserted-by":"crossref","unstructured":"Khalafalla, M., Gebotys, C.: PUFs deep attacks: enhanced modeling attacks using deep learning techniques to break the security of double arbiter PUFs. In: 2019 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 204\u2013209 (2019)","DOI":"10.23919\/DATE.2019.8714862"},{"key":"9_CR70","doi-asserted-by":"crossref","unstructured":"Kharrazi, M., Sencar, H.T., Memon, N.: Blind source camera identification. In: 2004 International Conference on Image Processing, ICIP 2004, vol. 1, pp. 709\u2013712 (2004)","DOI":"10.1109\/ICIP.2004.1418853"},{"key":"9_CR71","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.3390\/s19071645","volume":"19","author":"R Kimoto","year":"2019","unstructured":"Kimoto, R., Ishida, S., Yamamoto, T., Tagashira, S., Fukuda, A.: MuCHLoc: indoor zigbee localization system utilizing inter-channel characteristics $$\\dagger $$. Sensors (Basel, Switzerland) 19, 1645 (2019)","journal-title":"Sensors (Basel, Switzerland)"},{"key":"9_CR72","doi-asserted-by":"crossref","unstructured":"Kobusinska, A., Brzezinski, J., Pawulczuk, K.: Device fingerprinting: analysis of chosen fingerprinting methods. In: IoTBDS (2017)","DOI":"10.5220\/0006375701670177"},{"key":"9_CR73","doi-asserted-by":"crossref","unstructured":"Kohno, T., Broido, A., Claffy, K.C.: Remote physical device fingerprinting. In: 2005 IEEE Symposium on Security and Privacy (S&P 2005), pp. 211\u2013225 (2005)","DOI":"10.1109\/SP.2005.18"},{"key":"9_CR74","doi-asserted-by":"publisher","first-page":"84879","DOI":"10.1109\/ACCESS.2020.2991129","volume":"8","author":"T Koike-Akino","year":"2020","unstructured":"Koike-Akino, T., Wang, P., Pajovic, M., Sun, H., Orlik, P.V.: Fingerprinting-based indoor localization with commercial MMWave WiFi: a deep learning approach. IEEE Access 8, 84879\u201384892 (2020)","journal-title":"IEEE Access"},{"key":"9_CR75","doi-asserted-by":"crossref","unstructured":"Koscher, K., et al.: Experimental security analysis of a modern automobile. In: 2010 IEEE Symposium on Security and Privacy, pp. 447\u2013462. IEEE (2010)","DOI":"10.1109\/SP.2010.34"},{"key":"9_CR76","unstructured":"Krizhevsky, A., Nair, V., Hinton, G.: CIFAR datasets (2000). https:\/\/www.cs.toronto.edu\/~kriz\/cifar.html"},{"key":"9_CR77","unstructured":"Kurachi, R., Matsubara, Y., Takada, H., Adachi, N., Miyashita, Y., Horihata, S.: CaCAN-centralized authentication system in can (controller area network). In: 14th International Conference on Embedded Security in Cars (ESCAR 2014) (2014)"},{"key":"9_CR78","doi-asserted-by":"crossref","unstructured":"Kurosawa, K., Kuroki, K., Saitoh, N.: CCD fingerprint method-identification of a video camera from videotaped images. In: Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348), vol. 3, pp. 537\u2013540 (1999)","DOI":"10.1109\/ICIP.1999.817172"},{"key":"9_CR79","doi-asserted-by":"crossref","unstructured":"Kushki, A., Plataniotis, K.N., Venetsanopoulos, A.N.: Sensor selection for mitigation of RSS-based attacks in wireless local area network positioning. In: 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 2065\u20132068 (2008)","DOI":"10.1109\/ICASSP.2008.4518047"},{"key":"9_CR80","doi-asserted-by":"publisher","unstructured":"Li, X., Chen, Y., Yang, J., Zheng, X.: Designing localization algorithms robust to signal strength attacks, pp. 341\u2013345, April 2011. https:\/\/doi.org\/10.1109\/INFCOM.2011.5935178","DOI":"10.1109\/INFCOM.2011.5935178"},{"key":"9_CR81","unstructured":"Li, Z., Trappe, W., Zhang, Y., Nath, B.: Robust statistical methods for securing wireless localization in sensor networks. In: Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005, pp. 91\u201398 (2005)"},{"key":"9_CR82","doi-asserted-by":"crossref","unstructured":"Lin, C.W., Sangiovanni-Vincentelli, A.: Cyber-security for the controller area network (CAN) communication protocol. In: 2012 International Conference on Cyber Security, pp. 1\u20137. IEEE (2012)","DOI":"10.1109\/CyberSecurity.2012.7"},{"key":"9_CR83","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-04385-7_13","volume-title":"Mobile Entity Localization and Tracking in GPS-less Environnments","author":"H Lin","year":"2009","unstructured":"Lin, H., Zhang, Y., Griss, M., Landa, I.: WASP: an enhanced indoor locationing algorithm for a congested Wi-Fi environment. In: Fuller, R., Koutsoukos, X.D. (eds.) MELT 2009. LNCS, vol. 5801, pp. 183\u2013196. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-04385-7_13"},{"key":"9_CR84","doi-asserted-by":"publisher","first-page":"1331","DOI":"10.1109\/TIFS.2019.2924552","volume":"15","author":"O Mayer","year":"2020","unstructured":"Mayer, O., Stamm, M.C.: Forensic similarity for digital images. IEEE Trans. Inf. Forensics Secur. 15, 1331\u20131346 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"9_CR85","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1109\/JSTSP.2018.2796446","volume":"12","author":"K Merchant","year":"2018","unstructured":"Merchant, K., Revay, S., Stantchev, G., Nousain, B.: Deep learning for RF device fingerprinting in cognitive communication networks. IEEE J. Sel. Top. Signal Process. 12(1), 160\u2013167 (2018)","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"9_CR86","unstructured":"Michalevsky, Y., Boneh, D., Nakibly, G.: Gyrophone: recognizing speech from gyroscope signals. In: 23rd USENIX Security Symposium (USENIX Security 2014), San Diego, CA, pp. 1053\u20131067. USENIX Association, August 2014. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/michalevsky"},{"key":"9_CR87","unstructured":"Miller, C., Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015, 91 (2015)"},{"key":"9_CR88","unstructured":"Nakibly, G., Shelef, G., Yudilevich, S.: Hardware fingerprinting using HTML5, March 2015"},{"key":"9_CR89","doi-asserted-by":"crossref","unstructured":"Nowdehi, N., Lautenbach, A., Olovsson, T.: In-vehicle can message authentication: an evaluation based on industrial criteria. In: 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), pp. 1\u20137 (2017)","DOI":"10.1109\/VTCFall.2017.8288327"},{"key":"9_CR90","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-662-53140-2_6","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"S N\u00fcrnberger","year":"2016","unstructured":"N\u00fcrnberger, S., Rossow, C.: \u2013 vatiCAN \u2013 vetted, authenticated CAN Bus. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 106\u2013124. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_6"},{"key":"9_CR91","unstructured":"Olejnik, L., Acar, G., Castelluccia, C., D\u00edaz, C.: The leaking battery - a privacy analysis of the HTML5 battery status API. IACR Cryptology ePrint Archive 2015, 616 (2015)"},{"key":"9_CR92","doi-asserted-by":"publisher","unstructured":"Organero, M., Brito-Pacheco, C.: Improving accuracy and simplifying training in fingerprinting-based indoor location algorithms at room level. Mob. Inf. Syst. 2016 (2016). https:\/\/doi.org\/10.1155\/2016\/2682869","DOI":"10.1155\/2016\/2682869"},{"issue":"9","key":"9_CR93","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.1016\/j.comnet.2009.11.007","volume":"54","author":"P Peris-Lopez","year":"2010","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Li, T., Li, Y.: Vulnerability analysis of RFID protocols for tag ownership transfer. Comput. Netw. 54(9), 1502\u20131508 (2010)","journal-title":"Comput. Netw."