{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T12:03:21Z","timestamp":1777982601422,"version":"3.51.4"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:00:00Z","timestamp":1731974400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:00:00Z","timestamp":1731974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-024-00077-2","type":"journal-article","created":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T11:39:28Z","timestamp":1732016368000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Assessing adversarial replay and deep learning-driven attacks on specific emitter identification-based security approaches"],"prefix":"10.1007","volume":"4","author":[{"given":"Joshua H.","family":"Tyler","sequence":"first","affiliation":[]},{"given":"Mohamed K. M.","family":"Fadul","sequence":"additional","affiliation":[]},{"given":"Matthew R.","family":"Hilling","sequence":"additional","affiliation":[]},{"given":"Donald R.","family":"Reising","sequence":"additional","affiliation":[]},{"given":"T. Daniel","family":"Loveless","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,19]]},"reference":[{"key":"77_CR1","unstructured":"Langley L. Specific emitter identification (SEI) and classical parameter fusion technology. In: Proceedings of WESCON\u201993. IEEE; 1993."},{"key":"77_CR2","doi-asserted-by":"crossref","unstructured":"Restuccia F, et al. Deepradioid: real-time channel-resilient optimization of deep learning-based radio fingerprinting algorithms. In: Proceedings of the twentieth ACM international symposium on mobile ad hoc networking and computing. 2019.","DOI":"10.1145\/3323679.3326503"},{"issue":"1","key":"77_CR3","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/COMST.2015.2476338","volume":"18","author":"Q Xu","year":"2015","unstructured":"Xu Q, Zheng R, Saad W, Han Z. Device fingerprinting in wireless networks: challenges and opportunities. IEEE Commun Surv Tutor. 2015;18(1):94\u2013104.","journal-title":"IEEE Commun Surv Tutor"},{"key":"77_CR4","doi-asserted-by":"crossref","unstructured":"Han H, Cui L, Li W, Huang L, Cai Y, Cai J, Zhang Y. Radio frequency fingerprint based wireless transmitter identification against malicious attacker: an adversarial learning approach. In: IEEE international conference on wireless communications and signal processing (WCSP). 2020.","DOI":"10.1109\/WCSP49889.2020.9299859"},{"key":"77_CR5","unstructured":"Abadi M, et al. TensorFlow: large-scale machine learning on heterogeneous systems. Software available from tensorflow.org. 2015. https:\/\/www.tensorflow.org\/."},{"issue":"4","key":"77_CR6","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MP.2004.1343223","volume":"23","author":"M Sadiku","year":"2004","unstructured":"Sadiku M, Akujuobi C. Software-defined radio: a brief overview. IEEE Potentials. 2004;23(4):14\u20135.","journal-title":"IEEE Potentials"},{"key":"77_CR7","doi-asserted-by":"crossref","unstructured":"Danev B, Luecken H, Capkun S, El Defrawy K. Attacks on physical-layer identification. In: Proceedings of the third ACM conference on wireless network security. 2010.","DOI":"10.1145\/1741866.1741882"},{"key":"77_CR8","doi-asserted-by":"crossref","unstructured":"Restuccia F, et al. Hacking the waveform: generalized wireless adversarial deep learning. arXiv preprint. 2020. arXiv:2005.02270.","DOI":"10.1145\/3395352.3402625"},{"issue":"1","key":"77_CR9","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1109\/TCCN.2020.3010330","volume":"7","author":"Y Shi","year":"2020","unstructured":"Shi Y, Davaslioglu K, Sagduyu Y. Generative adversarial network in the air: deep adversarial learning for wireless signal spoofing. IEEE Trans Cogn Commun Netw. 2020;7(1):294\u2013303.","journal-title":"IEEE Trans Cogn Commun Netw"},{"key":"77_CR10","doi-asserted-by":"crossref","unstructured":"Karunaratne S, Krijestorac E, Cabric D. Penetrating RF fingerprinting-based authentication with a generative adversarial attack. In: IEEE international conference on communications (ICC). 