{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T19:07:12Z","timestamp":1775588832671,"version":"3.50.1"},"reference-count":98,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2012,11,1]],"date-time":"2012-11-01T00:00:00Z","timestamp":1351728000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2012,11]]},"abstract":"<jats:p>Physical-layer device identification aims at identifying wireless devices during radio communication by exploiting unique characteristics of their analog (radio) circuitry. This work systematizes the existing knowledge on this topic in order to enable a better understanding of device identification, its implications on the analysis and design of security solutions in wireless networks and possible applications. We therefore present a systematic review of physical-layer identification systems and provide a summary of current state-of-the-art techniques. We further present a classification of attacks and discuss the feasibility, limitations, and implications in selected applications. We also highlight issues that are still open and need to be addressed in future work.<\/jats:p>","DOI":"10.1145\/2379776.2379782","type":"journal-article","created":{"date-parts":[[2012,12,11]],"date-time":"2012-12-11T13:13:42Z","timestamp":1355231622000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":262,"title":["On physical-layer identification of wireless devices"],"prefix":"10.1145","volume":"45","author":[{"given":"Boris","family":"Danev","sequence":"first","affiliation":[{"name":"ETH Zurich, Switzerland, Zurich, Switzerland"}]},{"given":"Davide","family":"Zanetti","sequence":"additional","affiliation":[{"name":"ETH Zurich, Switzerland, Zurich, Switzerland"}]},{"given":"Srdjan","family":"Capkun","sequence":"additional","affiliation":[{"name":"ETH Zurich, Switzerland, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2012,12,7]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the IEEE International Workshop on System-on-Chip for Real-Time Applications. 60","author":"Abdel-Hamid A. T."},{"key":"e_1_2_1_2_1","unstructured":"Agilent. 2008. Digital Signal Analyzer (DSA) 90804A. http:\/\/www.home.agilent.com\/.  Agilent. 2008. Digital Signal Analyzer (DSA) 90804A. http:\/\/www.home.agilent.com\/."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). 30--35","author":"Becker G."},{"key":"e_1_2_1_4_1","unstructured":"Bishop C. 2006. Pattern Recognition and Machine Learning. Springer.   Bishop C. 2006. Pattern Recognition and Machine Learning. Springer."},{"key":"e_1_2_1_5_1","unstructured":"Boggan S. 2006. Cracked it! http:\/\/www.guardian.co.uk\/technology\/2006\/nov\/17\/news.homeaffairs\/. (Last accessed 6\/11)  Boggan S. 2006. Cracked it! http:\/\/www.guardian.co.uk\/technology\/2006\/nov\/17\/news.homeaffairs\/. (Last accessed 6\/11)"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Bolle R. Connell J. Pankanti S. Ratha N. and Senior A. 2003. Guide to Biometrics. Springer.   Bolle R. Connell J. Pankanti S. Ratha N. and Senior A. 2003. Guide to Biometrics. Springer.","DOI":"10.1007\/978-1-4757-4036-3"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.26"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352543"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11601494_11"},{"key":"e_1_2_1_11_1","volume-title":"Proc. SPIE 2491","author":"Choe H."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the ACM\/IEEE Conference on Information Processing in Sensor Networks (IPSN). 25--36","author":"Danev B."},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the USENIX Security Symposium. 199--214","author":"Danev B."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741882"},{"key":"e_1_2_1_15_1","volume-title":"Proeeedings of the IEEE International Conference on RFID. 58--64","author":"Devadas S."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_2_1_19_1","unstructured":"Edman M. and Yener B. 2009. Active attacks against modulation-based radiometric identification. Tech. rep. 09-02 Rensselaer Institute of Technology.  Edman M. and Yener B. 2009. Active attacks against modulation-based radiometric identification. Tech. rep. 09-02 Rensselaer Institute of Technology."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1029\/2000RS002345"},{"key":"e_1_2_1_21_1","unstructured":"EPCglobal 2009. The EPCglobal Architecture Framework v. 1.3. EPCglobal.  EPCglobal 2009. The EPCglobal Architecture Framework v. 1.3. EPCglobal."},{"key":"e_1_2_1_22_1","unstructured":"Ettus M. 2007. Universal software defined radio (USRP). http:\/\/www.ettus.com\/.  Ettus M. 2007. Universal software defined radio (USRP). http:\/\/www.ettus.com\/."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161298"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Franklin J."},{"key":"e_1_2_1_25_1","unstructured":"FVC. 2006. Fingerprint Verification Competition FVC. http:\/\/bias.csr.uni-bo.it\/fvc2006\/.  FVC. 2006. Fingerprint Verification Competition FVC. http:\/\/bias.csr.uni-bo.it\/fvc2006\/."