This HTML5 document contains 694 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
provhttp://www.w3.org/ns/prov#
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
category-frhttp://fr.dbpedia.org/resource/Catégorie:
wikidatahttp://www.wikidata.org/entity/
n13http://fr.dbpedia.org/resource/Modèle:Boîte_déroulante/
prop-frhttp://fr.dbpedia.org/property/
owlhttp://www.w3.org/2002/07/owl#
n12http://commons.wikimedia.org/wiki/Special:FilePath/
n14http://g.co/kg/m/
n7https://www.etsi.org/deliver/etsi_ts/100900_100999/100910/08.20.00_60/
wikipedia-frhttp://fr.wikipedia.org/wiki/
dbohttp://dbpedia.org/ontology/
n15http://fr.dbpedia.org/resource/Fichier:
n4http://fr.dbpedia.org/resource/Modèle:
dcthttp://purl.org/dc/terms/
dbpedia-zhhttp://zh.dbpedia.org/resource/
rdfshttp://www.w3.org/2000/01/rdf-schema#
dbrhttp://dbpedia.org/resource/
foafhttp://xmlns.com/foaf/0.1/
dbpedia-frhttp://fr.dbpedia.org/resource/
xsdhhttp://www.w3.org/2001/XMLSchema#

Statements

Subject Item
dbpedia-fr:Empreintes_radio
rdfs:label
Radio fingerprinting Empreintes radio
rdfs:comment
Une empreinte radio est un moyen d'identifier de manière unique un appareil possédant des composants radio à partir du signal émis. Elle se construit suivant des caractéristiques du signal analogique émis par un appareil sans-fil et est compliquée à imiter. L'utilisation des empreintes radio permet d'authentifier des appareils de manière plus fiable et plus légère que les algorithmes cryptographiques, pouvant également constituer par exemple une preuve criminalistique. La construction d'une empreinte radio est un processus complexe se basant sur la couche physique des appareils, s'effectuant majoritairement de manière passive. Les méthodes utilisées sont dans la plupart des cas spécifiques à des protocoles de communication sans-fil (Wi-Fi, Bluetooth, GSM...). Les travaux de recherche essay
owl:sameAs
dbr:Radio_fingerprinting n14:044_3n dbpedia-zh:无线电指纹 wikidata:Q7281157
dbo:wikiPageID
13053120
dbo:wikiPageRevisionID
187076246
dbo:wikiPageWikiLink
category-fr:Radiodiffusion dbpedia-fr:Échantillonnage_(signal) dbpedia-fr:Réseau_sans_fil dbpedia-fr:Spectre_électromagnétique dbpedia-fr:Oscillateur_(électronique) dbpedia-fr:Régime_transitoire dbpedia-fr:Téléphone_mobile dbpedia-fr:Empreinte_digitale dbpedia-fr:Modèle_OSI dbpedia-fr:Transmission_radio dbpedia-fr:Trame_(informatique) dbpedia-fr:Global_System_for_Mobile_Communications n15:Modulation.png n15:Mobile_radio_components.png dbpedia-fr:Adresse_IP dbpedia-fr:Adresse_MAC dbpedia-fr:Système_de_détection_d'intrusion dbpedia-fr:Ondelette dbpedia-fr:Chiffrement dbpedia-fr:Clé_de_chiffrement dbpedia-fr:IEEE_802.11 dbpedia-fr:Onde dbpedia-fr:Algorithme_génétique category-fr:Vocabulaire_radio_propre_à_la_technique dbpedia-fr:Bluetooth dbpedia-fr:Convertisseur_analogique-numérique dbpedia-fr:Convertisseur_numérique-analogique dbpedia-fr:Filtrage_par_adresse_MAC dbpedia-fr:Algorithme dbpedia-fr:Internet_des_objets dbpedia-fr:Authentification dbpedia-fr:Criminalistique dbpedia-fr:Filtre_passe-bande dbpedia-fr:Attaque_par_rejeu dbpedia-fr:Couche_physique dbpedia-fr:Rayonnement_électromagnétique dbpedia-fr:Wi-Fi dbpedia-fr:Attaque_de_l'homme_du_milieu dbpedia-fr:Modulation_du_signal dbpedia-fr:Phase_(électricité) n15:Transitoire.png dbpedia-fr:Protocole_de_communication dbpedia-fr:Cryptographie dbpedia-fr:Comportement dbpedia-fr:Fréquence dbpedia-fr:Électronique_analogique dbpedia-fr:Électronique_numérique dbpedia-fr:Amplificateur_électronique
dbo:wikiPageExternalLink
n7:ts_100910v082000p.pdf
dbo:wikiPageLength
48016
dct:subject
category-fr:Vocabulaire_radio_propre_à_la_technique category-fr:Radiodiffusion
prop-fr:wikiPageUsesTemplate
n4:Légende_plume n13:début n4:Article_détaillé n13:fin n4:Article n4:Portail n4:Références n4:, n4:Orphelin n4:Lien_web n4:Lien