2021.","DOI":"10.1109\/ICC42927.2021.9500893"},{"issue":"10","key":"77_CR11","doi-asserted-by":"publisher","first-page":"8356","DOI":"10.1109\/JIOT.2020.3045305","volume":"8","author":"D Reising","year":"2020","unstructured":"Reising D, Cancelleri J, Loveless D, Kandah F, Skjellum A. Radio identity verification-based IoT security using RF-DNA fingerprints and SVM. IEEE Internet Things J. 2020;8(10):8356\u201371.","journal-title":"IEEE Internet Things J"},{"key":"77_CR12","unstructured":"Ettus Research. USRP hardware driver and USRP manual. 2020. https:\/\/www.ettus.com\/all-products\/ub210-kit\/."},{"key":"77_CR13","unstructured":"Great Scott Gadgets. HackRF one. 2020. https:\/\/greatscottgadgets.com\/hackrf\/one\/."},{"key":"77_CR14","doi-asserted-by":"crossref","unstructured":"Tyler J, Fadul M, Reising D, Kaplanoglu E. Simplified denoising for robust specific emitter identification of preamble-based waveforms. In: IEEE global communications conference (GLOBECOM). 2021.","DOI":"10.1109\/GLOBECOM46510.2021.9685918"},{"key":"77_CR15","unstructured":"IEEE Computer Society LAN\/MAN Standards Committee, et al. IEEE standard for information technology-telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements part 11: wireless LAN medium access control and physical layer specifications. IEEE Std 802.11; 2007."},{"key":"77_CR16","unstructured":"Jeffrey P, Ben G, Ramakrishna G, Srinivasan S, David W. 802.11 user fingerprinting. In: ACM Int\u2019l Conf on mobile computing & networking. 2013."},{"issue":"3","key":"77_CR17","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1504\/IJESDF.2008.020946","volume":"1","author":"W Suski II","year":"2008","unstructured":"Suski W II, Temple M, Mendenhall M, Mills R. Radio frequency fingerprinting commercial communication devices to enhance electronic security. Int J Electron Secur Digit Forensics. 2008;1(3):301\u201322.","journal-title":"Int J Electron Secur Digit Forensics"},{"key":"77_CR18","doi-asserted-by":"crossref","unstructured":"Liu M-W, Doherty J. Specific emitter identification using nonlinear device estimation. In: IEEE Sarnoff symposium. 2008.","DOI":"10.1109\/SARNOF.2008.4520119"},{"issue":"2","key":"77_CR19","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.camwa.2010.01.002","volume":"60","author":"D Takahashi","year":"2010","unstructured":"Takahashi D, Xiao Y, Zhang Y, Chatzimisios P, Chen H-H. IEEE 802.11 user fingerprinting and its applications for intrusion detection. Comput Math Appl. 2010;60(2):307\u201318.","journal-title":"Comput Math Appl"},{"issue":"3","key":"77_CR20","doi-asserted-by":"publisher","first-page":"1076","DOI":"10.1109\/TIFS.2011.2134848","volume":"6","author":"M-W Liu","year":"2011","unstructured":"Liu M-W, Doherty J. Nonlinearity estimation for specific emitter identification in multipath channels. IEEE Trans Inf Forensics Secur. 2011;6(3):1076\u201385.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"77_CR21","doi-asserted-by":"publisher","first-page":"1180","DOI":"10.1109\/TIFS.2015.2400426","volume":"10","author":"D Reising","year":"2015","unstructured":"Reising D, Temple M, Jackson J. Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints. IEEE Trans Inf Forensics Secur. 2015;10(6):1180\u201392.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"77_CR22","doi-asserted-by":"crossref","unstructured":"Wheeler C, Reising D. Assessment of the impact of CFO on RF-DNA fingerprint classification performance. In: IEEE international conference on computing, networking and communications (ICNC). 