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v16:11"},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS).","author":"Gerdes R."},{"key":"e_1_2_1_28_1","unstructured":"Grunwald L. 2006. New attack to RFID-systems and their middleware and backends. In Black Hat Briefings USA.  Grunwald L. 2006. New attack to RFID-systems and their middleware and backends. In Black Hat Briefings USA."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-005-6425-1"},{"key":"e_1_2_1_30_1","unstructured":"Hall J. 2006. Detection of rogue devices in wireless networks. Carleton Univ. Ph.D. dissertation.   Hall J. 2006. Detection of rogue devices in wireless networks. Carleton Univ. Ph.D. dissertation."},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the Conference on Communications, Internet, and Information Technology (CIIT). 201--206","author":"Hall J."},{"key":"e_1_2_1_32_1","unstructured":"Hall J. Barbeau M. and Kranakis E. 2005. Radio frequency fingerprinting for intrusion detection in wireless networks. Manuscript. http:\/\/wiki.uni.lu\/secan-lab\/Hall2005.html.  Hall J. Barbeau M. and Kranakis E. 2005. Radio frequency fingerprinting for intrusion detection in wireless networks. Manuscript. http:\/\/wiki.uni.lu\/secan-lab\/Hall2005.html."},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN). 108--113","author":"Hall J."},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the International Symposium on Signal Processing and Its Applications (ISSPA). 740--742","author":"Hippenstiel R."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.212"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the IEEE Conference on Computer Communications (INFOCOM). 1976--1986","author":"Hu Y."},{"key":"e_1_2_1_37_1","unstructured":"ICAO. http:\/\/www.icao.int\/.  ICAO. http:\/\/www.icao.int\/."},{"key":"e_1_2_1_38_1","unstructured":"IEEE Standards Association 2004. IEEE 802.11i-2004: MAC Security Enhancements. IEEE Standards Association.  IEEE Standards Association 2004. IEEE 802.11i-2004: MAC Security Enhancements. IEEE Standards Association."},{"key":"e_1_2_1_39_1","unstructured":"ITU 1994. ITU-T Recommendation X.200: Information technology\u2014Open Systems Interconnection\u2014Basic Reference Model: The basic model. ITU.  ITU 1994. ITU-T Recommendation X.200: Information technology\u2014Open Systems Interconnection\u2014Basic Reference Model: The basic model. ITU."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.574797"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.824819"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409958"},{"key":"e_1_2_1_43_1","unstructured":"Jones R. 1978. Most Secret War: British Scientific Intelligence 1939--1945. Hamish Hamilton.  Jones R. 1978. Most Secret War: British Scientific Intelligence 1939--1945. Hamish Hamilton."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080793.1080805"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"e_1_2_1_46_1","unstructured":"Kaplan D. and Stanhope D. 1999. Waveform collection for use in wireless telephone identification. US Patent 5999806.  Kaplan D. and Stanhope D. 1999. Waveform collection for use in wireless telephone identification. US Patent 5999806."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.667881"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2009.6388408"},{"key":"e_1_2_1_49_1","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1002\/sec.115","article-title":"Application of wavelet denoising to improve OFDM-based signal detection and classification","volume":"3","author":"Klein R. W.","year":"2010","journal-title":"Secur. Commun. Netw."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.26"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778449"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653668"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). 42--47","author":"Koushanfar F."},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of the IEEE International Conference on RFID. 257--264","author":"Lehtonen M."},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the IEEE International Solid-State Circuits Conference (ISSCC). 372--373","author":"Lofstrom K."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352542"},{"key":"e_1_2_1_57_1","unstructured":"Margerum D. 1969. Pinpointing Location of Hostile Radars. Microwaves.  Margerum D. 1969. Pinpointing Location of Hostile Radars. Microwaves."},{"key":"e_1_2_1_58_1","first-page":"1","article-title":"Privacy for RFID systems to prevent tracking and cloning","volume":"8","author":"Mitra M.","year":"2008","journal-title":"Int. J. Comput. Sci. Netw. Sec."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180410"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984660"},{"key":"e_1_2_1_61_1","volume-title":"Proceedings of the Symposium on Cryptography and Information Security (SCIS).","author":"Nguyen Duc D."},{"key":"e_1_2_1_62_1","unstructured":"Nmap Security Scanner. http:\/\/www.insecure.org\/nmap\/2004\/.  