prov:wasDerivedFrom
wikipedia-fr:Empreintes_radio?oldid=187076246&ns=0
foaf:depiction
n12:Mobile_radio_components.png n12:Modulation.png n12:Transitoire.png
prop-fr:année
2018 2019 2016 2017 1998 1999 1997 1995 1993 2014 2015 2012 2013 2010 2011 2008 2009 2007 2004 2005 2002 2003 2000 2001
prop-fr:consultéLe
2019-11-30
prop-fr:doi
10.1849 10.1587 10.1007 10.1016 10.1029 10.1109 10.1145 10.1504
prop-fr:fr
transmissions bursts transmission burst
prop-fr:id
Candore2009 Hunag2015 Hu2012 Tian2019 Gopalakrishnan2019 Baldini2017 Toonstra1995 Bratus2008 Kim2015 Ellis2001 Sun1998 Robyns2017 Knox2015 Intanagonwiwat2000 McGinity Danev2009 Xie2017 GSM2005 Sakpere2017 Yu2018 Shi2011 Desmond2008 He2016 Anderson2005 Reising2010 Pahlavan1998 Shan2013 SuskiIl2008 Patel2015 Mitola1999 Rehman2013 Valkama2010 Martin2011 Hall2003 Wang2016 Danev2010 Brik2008 Bonne2007 Rehman2012 Liu2017 Chen2012 Langley1993 Yu2019 Hall2004 Hasse2013 Cobb2012 Priyantha2000 Peng2019 Lakafosis2011 Zeng2010 Pahlavan2002 Hightower2001 Rehman2014 Kohno2005 Xu2016 Housley2003 Jain1997
prop-fr:isbn
978
prop-fr:lang
en
prop-fr:langue
en
prop-fr:mois
Janvier Août 10 Octobre Janvier-Mars Avril Février Mai Juin Juillet Novembre Avril-Juin Mars Decembre Septembre
prop-fr:nom
Hueber Pankanti He Chan Krishnamurthy Shu Barbeau Beneat Haniz Zhu Bratus Sakaguchi Liao Jain Mumtaz Sdaa Mendenhall Hu Danev Capkun Xiang Sakpere Quax Yan Shi Piao Arbaugh Fang Lakafosis Alam Gloe Beck Peebles Robyns Kinster Lee Wen Gebara Harwahyu Mlitwa Cornelius Xinrong Li Takada Huie Hasse Mills Gopalakrishnan Sun Govindan Han Marin Kim Zhou Tian Laspe Housley Luecken Maguire Jensen Anderson Lymberopoulos Tran Yao Xing Mohapatra Gruteser Zheng Pheng Dong Liu Jiang Kranakis Xie Li Xu Peng Singelée Makela Candore Hall Oh McGinity Madhow Balakrishnan Kisner. Hunag Claffy Iwata Cekic Adeye-Oshin Serinken Du Dejean Stery Kohno Lamotte Pahlavan Kirovski Hightower Chen Ren Cheng Farinaz Rodriguez Tentzeris Saad Mitola Zhang Intanagonwiwat Kuki Reising Preneel Patel Cobb Rehman Kunz Broido Richardson Sowerby Springer Ardekani Chakraborty Brik Shan Martin Kotz Bolle Langley Yuan Guo Baldwin Bonne Rasmussen Temple Baldini Yeo Traille Borriello Suski Il El Defrawy Toonstra Knox Valkama Desmond Ovunc Coghill Lin Lin Hong Wang Ellis Yu Banerjee Priyantha Kosaka Zeng Muller Sano Estrin
prop-fr:numéro
10 8 9 4 5 2 3 1
prop-fr:pages
724 2104 1365 1817 2091 1346 221 2494 151 145 591 585 131 169 1761 93 94 89 561 116 112 1276 31 25 1 13 14 15 60 56 57 58 32 46 41 43 466 902 496 7980 504 1597 432 349 347 331 383 377 813
prop-fr:plume
oui
prop-fr:prénom
Sergey Ryouta Daniel S. Darko Robert F. Yuexiu Jeyanthi Kentaro T. H. Vladimir Anit Paul Loh Chin Choong Dan Kei Gianmarco William C. Kasper Feiyi Soorya Yi S.-G. Jacob R. L. Y. Hiren J. Xianru Azril Woon-Young Peter Russ Andre Cho Chia K. W. Shafiq Manos M. Edward K.C. Jae-Hoon Michael A. Eric D. E. Nissanka B. Jung-Shiuan Metehan Dimitrio Kevin William E. Thomas Ray-Guang Deborah A. Jiabao Wim Yan Pieter William Kai Boris D. A. W. Yin A.K. Hsia-Hwa David Liangmin Walid I. Sangho Wenhao Prasant Guyue Rong Michael J. Tao L.E. Yusuke Lauren Yong C. Colin Aiqun Hoseon Songlin Saeed Ur Martin Ruki Gia Khanh Kevin W. Yu-Dong Kui Weidong K. J. Linning K. Q. Kannan Runfa N. Jie Qiang nansai Jun-ichi Srdjan Yu Michel Tan Chun Geral R. Cory Eduard Iman M. A. Wilson Fen Nhlanhla B. W. J. Gary Yiliang Hari Sixu X. Ramesh Karim Meg Tadayoshi Zhu Vasileios Bocheng Hong S. U. D. G. Rusty O. Suman Ri Seng G.Q. Mikko P. Zhi Junqing Bart Methan Evangelos Ryosuke Michael Dave Chalermek Andreas Marco J.P. Bodhi Anya Heinrich Upamanyu Gernot
prop-fr:périodique
