{"id":"https://openalex.org/W3009737098","doi":"https://doi.org/10.1109/globecom38437.2019.9014191","title":"Exploiting CSI-MIMO for Accurate and Efficient Device Identification","display_name":"Exploiting CSI-MIMO for Accurate and Efficient Device Identification","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3009737098","doi":"https://doi.org/10.1109/globecom38437.2019.9014191","mag":"3009737098"},"language":"en","primary_location":{"id":"doi:10.1109/globecom38437.2019.9014191","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom38437.2019.9014191","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008970195","display_name":"Laxima Niure Kandel","orcid":"https://orcid.org/0000-0002-3933-1187"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Laxima Niure Kandel","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Stevens Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Stevens Institute of Technology","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070962435","display_name":"Zhuosheng Zhang","orcid":"https://orcid.org/0000-0002-4183-3645"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhuosheng Zhang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Stevens Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Stevens Institute of Technology","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063617425","display_name":"Shucheng Yu","orcid":"https://orcid.org/0000-0001-6484-4382"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shucheng Yu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Stevens Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Stevens Institute of Technology","institution_ids":["https://openalex.org/I108468826"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008970195"],"corresponding_institution_ids":["https://openalex.org/I108468826"],"apc_list":null,"apc_paid":null,"fwci":0.28,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.67948236,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12791","display_name":"Full-Duplex Wireless Communications","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7650145292282104},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.7474170327186584},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6788353323936462},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.6733823418617249},{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.6685571670532227},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5723439455032349},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4285150468349457},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.42832356691360474},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.4188838005065918},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.4182756841182709},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4134942591190338},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.3585361838340759},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3363029658794403},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14070537686347961},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13500681519508362}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7650145292282104},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.7474170327186584},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6788353323936462},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.6733823418617249},{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.6685571670532227},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5723439455032349},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4285150468349457},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.42832356691360474},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.4188838005065918},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.4182756841182709},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4134942591190338},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.3585361838340759},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3363029658794403},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14070537686347961},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13500681519508362},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom38437.2019.9014191","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom38437.2019.9014191","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1585879837","https://openalex.org/W1977917536","https://openalex.org/W2016610412","https://openalex.org/W2074855078","https://openalex.org/W2082823623","https://openalex.org/W2101449154","https://openalex.org/W2104599106","https://openalex.org/W2108139215","https://openalex.org/W2116374153","https://openalex.org/W2122237830","https://openalex.org/W2