{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:35:40Z","timestamp":1775745340192,"version":"3.50.1"},"reference-count":87,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2021,5,15]],"date-time":"2021-05-15T00:00:00Z","timestamp":1621036800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,15]],"date-time":"2021-05-15T00:00:00Z","timestamp":1621036800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,15]],"date-time":"2021-05-15T00:00:00Z","timestamp":1621036800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,5,15]]},"DOI":"10.1109\/jiot.2020.3045305","type":"journal-article","created":{"date-parts":[[2020,12,17]],"date-time":"2020-12-17T03:51:15Z","timestamp":1608177075000},"page":"8356-8371","source":"Crossref","is-referenced-by-count":60,"title":["Radio Identity Verification-Based IoT Security Using RF-DNA Fingerprints and SVM"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9393-7104","authenticated-orcid":false,"given":"Donald","family":"Reising","sequence":"first","affiliation":[]},{"given":"Joseph","family":"Cancelleri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9833-871X","authenticated-orcid":false,"given":"T. Daniel","family":"Loveless","sequence":"additional","affiliation":[]},{"given":"Farah","family":"Kandah","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"Skjellum","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1971.223398"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.7.1.161-168"},{"key":"ref71","author":"duda","year":"2001","journal-title":"Pattern Classification"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/0165-1684(96)00014-X"},{"key":"ref76","author":"allwood","year":"2008","journal-title":"The Satterthwaite Formula for Degrees of Freedom in the Two-Sample t-Test"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57868-4_57"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2000.854761"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2017.7876111"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.20982\/tqmp.12.1.p030"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2469-1"},{"key":"ref78","author":"hastie","year":"2001","journal-title":"The Elements of Statistical Learning Data Mining Inference and Prediction"},{"key":"ref79","article-title":"Numerical analysis for relevant features in intrusion detection (NARFid)","author":"gonz\u00e1lez","year":"2009"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2010.01.002"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.21"},{"key":"ref31","article-title":"Exploitation of RF-DNA for device classification and verification using GRLVQI processing","author":"reising","year":"2012"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2010.032330"},{"key":"ref37","year":"2007","journal-title":"Interferometric Intrapulse Radar Receiver for Specific Emitter Identification and Direction-Finding Fact Sheet REW 224"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/26.141456"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1029\/2000RS002345"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1049\/el:20040160"},{"key":"ref60","first-page":"1","article-title":"IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999) - Redline","year":"2007","journal-title":"IEEE Std 802 11-2007 (Revision of IEEE Std 802 11-1999) - Redline 802 11-2007"},{"key":"ref62","year":"0"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2009.5062485"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2006.232110"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1076","DOI":"10.1109\/TIFS.2011.2134848","article-title":"Nonlinearity estimation for specific emitter identification in multipath channels","volume":"6","author":"liu","year":"2011","journal-title":"IEEE Trans Inf Forensics Security"},{"key":"ref64","year":"2019","journal-title":"Bluetooth Core Specification Version 1 2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2009.4850327"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683789"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2984192"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2010.5624371"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CROWNCOM.2008.4562534"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.3390\/s20041213"},{"key":"ref69","year":"2004","journal-title":"Agilent E3238 Signal Intercept and Collection Solutions"},{"key":"ref2","year":"2015","journal-title":"Gartner Says 6 4 Billion Connected &#x201C;Things&#x201D; Will Be in Use in 2016 Up 30 Percent From 2015"},{"key":"ref1","year":"2016","journal-title":"DoD Policy Recommendations for the Internet of Things (IoT)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MIKON.2004.1357058"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409958"},{"key":"ref21","first-page":"99","article-title":"802.11 user fingerprinting","author":"jeffrey","year":"2013","journal-title":"Proc ACM Int Conf Mobile Comput Netw"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1504\/IJESDF.2008.020946","article-title":"Radio frequency fingerprinting commercial communication devices to enhance electronic security","volume":"1","author":"suski","year":"2008","journal-title":"Int J Electron Security Digital Forensics"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199451"},{"key":"ref25","first-page":"25","article-title":"Transient-based identification of wireless sensor nodes","author":"danev","year":"2009","journal-title":"Proc ACM Int Conf Inf Process Sens Netw"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2400426"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2014.2372432"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807213"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2476338"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7498103"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2838071"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/GreenCom\/CPSCom\/SmartData.2019.00191"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323405"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2796446"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/app8112167"},{"key":"ref10","author":"stanislav","year":"2015","journal-title":"Hacking iot A case study on baby monitor exposures and vulnerabilities"},{"key":"ref11","author":"wright","year":"2020","journal-title":"KillerBee Practical ZigBee Exploitation Framework or Wireless Hacking and the Kinetic World"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599826"},{"key":"ref12","author":"simon","year":"2016","journal-title":"&#x2018;Internet of Things&#x2019; Hacking Attack Led to Widespread Outage of Popular Websites"},{"key":"ref13","author":"shipley","year":"2014","journal-title":"Insteon False Security and Deceptive Documentation"},{"key":"ref14","year":"2015","journal-title":"Tools for Insteon RF"},{"key":"ref15","author":"brook","year":"2017","journal-title":"Mirai IoT Botnet Co-Authors Plead Guilty"},{"key":"ref82","first-page":"129","article-title":"The feature selection problem: Traditional methods and a new algorithm","author":"kira","year":"1992","journal-title":"Proc 10th AAAI Nat Conf Artif Intell"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.001"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1093\/beheco\/ark016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962626"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.17148\/IJARCCE.2014.31031"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WESCAN.1995.494069"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-247-2.50037-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/el:19991369"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.2307\/2332510"},{"key":"ref4","year":"2019","journal-title":"Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions)"},{"key":"ref3","year":"2016","journal-title":"&#x2018;Internet of Things&#x2019; Connected Devices to Triple by 2021 Reaching Over 46 Billion Units"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CIC48465.2019.00034"},{"key":"ref5","author":"rawlinson","year":"2014","journal-title":"HP study reveals 70 percent of internet of things devices vulnerable to attack"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/MMAR.2018.8486097"},{"key":"ref8","author":"larsen","year":"2017","journal-title":"A Smart Fish Tank Left a Casino Vulnerable to Hackers"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511801389"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2910750"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.06.013"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.3233\/AIC-170729"},{"key":"ref9","author":"wright","year":"2015","journal-title":"Hacking Exposed Wireless Wireless Security Secrets & Solutions"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17080-5_22"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014225"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415804"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2160170"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2896696"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913759"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2913627"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885421"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9425408\/09296236.pdf?arnumber=9296236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:46Z","timestamp":1652194426000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9296236\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,15]]},"references-count":87,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.3045305","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,15]]}}}