Proceedings of WESCON '93 IEEE Conference on Communications and Network Security, San Francisco, CA Proceedings of the 6th annual international conference on Mobile computing and networking - MobiCom '00 IEEE Personal Communications IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings Conference Proceedings. IEEE Canadian Conference on Electrical and Computer Engineering Proceedings of the third ACM conference on Wireless network security - WiSec '10 IEEE Journal on Selected Areas in Communications Proceedings of IASTED International Conference on Wireless and Optical Communications , Banff, Alberta IEEE Transactions on Information Forensics and Security Proceedings of the 2009 International Conference on Information Processing in Sensor Networks Proceedings of the first ACM conference on Wireless network security - WiSec '08 International Symposium on Next-Generation Electronics Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys '12 IEEE Communications Magazine IEEE Transactions on Reliability International Journal of Electronic Security and Digital Forensics South African Computer Journal Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks - WiSec '17 IEEE Wireless Communications Proceedings of the 14th ACM international conference on Mobile computing and networking - MobiCom '08 ACM Transactions on Sensor Networks Journal of Computer and System Science IEEE International Workshop on Hardware-Oriented Security and Trust, Francisco, CA arXiv:1907.08809 [cs, eess] Proceedings of the first ACM workshop on Information hiding and multimedia security In Proceedings of the 3rd IASTED International Conference on Communications, Internet and Information Technology Proceedings of the IEEE IEEE Transactions on Microwave Theory and Techniques Proceedings of the 6th Annual International Conference on Mobile Computing and Networking IEEE Communications Surveys & Tutorials Radio Science IEICE Transactions on Communications Communications of the ACM Proceedings of 2010 IEEE International Symposium on Circuits and Systems IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference 2011 2012 2014 IEEE Internet of Things Journal 2007 arXiv:1905.09388 [cs, eess, stat] IEEE Transactions on Dependable and Secure Computing 2017 Journal of Network and Systems Management EUROCON 2005 - The International Conference on "Computer as a Tool" Computer IEEE Communications Surveys Tutorials IEEE Conference on Computer Communications
prop-fr:site
ETSI
prop-fr:texte
transmissions bursts
prop-fr:titre
RF Fingerprinting Physical Objects for Anticounterfeiting Applications Detection of Transient in Radio Frequency Fingerprinting Using Signal Phase Design of a Hybrid RF Fingerprint Extraction and Device Classification Scheme An identity-authentication system using fingerprints Physical layer challenge-response authentication in wireless networks with relay Study of low cost mobile phone tracking system Robust stable radiometric fingerprinting for wireless devices Algorithm and implementation of radio frequency fingerprinting based on multi-resolution analysis Indoor geolocation science and technology Wideband radio propagation modeling for indoor geolocation applications Directed diffusion: a scalable and robust communication paradigm for sensor networks Analysis of receiver front end on the performance of RF fingerprinting Location systems for ubiquitous computing Attacks on physical-layer identification Characteristics of radio transmitter fingerprints Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning Wireless Physical-Layer Identification: Modeling and Validation A Guide of Fingerprint Based Radio Emitter Localization Using Multiple Sensors Fractal segmentation of signal from noise for radio transmitter fingerprinting Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] Implications of radio fingerprinting on the security of sensor networks Enhancing intrusion detection in wireless networks using radio frequency fingerprinting