2017.","DOI":"10.1109\/ICCNC.2017.7876111"},{"key":"77_CR23","doi-asserted-by":"crossref","unstructured":"Fadul M, Reising D, Loveless D, Ofoli A. RF-DNA fingerprint classification of OFDM signals using a Rayleigh fading channel model. In: IEEE wireless communications and networking conference (WCNC). 2019.","DOI":"10.1109\/WCNC.2019.8885421"},{"key":"77_CR24","doi-asserted-by":"publisher","first-page":"2381","DOI":"10.1109\/TIFS.2021.3054524","volume":"16","author":"M Fadul","year":"2021","unstructured":"Fadul M, Reising D, Loveless D, Ofoli A. Nelder-mead simplex channel estimation for the RF-DNA fingerprinting of OFDM transmitters under Rayleigh fading conditions. IEEE Trans Inf Forensics Secur. 2021;16:2381\u201396.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"77_CR25","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/MCOM.2018.1800153","volume":"56","author":"S Riyaz","year":"2018","unstructured":"Riyaz S, Sankhe K, Ioannidis S, Chowdhury K. Deep learning convolutional neural networks for radio identification. IEEE Commun Mag. 2018;56(9):146\u201352.","journal-title":"IEEE Commun Mag"},{"key":"77_CR26","doi-asserted-by":"crossref","unstructured":"Tyler J, Fadul M, Reising D, Kandah F. An analysis of signal energy impacts and threats to deep learning based SEI. In: IEEE international conference on communications (ICC). 2022.","DOI":"10.1109\/ICC45855.2022.9838884"},{"issue":"3","key":"77_CR27","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/0165-1684(96)00014-X","volume":"49","author":"M Bastiaans","year":"1996","unstructured":"Bastiaans M, Geilen M. On the discrete Gabor transform and the discrete Zak transform. Signal Process. 1996;49(3):151\u201366.","journal-title":"Signal Process"},{"key":"77_CR28","volume-title":"Internet of things: the global IoT summit, GIoTS","author":"M Fadul","year":"2022","unstructured":"Fadul M, Willis J, Reising D, Loveless D. An analysis of process parameters for the optimization of specific emitter identification under Rayleigh fading. In: Internet of things: the global IoT summit, GIoTS. Cham: Springer; 2022."},{"key":"77_CR29","volume-title":"Pattern recognition","author":"S Theodoridis","year":"2006","unstructured":"Theodoridis S, Koutroumbas K. Pattern recognition. Amsterdam: Elsevier; 2006."},{"key":"77_CR30","volume-title":"Deep learning: a practitioner\u2019s approach","author":"J Patterson","year":"2017","unstructured":"Patterson J, Gibson A. Deep learning: a practitioner\u2019s approach. Sebastopol: O\u2019Reilly Media, Inc.; 2017."},{"key":"77_CR31","doi-asserted-by":"publisher","first-page":"17100","DOI":"10.1109\/ACCESS.2021.3053491","volume":"9","author":"M Fadul","year":"2021","unstructured":"Fadul M, Reising D, Sartipi M. Identification of OFDM-based radios under Rayleigh fading using RF-DNA and deep learning. IEEE Access. 2021;9:17100\u201313.","journal-title":"IEEE Access"},{"key":"77_CR32","doi-asserted-by":"crossref","unstructured":"Fadul M, Reising D, Arasu K, Clark M. Adversarial machine learning for enhanced spread spectrum communications. In: IEEE military communications conference (MILCOM). 2021.","DOI":"10.1109\/MILCOM52596.2021.9652911"},{"key":"77_CR33","doi-asserted-by":"crossref","unstructured":"Tyler J, Fadul M, Reising D, Liang Y. Assessing the presence of intentional waveform structure in preamble-based SEI. In: IEEE global communications conference (GLOBECOM). 2022.","DOI":"10.1109\/GLOBECOM48099.2022.10001025"},{"key":"77_CR34","volume-title":"Deep learning","author":"I Goodfellow","year":"2016","unstructured":"Goodfellow I, Bengio Y, Courville A. Deep learning. Cambridge: MIT press; 2016."