},{"key":"9_CR94","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-16342-5_28","volume-title":"Information Security and Cryptology","author":"P Peris-Lopez","year":"2010","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M.E., Li, T., van der Lubbe, J.C.A.: Weaknesses in two recent lightweight RFID authentication protocols. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds.) Inscrypt 2009. LNCS, vol. 6151, pp. 383\u2013392. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16342-5_28"},{"key":"9_CR95","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., van der Lubbe, J.C.A.: Security flaws in a recent ultralightweight RFID protocol. In: Workshop on RFID Security - RFIDSec Asia 2010. Cryptology and Information Security, Singapore, Republic of Singapore, vol. 4, pp. 83\u201393. IOS Press, February 2010"},{"key":"9_CR96","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Palomar, E., van der Lubbe, J.C.A.: Cryptographic puzzles and distance-bounding protocols: practical tools for RFID security. In: IEEE International Conference on RFID - IEEE RFID 2010, Orlando, Florida, USA, pp. 45\u201352. IEEE Computer Society, April 2010","DOI":"10.1109\/RFID.2010.5467258"},{"key":"9_CR97","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/11872153_14","volume-title":"Personal Wireless Communications","author":"P Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: RFID systems: a survey on security threats and proposed solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159\u2013170. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11872153_14"},{"key":"9_CR98","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. In: Workshop on RFID Security - RFIDSec 2007, Malaga, Spain, July 2007"},{"key":"9_CR99","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-642-21518-6_30","volume-title":"Information Security and Cryptology","author":"P Peris-Lopez","year":"2011","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Phan, R.C.-W., Tapiador, J.M.E., Li, T.: Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol. In: Lai, X., Yung, M., Lin, D. (eds.) Inscrypt 2010. LNCS, vol. 6584, pp. 427\u2013442. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21518-6_30"},{"issue":"6","key":"9_CR100","doi-asserted-by":"publisher","first-page":"1061","DOI":"10.1016\/j.engappai.2011.04.001","volume":"24","author":"P Peris-Lopez","year":"2011","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Tapiador, J.M., van der Lubbe, J.C.: Cryptanalysis of an EPC class-1 generation-2 standard compliant authentication protocol. Eng. Appl. Artif. Intell. 24(6), 1061\u20131069 (2011)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"1","key":"9_CR101","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/COMST.2014.2345420","volume":"17","author":"J Petit","year":"2014","unstructured":"Petit, J., Schaub, F., Feiri, M., Kargl, F.: Pseudonym schemes in vehicular networks: a survey. IEEE Commun. Surv. Tutor. 17(1), 228\u2013255 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"9_CR102","doi-asserted-by":"crossref","unstructured":"Quiring, E., Kirchner, M., Rieck, K.: On the security and applicability of fragile camera fingerprints, July 2019","DOI":"10.1007\/978-3-030-29959-0_22"},{"issue":"10","key":"9_CR103","doi-asserted-by":"publisher","first-page":"4055","DOI":"10.1007\/s12652-019-01662-y","volume":"11","author":"X Rao","year":"2020","unstructured":"Rao, X., Li, Z., Yang, Y.: Device-free passive wireless localization system with transfer deep learning method. J. Ambient. Intell. Hum. Comput. 11(10), 4055\u20134071 (2020). https:\/\/doi.org\/10.1007\/s12652-019-01662-y","journal-title":"J. Ambient. Intell. Hum. Comput."},{"issue":"3","key":"9_CR104","first-page":"229","volume":"2","author":"RL Rivest","year":"1987","unstructured":"Rivest, R.L.: Learning decision lists. Mach. Learn. 