A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components Intrinsic Physical-Layer Authentication of Integrated Circuits Identification of legacy radios in a cognitive radio network using a radio frequency fingerprinting based method Device Fingerprinting in Wireless Networks: Challenges and Opportunities Transient analysis and genetic algorithms for classification Identifying unique devices through wireless fingerprinting Active behavioral fingerprinting of wireless devices New Security Mechanisms of High-Reliability IoT Communication Based on Radio Frequency Fingerprint Improved wireless security for GMSK based devices using RF fingerprinting Radio frequency fingerprinting and its challenges Remote Physical Device Fingerprinting Transient-based identification of wireless sensor nodes Forensic identification of GSM mobile phones Portability of an RF fingerprint of a wireless transmitter FM-based indoor localization Weaving a wireless safety net Towards Qualitative Positioning for Pervasive Environments Selective RF Fingerprint Scanning for Large-Scale Wi-Fi Positioning Systems Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers With Radio Frequency Distinct Native Attribute Fingerprinting Robust Wireless Fingerprinting via Complex-Valued Neural Networks Cognitive radio: making software radios more personal Wireless device identification with radiometric signatures Improved Radiometric Identification of Wireless Devices Using MIMO Transmission Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks Specific emitter identification and classical parameter fusion technology Wireless Fingerprints Inside a Wireless Sensor Network The Cricket Location-support System A state-of-the-art survey of indoor positioning and navigation systems and technologies Analysis of impersonation attacks on systems using RFfingerprinting and low-end receivers Radio Frequency Fingerprint Identification Based on Denoising Autoencoders Digital signal processing for reducing the effects of RF imperfections in radio devices — An overview Wi-Fi Fingerprint-Based Indoor Positioning: Recent Advances and Comparisons Multimode radio fingerprinting for localization Using Spectral Fingerprints to Improve Wireless Network Security Digital cellular telecommunications system — Radio Transmission and Reception — 3GPP TS 05.05 version 8.20.0 Security problems in 802.11-based networks
prop-fr:trad
Burst transmission
prop-fr:url
n7:ts_100910v082000p.pdf
prop-fr:volume
E101.B 59 46 47 40 36 34 29 31 23 17 18 19 11 6 7 1 2 85 80 64
dbo:thumbnail
n12:Mobile_radio_components.png?width=300
foaf:isPrimaryTopicOf
wikipedia-fr:Empreintes_radio
dbo:abstract
Une empreinte radio est un moyen d'identifier de manière unique un appareil possédant des composants radio à partir du signal émis. Elle se construit suivant des caractéristiques du signal analogique émis par un appareil sans-fil et est compliquée à imiter. L'utilisation des empreintes radio permet d'authentifier des appareils de manière plus fiable et plus légère que les algorithmes cryptographiques, pouvant également constituer par exemple une preuve criminalistique. La construction d'une empreinte radio est un processus complexe se basant sur la couche physique des appareils, s'effectuant majoritairement de manière passive. Les méthodes utilisées sont dans la plupart des cas spécifiques à des protocoles de communication sans-fil (Wi-Fi, Bluetooth, GSM...). Les travaux de recherche essayent encore de montrer la possibilité de construire une empreinte radio dans des conditions réelles et non de laboratoire. Les empreintes radio peuvent devenir un nouveau moyen de détecter une intrusion dans un système informatique, servir de preuve d'authentification. Mais dans des situations bien précises, il a été possible de falsifier l'empreinte radio.