},{"issue":"11","key":"77_CR35","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/3422622","volume":"63","author":"I Goodfellow","year":"2020","unstructured":"Goodfellow I, et al. Generative adversarial networks. Commun ACM. 2020;63(11):139\u201344.","journal-title":"Commun ACM"},{"issue":"1","key":"77_CR36","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","volume":"35","author":"A Creswell","year":"2018","unstructured":"Creswell A, White T, Dumoulin V, Arulkumaran K, Sengupta B, Bharath AA. Generative adversarial networks: an overview. IEEE Signal Process Mag. 2018;35(1):53\u201365.","journal-title":"IEEE Signal Process Mag"},{"issue":"12","key":"77_CR37","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1109\/26.650240","volume":"45","author":"T Schmidl","year":"1997","unstructured":"Schmidl T, Cox D. Robust frequency and timing synchronization for OFDM. IEEE Trans Commun. 1997;45(12):1613\u201321.","journal-title":"IEEE Trans Commun"},{"key":"77_CR38","unstructured":"Kawalec A, Owczarek R. Specific emitter identification using intrapulse data. In: First European radar conference, 2004. EURAD. IEEE; 2004. p. 249\u201352."},{"issue":"20","key":"77_CR39","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1049\/ell2.12257","volume":"57","author":"X Zha","year":"2021","unstructured":"Zha X, Li T, Qiu Z, Feng Y. A novel anti-doppler SEI algorithm based on the vector diagram decomposition. Electron Lett. 2021;57(20):785\u20137.","journal-title":"Electron Lett"},{"key":"77_CR40","doi-asserted-by":"publisher","first-page":"3194","DOI":"10.1109\/TIFS.2024.3360851","volume":"19","author":"MK Fadul","year":"2024","unstructured":"Fadul MK, Reising DR, Weerasena LP, Loveless TD, Sartipi M, Tyler JH. Improving RF-DNA fingerprinting performance in an indoor multipath environment using semi-supervised learning. IEEE Trans Inf Forensics Secur. 2024;19:3194\u2013209.","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"77_CR41","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1002\/j.1538-7305.1968.tb00069.x","volume":"47","author":"RH Clarke","year":"1968","unstructured":"Clarke RH. A statistical theory of mobile\u2013radio reception. Bell Syst Tech J. 1968;47(6):957\u20131000.","journal-title":"Bell Syst Tech J"},{"key":"77_CR42","doi-asserted-by":"crossref","unstructured":"Reising DR, Tyler JH, Fadul MK, Hilling MR, Loveless TD. RF fingerprint-based identity verification in the presence of an SEI mimicking adversary. In: 2023 19th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE; 2023. p. 438\u201344.","DOI":"10.1109\/WiMob58348.2023.10187867"},{"issue":"3","key":"77_CR43","doi-asserted-by":"publisher","first-page":"237","DOI":"10.23919\/JCIN.2020.9200889","volume":"5","author":"L Bai","year":"2020","unstructured":"Bai L, Zhu L, Liu J, Choi J, Zhang W. Physical layer authentication in wireless communication networks: a survey. J Commun Inf Netw. 2020;5(3):237\u201364.","journal-title":"J Commun Inf Netw"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-024-00077-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-024-00077-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-024-00077-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T11:49:11Z","timestamp":1732016951000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-024-00077-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,19]]},"references-count":43,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["77"],"URL":"https:\/\/doi.org\/10.1007\/s43926-024-00077-2","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.23276399.v1","asserted-by":"object"},{"id-type":"doi","id":"10.21203\/rs.3.rs-3256488\/v1","asserted-by":"object"}]},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,19]]},"assertion":[{"value":"11 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"25"}}