{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T23:48:06Z","timestamp":1773013686476,"version":"3.50.1"},"reference-count":29,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":287,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92267204"],"award-info":[{"award-number":["92267204"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202355"],"award-info":[{"award-number":["62202355"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100015401","name":"Key Research and Development Projects of Shaanxi Province","doi-asserted-by":"publisher","award":["2024GX-YBXM-028"],"award-info":[{"award-number":["2024GX-YBXM-028"]}],"id":[{"id":"10.13039\/501100015401","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014761","name":"Natural Science Foundation of Qingdao","doi-asserted-by":"publisher","award":["25-1-1-156-zyyd-jch"],"award-info":[{"award-number":["25-1-1-156-zyyd-jch"]}],"id":[{"id":"10.13039\/501100014761","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100020196","name":"Shandong Provincial Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["SDCX-ZG-202302027"],"award-info":[{"award-number":["SDCX-ZG-202302027"]}],"id":[{"id":"10.13039\/501100020196","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>Traditional physical\u2010layer authentication (PLA) approaches primarily rely on a limited set of hardware features, which restricts their robustness and accuracy in dynamic wireless environments. This paper proposes a novel PLA enhancement framework based on nonlinear signal analysis, introducing detrended fluctuation analysis (DFA) as a distinctive hardware fingerprinting feature. We first model the statistical properties of DFA and analytically derive its dependence on intrinsic hardware imperfections, thereby establishing its feasibility for device authentication. To improve overall system performance, the DFA feature is further fused with conventional features such as fractal dimension and carrier frequency offset (CFO) within a shallow classification framework. Experimental evaluation is conducted on real signal data collected from 28 commercial devices, demonstrating that the proposed multifeature PLA scheme can significantly improve authentication accuracy, confirming the effectiveness of DFA in enhancing physical\u2010layer security without additional cryptographic overhead.<\/jats:p>","DOI":"10.1049\/ise2\/8683522","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:42:32Z","timestamp":1760596952000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Radio Frequency Fingerprinting for WiFi Authentication Based on Detrended Fluctuation Analysis"],"prefix":"10.1049","volume":"2025","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5066-1999","authenticated-orcid":false,"given":"Shuguang","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4524-6620","authenticated-orcid":false,"given":"Songyan","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2269-6105","authenticated-orcid":false,"given":"Tingjia","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7677-4027","authenticated-orcid":false,"given":"Shuangrui","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4156-0157","authenticated-orcid":false,"given":"Jiandong","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8448-705X","authenticated-orcid":false,"given":"Yulong","family":"Shen","sequence":"additional","affiliation":[]}],"member":"265","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2948888"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.1999.5340509"},{"key":"e_1_2_11_3_2","article-title":"Overview of Wireless Sensor Network Security Technologies","volume":"8","author":"Pei Q.","year":"2007","journal-title":"Journal of Communications"},{"key":"e_1_2_11_4_2","article-title":"Network Authentication, Authorization, and Accounting","volume":"10","author":"Convery S.","year":"2007","journal-title":"Internet Protocol"},{"key":"e_1_2_11_5_2","first-page":"44","article-title":"Your 80211 Wireless Network has no Clothes","volume":"9","author":"Arbaugh W. A.","year":"2002","journal-title":"IEEE Communications Magazine"},{"key":"e_1_2_11_6_2","first-page":"237","article-title":"Physical Layer Authentication in Wireless Communication Networks: A Survey","volume":"5","author":"Bai L.","year":"2020","journal-title":"Journal of Communications and Networks"},{"key":"e_1_2_11_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2017.2713305"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3526579"},{"key":"e_1_2_11_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2025.3598034"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.70085"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3042188"},{"key":"e_1_2_11_12_2","first-page":"305","article-title":"Research Status and Trends of Radio Frequency Fingerprint Recognition","volume":"35","author":"Zeng Y.","year":"2020","journal-title":"Journal of Radio Science"},{"key":"e_1_2_11_13_2","doi-asserted-by":"crossref","unstructured":"BrikV. BanerjeeS. GruteserM. andOhS. Wireless Device Identification With Radiometric Signatures Proceedings of the 14th ACM International Conference on Mobile Computing and Networking 2008 Association for Computing Machinery 116\u2013127 https:\/\/doi.org\/10.1145\/1409944.","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.05.028"},{"key":"e_1_2_11_15_2","first-page":"1","article-title":"WiFi RF Fingerprint Extraction Method Based on Power Spectrum Features","volume":"02","author":"Chen T.","year":"2021","journal-title":"Journal of Information Security"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3276519"},{"key":"e_1_2_11_17_2","first-page":"1416","article-title":"Fractal Dimension of DSSS Frame Preamble: Radiometric Feature for Wireless Device Identification","volume":"23","author":"Li X.","year":"2023","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2020.2978333"},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4371(01)00144-3"},{"key":"e_1_2_11_20_2","unstructured":"CommitteeI. C. S. L. M. S. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications IEEE Std. 802. 11-1997 1997."},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3154790"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3383065"},{"key":"e_1_2_11_23_2","doi-asserted-by":"crossref","unstructured":"AcarE. OzevS. andRedmondK. B. Enhanced Error Vector Magnitude (EVM) Measurements for Testing WLAN Transceivers 2006 IEEE\/ACM International Conference on Computer Aided Design 2006 San Jose CA USA IEEE 210\u2013216.","DOI":"10.1109\/ICCAD.2006.320138"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2614604"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/26.328961"},{"key":"e_1_2_11_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3087250"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.907312"},{"key":"e_1_2_11_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2948919"},{"key":"e_1_2_11_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/26.764932"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ise2\/8683522","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/ise2\/8683522","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ise2\/8683522","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T22:32:53Z","timestamp":1773009173000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/ise2\/8683522"}},"subtitle":[],"editor":[{"given":"Jiwei","family":"Tian","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/ise2\/8683522"],"URL":"https:\/\/doi.org\/10.1049\/ise2\/8683522","archive":["Portico"],"relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"value":"1751-8709","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2025-05-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8683522"}}