Nmap Security Scanner. http:\/\/www.insecure.org\/nmap\/2004\/."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287866"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.8"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287867"},{"key":"e_1_2_1_66_1","first-page":"1","article-title":"Fingerprinting RFID tags. Dependable and secure computing","volume":"99","author":"Periaswamy S. C. G.","year":"2010","journal-title":"IEEE Trans. PP"},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of the Workshop on RFID Security ( RFIDSec, Asia).","author":"Periaswamy S. C. G."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-3723-x"},{"key":"e_1_2_1_69_1","volume-title":"Proceedings of the International ICST Conference on Security and Privacy in Communication Networks (SecureComm).","author":"Rasmussen K."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2010.032330"},{"key":"e_1_2_1_71_1","volume-title":"Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC).","author":"Reising D. R."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2009.2017318"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2010.2049773"},{"key":"e_1_2_1_74_1","volume-title":"Proceedings of the European Signal Processing Conference (EUSIPCO).","author":"Ross A."},{"key":"e_1_2_1_75_1","volume-title":"Proceedings of the IEEE Conference on Communications, Power and Computing (WESCANEX). 306--312","author":"Shaw D."},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.31"},{"key":"e_1_2_1_77_1","volume-title":"Proceedings of the IEEE International Solid-State Circuits Conference (ISSCC). 406--611","author":"Su Y."},{"key":"e_1_2_1_78_1","volume-title":"Proceedings of the IEEE Global Communications Conference (GLOBECOM). 1--5.","author":"Suski W."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2008.020946"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2004.1532524"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:20040160"},{"key":"e_1_2_1_82_1","unstructured":"Tektronix. 2008. Arbitrary Waveform Generator 7000 Series. Tektronix. http:\/\/www.tek.com\/products\/signal\\sources\/awg7000\/.  Tektronix. 2008. Arbitrary Waveform Generator 7000 Series. Tektronix. http:\/\/www.tek.com\/products\/signal\\sources\/awg7000\/."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555820"},{"key":"e_1_2_1_84_1","volume-title":"Proceedings of the IEEE Conference on Communications, Power, and Computing (WESCANEX).","volume":"2","author":"Toonstra J."},{"key":"e_1_2_1_85_1","volume-title":"Proceedings of the Canadian Conference on Electrical and Computer Engineering.","volume":"1","author":"Toonstra J."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/4.826826"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19991369"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2007.364330"},{"key":"e_1_2_1_89_1","unstructured":"van Beek J. 2008. ePassports reloaded. In Black Hat Briefings USA.  van Beek J. 2008. ePassports reloaded. In Black Hat Briefings USA."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2005.18"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.121"},{"key":"e_1_2_1_92_1","volume-title":"Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM). 1--6.","author":"Williams M."},{"key":"e_1_2_1_93_1","unstructured":"Witteman M. 2005. Attacks on digital passports. In What The Hack. (http:\/\/en.wikipedia.org\/wiki\/What_the_Hack)  Witteman M. 2005. Attacks on digital passports. In What The Hack. (http:\/\/en.wikipedia.org\/wiki\/What_the_Hack)"},{"key":"e_1_2_1_94_1","volume-title":"Proceedings of the IEEE International Conference on Communications (ICC). 4646--4651","author":"Xiao L."},{"key":"e_1_2_1_95_1","unstructured":"Xprobe. http:\/\/www.sys-security.com\/.  Xprobe. http:\/\/www.sys-security.com\/."},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/1859995.1860035"},{"key":"e_1_2_1_97_1","unstructured":"Zetter K. 2006. Hackers clone e-passports. Online publication. Last access: 14.06.2011 http:\/\/www.wired. com\/science\/discoveries\/news\/2006\/08\/71521\/.  Zetter K. 2006. Hackers clone e-passports. Online publication. Last access: 14.06.2011 http:\/\/www.wired. com\/science\/discoveries\/news\/2006\/08\/71521\/."},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.21"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2379776.2379782","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2379776.2379782","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:33:57Z","timestamp":1750239237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2379776.2379782"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":98,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,11]]}},"alternative-id":["10.1145\/2379776.2379782"],"URL":"https:\/\/doi.org\/10.1145\/2379776.2379782","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11]]},"assertion":[{"value":"2010-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}