2(3), 229\u2013246 (1987)","journal-title":"Mach. Learn."},{"key":"9_CR105","doi-asserted-by":"crossref","unstructured":"R\u00fchrmair, U., S\u00f6lter, J.: PUF modeling attacks: an introduction and overview. In: 2014 Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1\u20136 (2014)","DOI":"10.7873\/DATE.2014.361"},{"key":"9_CR106","doi-asserted-by":"crossref","unstructured":"Safkhani, M., Bagheri, N., Peris-Lopez, N., Mitrokotsa, A., Hernandez-Castro, J.C.: Weaknesses in another Gen2-based RFID authentication protocol. In: IEEE International Conference on RFID-Technology and Applications - IEEE RFID TA 2012, Nice, France. IEEE Press, IEEE, November 2012","DOI":"10.1109\/RFID-TA.2012.6404572"},{"key":"9_CR107","doi-asserted-by":"crossref","unstructured":"Safkhani, M., Peris-Lopez, P., Badheri, N., Naderi, M., Hernandez-Castro, J.C.: On the security of Tan et al. serverless RFID authentication and search protocols. In: Workshop on RFID Security - RFIDSec 2012, Nijmegen, Netherlands, June 2012","DOI":"10.1007\/978-3-642-36140-1_1"},{"key":"9_CR108","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.cam.2013.09.073","volume":"259","author":"M Safkhani","year":"2013","unstructured":"Safkhani, M., Peris-Lopez, P., Hernandez-Castro, J.C., Bagheri, N.: Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol. J. Comput. Appl. Math. 259, 571\u2013577 (2013)","journal-title":"J. Comput. Appl. Math."},{"key":"9_CR109","doi-asserted-by":"crossref","unstructured":"Safkhani, M., Peris-Lopez, P., Hernandez-Castro, J.C., Bagheri, N., Naderi, M.: Cryptanalysis of Cho et al\u2019.s protocol, a hash-based mutual authentication protocol for RFID systems. Cryptology ePrint Archive, Report 2011\/311 (2011)","DOI":"10.1007\/978-3-642-30955-7_4"},{"key":"9_CR110","doi-asserted-by":"publisher","unstructured":"Sagong, S., Ying, X., Clark, A., Bushnell, L., Poovendran, R.: Cloaking the clock: emulating clock skew in controller area networks, pp. 32\u201342, April 2018. https:\/\/doi.org\/10.1109\/ICCPS.2018.00012","DOI":"10.1109\/ICCPS.2018.00012"},{"key":"9_CR111","doi-asserted-by":"crossref","unstructured":"Sankhe, K., Belgiovine, M., Zhou, F., Riyaz, S., Ioannidis, S., Chowdhury, K.: Oracle: optimized radio classification through convolutional neural networks. In: IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, pp. 370\u2013378 (2019)","DOI":"10.1109\/INFOCOM.2019.8737463"},{"key":"9_CR112","unstructured":"Santikellur, P., Bhattacharyay, A., Chakraborty, R.S.: Deep learning based model building attacks on arbiter PUF compositions. IACR Cryptology ePrint Archive 2019, 566 (2019)"},{"key":"9_CR113","doi-asserted-by":"crossref","unstructured":"Schweppe, H., Roudier, Y., Weyl, B., Apvrille, L., Scheuermann, D.: Car2x communication: securing the last meter-a cost-effective approach for ensuring trust in car2x applications using in-vehicle symmetric cryptography. In: 2011 IEEE Vehicular Technology Conference (VTC Fall), pp. 1\u20135. IEEE (2011)","DOI":"10.1109\/VETECF.2011.6093081"},{"key":"9_CR114","doi-asserted-by":"publisher","unstructured":"Shaik, A., Borgaonkar, R., Park, S., Seifert, J.P.: New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, pp. 221\u2013231. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3317549.3319728","DOI":"10.1145\/3317549.3319728"},{"key":"9_CR115","doi-asserted-by":"crossref","unstructured":"Shields, C., Levine, B.N.: A protocol for anonymous communication over the internet. In: Proceedings of the 7th ACM Conference on Computer and Communications Security, pp. 33\u201342 (2000)","DOI":"10.1145\/352600.352607"},{"key":"9_CR116","doi-asserted-by":"publisher","unstructured":"Smith, L., et al.: Classifying WiFi \u201cphysical fingerprints\u201d using complex deep learning. In: Hammoud, R.I., Overman, T.L., Mahalanobis, A. (eds.) Automatic Target Recognition XXX, vol. 11394, pp. 82\u201396. International Society for Optics and Photonics, SPIE (2020). https:\/\/doi.org\/10.1117\/12.2557933","DOI":"10.1117\/12.2557933"},{"key":"9_CR117","doi-asserted-by":"publisher","unstructured":"Smith, S.: Cryptographic scalability challenges in the smart grid, pp. 1\u20133, January 2012. https:\/\/doi.org\/10.1109\/ISGT.2012.6175564","DOI":"10.1109\/ISGT.2012.6175564"},{"issue":"4","key":"9_CR118","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/MWC.2014.6882302","volume":"21","author":"KP Subbu","year":"2014","unstructured":"Subbu, K.P., Zhang, C., Luo, J., Vasilakos, A.V.: Analysis and status quo of smartphone-based indoor localization systems. IEEE Wirel. Commun. 21(4), 106\u2013112 (2014)","journal-title":"IEEE Wirel. Commun."},{"key":"9_CR119","unstructured":"Subramaniam, N.: Google buys slicklogin: this is how its sound-based password system works (2014). https:\/\/www.firstpost.com\/tech\/news-analysis\/google-buys-slicklogin-heres-sound-based-password-system-works-3647955.html"},{"key":"9_CR120","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv:1312.6199 (2013)"},{"key":"9_CR121","unstructured":"Tromba, D., Huber, J.: Assessment and guidance for autosar secure onboard communication application. In: 17th Escar Europe: Embedded Security in Cars (Konferenzver\u00f6ffentlichung). (Extended Abstract) (2019)"},{"key":"9_CR122","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-319-30806-7_7","volume-title":"Engineering Secure Software and Systems","author":"T Van Goethem","year":"2016","unstructured":"Van Goethem, T., Scheepers, W., Preuveneers, D., Joosen, W.: Accelerometer-based device fingerprinting for multi-factor mobile authentication. In: Caballero, J., Bodden, E., Athanasopoulos, E. (eds.) ESSoS 2016. LNCS, vol. 9639, pp. 106\u2013121. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-30806-7_7"},{"key":"9_CR123","unstructured":"Van Herrewege, A., Singelee, D., Verbauwhede, I.: CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. In: ECRYPT Workshop on Lightweight Cryptography, vol. 2011, p. 20 (2011)"},{"key":"9_CR124","doi-asserted-by":"crossref","unstructured":"Wang, H., Cheng, W., Xu, C., Zhang, M., Hu, L.: Method for identifying pseudo GPS signal based on radio frequency fingerprint. In: 2018 10th International Conference on Communications, Circuits and Systems (ICCCAS), pp. 354\u2013358 (2018)","DOI":"10.1109\/ICCCAS.2018.8769313"},{"key":"9_CR125","doi-asserted-by":"crossref","unstructured":"Wang, Q., Sawhney, S.: Vecure: a practical security framework to protect the can bus of vehicles. In: 2014 International Conference on the Internet of Things (IOT), pp. 13\u201318. IEEE (2014)","DOI":"10.1109\/IOT.2014.7030108"},{"key":"9_CR126","unstructured":"Wang, Y., Yang, X., Zhao, Y., Liu, Y., Cuthbert, L.: Bluetooth positioning using RSSI and triangulation methods. In: 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), pp. 837\u2013842 (2013)"},{"key":"9_CR127","unstructured":"Weimerskirch, A.: Automotive and industrial data security. In: Cybersecurity and Cyber-physical Systems Workshop (2012)"},{"key":"9_CR128","unstructured":"Weisglass, Y., Oren, Y.: Authentication method for can messages. Escar Europe (2016)"},{"issue":"2","key":"9_CR129","first-page":"993","volume":"16","author":"S Woo","year":"2014","unstructured":"Woo, S., Jo, H.J., Lee, D.H.: A practical wireless attack on the connected car and security protocol for in-vehicle can. IEEE Trans. Intell. Transp. Syst. 16(2), 993\u20131006 (2014)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"24","key":"9_CR130","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1049\/el.2018.6404","volume":"54","author":"Q Wu","year":"2018","unstructured":"Wu, Q., et al.: Deep learning based RF fingerprinting for device identification and wireless security. Electron. Lett. 54(24), 1405\u20131407 (2018)","journal-title":"Electron. Lett."