Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack.
Samurdhi KarunaratneEnes KrijestoracDanijela CabricPublished in: CoRR (2020)
Keyphrases
- authentication mechanism
- authentication protocol
- generative model
- radio frequency
- biometric authentication
- relevance feedback
- data encryption
- user authentication
- discriminative learning
- encryption decryption
- data driven
- trust relationships
- security analysis
- secret key
- key agreement
- multi agent
- smart card
- unsupervised learning
- authentication scheme
- key distribution
- copyright protection
- mutual authentication
- security mechanisms
- countermeasures
- detect malicious