Open Access Open Access  Restricted Access Subscription Access

Deep Learning based Wireless Radio Identification Architecture for Edge Computing

Li-En Chang,
Chi-Yuan Chen,
Hsin-Hung Cho,

Abstract


With the popularity of Near-field Communication(NFC), attacks and defenses of access control systems have also attracted much attention. However, the identity verification of many commercial electronic access control systems at present is still based on the Unique Identifier (UID) of the access control card for identity identification. In recent years, the literature shows the difference between hardware components can effectively identify different device fingerprinting, thereby indirectly judging the legitimacy of the user, to improve the information security of radio communication equipment. To solve the risk of identification of access control devices, the software-defined radio is used to collect NFC band signals to extract I/Q signal samples as features in the study. The extracted radio device features are handed to learn and build a model, and further combined with the Edge Computing architecture to verify and identify NFC card replication.


Citation Format:
Li-En Chang, Chi-Yuan Chen, Hsin-Hung Cho, "Deep Learning based Wireless Radio Identification Architecture for Edge Computing," Communications of the CCISA, vol. 27, no. 4 , pp. 36-48, Nov. 2021.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.





Published by Chinese Cryptology and Information Security Association (CCISA), Taiwan, R.O.C
CCCISA Editorial Office, No.1, Sec. 1, Shennong Rd., Yilan City, Yilan County 260, Taiwan (R.O.C.)
E-mail: ccisa.editor@gmail.com