},{"key":"9_CR131","doi-asserted-by":"crossref","unstructured":"Yang, J., Chen, Y., Lawrence, V.B., Swaminathan, V.: Robust wireless localization to attacks on access points. In: 2009 IEEE Sarnoff Symposium, pp. 1\u20135 (2009)","DOI":"10.1109\/SARNOF.2009.4850372"},{"key":"9_CR132","doi-asserted-by":"crossref","unstructured":"Yu, J., et al.: Radio frequency fingerprint identification based on denoising autoencoders, July 2019","DOI":"10.1109\/WiMOB.2019.8923325"},{"key":"9_CR133","doi-asserted-by":"crossref","unstructured":"Yuan, L., Hu, Y., Li, Y., Zhang, R., Zhang, Y., Hedgpeth, T.: Secure RSS-fingerprint-based indoor positioning: attacks and countermeasures. In: 2018 IEEE Conference on Communications and Network Security (CNS), pp. 1\u20139 (2018)","DOI":"10.1109\/CNS.2018.8433131"},{"key":"9_CR134","unstructured":"Zalewski, M.: p0f (2012). http:\/\/lcamtuf.coredump.cx\/p0f3\/"},{"key":"9_CR135","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCYB.2016.2557802","volume":"47","author":"H Zeng","year":"2016","unstructured":"Zeng, H., Liu, J., Yu, J., Kang, X., Shi, Y., Wang, Z.: A framework of camera source identification Bayesian game. IEEE Trans. Cybern. 47, 1\u201312 (2016). https:\/\/doi.org\/10.1109\/TCYB.2016.2557802","journal-title":"IEEE Trans. Cybern."},{"issue":"7","key":"9_CR136","doi-asserted-by":"publisher","first-page":"3142","DOI":"10.1109\/TIP.2017.2662206","volume":"26","author":"K Zhang","year":"2017","unstructured":"Zhang, K., Zuo, W., Chen, Y., Meng, D., Zhang, L.: Beyond a Gaussian denoiser: residual learning of deep CNN for image denoising. IEEE Trans. Image Process. 26(7), 3142\u20133155 (2017)","journal-title":"IEEE Trans. Image Process."},{"key":"9_CR137","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1007\/978-3-662-43871-8_110","volume-title":"LISS 2014","author":"C Zhou","year":"2015","unstructured":"Zhou, C., Xie, H., Shi, J.: Wi-Fi indoor location technology based on k-means algorithm. In: Zhang, Z., Shen, Z.M., Zhang, J., Zhang, R. (eds.) LISS 2014, pp. 765\u2013770. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-43871-8_110"},{"issue":"5","key":"9_CR138","doi-asserted-by":"publisher","first-page":"596","DOI":"10.3390\/s16050596","volume":"16","author":"Y Zhuang","year":"2016","unstructured":"Zhuang, Y., Yang, J., Li, Y., Qi, L., El-Sheimy, N.: Smartphone-based indoor localization with Bluetooth low energy beacons. Sensors 16(5), 596 (2016)","journal-title":"Sensors"},{"key":"9_CR139","doi-asserted-by":"publisher","first-page":"3736","DOI":"10.3390\/s18113736","volume":"18","author":"Z Zuo","year":"2018","unstructured":"Zuo, Z., Liu, L., Zhang, L., Fang, Y.: Indoor positioning based on Bluetooth low-energy beacons adopting graph optimization. Sensors 18, 3736 (2018). https:\/\/doi.org\/10.3390\/s18113736","journal-title":"Sensors"}],"container-title":["Lecture Notes in Computer Science","Security and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-98795-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T19:52:16Z","timestamp":1726948336000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-98795-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030987947","9783030987954"],"references-count":139,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-98795-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"8 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}