132047492","https://openalex.org/W2151043249","https://openalex.org/W2155886813","https://openalex.org/W2194332932","https://openalex.org/W2293855231","https://openalex.org/W2307851164","https://openalex.org/W2765388466","https://openalex.org/W2791659887","https://openalex.org/W2834910512","https://openalex.org/W2904555174","https://openalex.org/W2937411608","https://openalex.org/W2964988056","https://openalex.org/W2972413602","https://openalex.org/W3151293064","https://openalex.org/W6635170509","https://openalex.org/W6675523830","https://openalex.org/W6676995458","https://openalex.org/W6698302138","https://openalex.org/W6745321403"],"related_works":["https://openalex.org/W2794664665","https://openalex.org/W3007059209","https://openalex.org/W4220832730","https://openalex.org/W1688416049","https://openalex.org/W4312120756","https://openalex.org/W2972017669","https://openalex.org/W2783658022","https://openalex.org/W4288120931","https://openalex.org/W4313224733","https://openalex.org/W4283217267"],"abstract_inverted_index":{"Due":[0],"to":[1,57,76,98,164,219],"the":[2,7,43,67,91,100,121,124,182,204,278,295],"inherent":[3],"broadcast":[4],"nature":[5],"of":[6,17,20,46,102,123,203,280,294],"wireless":[8],"medium,":[9],"Wireless":[10],"Local":[11],"Area":[12],"Networks":[13],"(WLANs)":[14],"are":[15,74,274],"targets":[16],"a":[18,62,111,129,146,155],"variety":[19],"malicious":[21],"attacks,":[22,52],"for":[23,66,173,254],"example,":[24],"MAC":[25],"identity":[26],"spoofing,":[27],"rogue":[28],"AP":[29],"attack,":[30],"and":[31,38,41,78,143,160,177,187,222,229,248,256,267,283,290],"network":[32],"freeloading.":[33],"These":[34],"attacks":[35],"invite":[36],"security":[37],"privacy":[39],"threats":[40],"hinder":[42],"worry-free":[44],"deployment":[45],"WLAN":[47],"networks.":[48],"To":[49,89],"thwart":[50],"these":[51,193],"existing":[53,72],"research":[54],"has":[55,154],"proposed":[56],"use":[58,82,99],"hardware-specific":[59],"imperfections":[60],"as":[61,110,145],"unique":[63],"unforgeable":[64],"fingerprint":[65],"APs":[68],"and/or":[69],"clients.":[70],"Unfortunately,":[71],"solutions":[73],"limited":[75],"static":[77,255],"stable":[79,168],"environments":[80],"or":[81,114],"customized":[83],"hardware":[84],"preventing":[85],"their":[86,161],"wide-scale":[87],"adoption.":[88],"overcome":[90],"limitations,":[92],"in":[93,231,245],"this":[94],"work,":[95],"we":[96,118],"propose":[97],"distribution":[101],"relative":[103,163],"phase":[104,158,195],"differences":[105,196],"between":[106],"MIMO-radio":[107],"transmitter":[108,139,151,175],"oscillators":[109],"distinguishing":[112],"trait":[113],"fingerprint.":[115,149],"More":[116],"specifically,":[117],"show":[119],"that":[120],"nonidealities":[122],"multiple":[125],"RF":[126,152],"chains":[127],"on":[128],"single":[130],"MIMO-OFDM":[131],"(Multiple":[132],"Input":[133],"Multiple":[134],"Output-Orthogonal":[135],"Frequency":[136],"Division":[137],"Multiplexing)":[138],"can":[140],"be":[141,179],"extracted":[142],"utilized":[144],"reliable":[147],"device":[148,176,224,251,258],"Each":[150],"chain":[153],"random":[156],"initial":[157],"offset,":[159],"difference":[162],"one":[165],"another":[166],"is":[167,217],"over":[169],"time,":[170],"differs":[171],"uniquely":[172],"each":[174],"cannot":[178],"altered":[180],"by":[181],"adversary":[183],"without":[184],"significant":[185],"effort":[186],"cost.":[188],"Our":[189,211],"functional":[190],"prototype":[191],"measures":[192],"unknown":[194],"using":[197,237],"PHY-layer":[198],"Channel":[199],"State":[200],"Information":[201],"(CSI)":[202],"in-band":[205],"channel":[206],"obtained":[207],"from":[208],"off-the-shelf":[209],"hardware.":[210],"design":[212,282],"eliminates":[213],"expensive":[214],"custom-built":[215],"hardware,":[216],"invariant":[218],"environmental":[220],"variations":[221,273],"supports":[223],"mobility":[225],"making":[226],"it":[227],"practical":[228],"deployable":[230],"real":[232],"indoor":[233],"settings.":[234],"Experimental":[235],"evaluation":[236],"17":[238],"Intel":[239],"Network":[240],"Interface":[241],"Cards":[242],"(NICs)":[243],"resulted":[244],"97":[246],"%":[247,250],"92":[249],"identification":[252],"accuracy":[253,287],"mobile":[257],"states":[259],"respectively.":[260],"Such":[261],"promising":[262],"results":[263],"with":[264],"identical":[265],"model":[266],"manufacturer":[268],"devices":[269],"wherein":[270],"underlying":[271],"manufacturing":[272,297],"typically":[275],"low":[276],"showcase":[277],"effectiveness":[279],"our":[281],"suggest":[284],"even":[285],"higher":[286,296],"across":[288],"multi-model":[289],"multi-manufacturer":[291],"cards":[292],"because":[293],"variations.":[298]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
