Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (117)

Search Parameters:
Keywords = RF Fingerprinting

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
27 pages, 5361 KB  
Article
Computational Discovery of Novel SGLT2 Inhibitors from Eight Selected Medicine Food Homology Herbs Using a Multi-Stage Virtual Screening Pipeline
by Zeyu Chen, Kaiqi Tan, Yi Shi, Muchong Liu, Lang Yi, Tongxi Chen and Yunlong Bai
Pharmaceuticals 2026, 19(2), 246; https://doi.org/10.3390/ph19020246 - 31 Jan 2026
Viewed by 172
Abstract
Background/Objectives: Sodium-glucose co-transporter 2 (SGLT2) inhibitors are essential antidiabetic medications. However, their side effects warrant careful consideration. The search for novel SGLT2 inhibitors with high affinity remains an ongoing endeavor. Medicine food homology (MFH) herbs show promise for drug development due to [...] Read more.
Background/Objectives: Sodium-glucose co-transporter 2 (SGLT2) inhibitors are essential antidiabetic medications. However, their side effects warrant careful consideration. The search for novel SGLT2 inhibitors with high affinity remains an ongoing endeavor. Medicine food homology (MFH) herbs show promise for drug development due to their nutritional and medicinal value. Methods: This study aims to address the shortcomings of existing virtual screening models for SGLT2 inhibitors by optimizing feature selection and integrating multidimensional molecular fingerprints. Subsequently, an integrated virtual screening pipeline is constructed to identify potential SGLT2 inhibitors from eight selected MFH herbs. Results: The results indicate that the optimal model (LightGBM and RF) achieved an accuracy of 0.97 and an AUC of 0.98. Following rigorous filtering, a total of 44 potential SGLT2 inhibitors were identified, among which, Isoononin (from Gancao) and Ononin (from Huangqi, Gegen, and Gancao) exhibit favorable drug likeness and safety. Molecular docking demonstrate that both compounds can effectively bind to the SGLT2 active site, establishing stable hydrophobic interactions with critical residues such as Phe98 and Phe453. Furthermore, molecular dynamics simulations confirm the stability of the interactions between the two compounds and SGLT2. Conclusions: This study significantly enhances the accuracy and stability of SGLT2 inhibitor virtual screening models by addressing deficiencies in structural characterization and feature selection. It provides candidate molecules for the development of novel SGLT2 inhibitors and offers new scientific evidence for the application of MFH herbs in the prevention and treatment of chronic metabolic diseases. Full article
(This article belongs to the Section Medicinal Chemistry)
Show Figures

Figure 1

49 pages, 3557 KB  
Article
A Survey: ZTA Adoption in Cross-Domain Solutions—Seven-Pillar Perspective
by Yeomin Lee, Taek-kyu Lee, Sangkyu Ham, Yongjae Lee, Yujin Kim, Wonbin Kim, Ingeol Chun and Jungsoo Park
Electronics 2026, 15(3), 563; https://doi.org/10.3390/electronics15030563 - 28 Jan 2026
Viewed by 112
Abstract
This study examines how the seven pillars of ZTA are implemented in a CDS environment that demands high security reliability, similar to the defense and finance sectors, and identifies the technological advancements and integration patterns that emerge during this process. With the introduction [...] Read more.
This study examines how the seven pillars of ZTA are implemented in a CDS environment that demands high security reliability, similar to the defense and finance sectors, and identifies the technological advancements and integration patterns that emerge during this process. With the introduction of user- and device-centric authentication methods like distributed identity and RF fingerprinting in the Identity and Device areas, there is a growing trend towards strengthening trust even in domains where distrust is prevalent. In the Network and Application domains, the focus is on using micro-segmentation and SDN to segment and control internal traffic flows, while dynamically enforcing the principle of least privilege. In the Data, Visibility, and Orchestration domains, AI analysis is being applied in real-time, leveraging log and visibility data, and orchestration is automating policy execution and response. In conclusion, it is clear that each pillar of ZTA operates in tandem with the others, rather than as isolated components within the CDS environment. This fusion structure demonstrates its ability to function as a unified security strategy that balances trust with comprehensive coverage of diverse domains. Full article
21 pages, 1209 KB  
Review
Intelligent Discrimination of Grain Aging Using Volatile Organic Compound Fingerprints and Machine Learning: A Comprehensive Review
by Liuping Zhang, Jingtao Zhou, Guoping Qian, Shuyi Liu, Mohammed Obadi, Tianyue Xu and Bin Xu
Foods 2026, 15(2), 216; https://doi.org/10.3390/foods15020216 - 8 Jan 2026
Viewed by 272
Abstract
Grain aging during storage leads to quality deterioration and significant economic losses. Traditional analytical approaches are often labor-intensive, slow, and inadequate for modern intelligent grain storage management. This review summarizes recent advances in the intelligent discrimination of grain aging using volatile organic compound [...] Read more.
Grain aging during storage leads to quality deterioration and significant economic losses. Traditional analytical approaches are often labor-intensive, slow, and inadequate for modern intelligent grain storage management. This review summarizes recent advances in the intelligent discrimination of grain aging using volatile organic compound (VOC) fingerprints combined with machine learning (ML) techniques. It first outlines the biochemical mechanisms underlying grain aging and identifies VOCs as early and sensitive biomarkers for timely determination. The review then examines VOC determination methodologies, with a focus on headspace solid-phase microextraction coupled with gas chromatography-mass spectrometry (HS-SPME-GC-MS), for constructing volatile fingerprinting profiles, and discusses related method standardization. A central theme is the application of ML algorithms, including Partial Least Squares Discriminant Analysis (PLS-DA), Support Vector Machines (SVM), Random Forest (RF), and Convolutional Neural Networks (CNN)) for feature extraction and pattern recognition in high-dimensional datasets, enabling effective discrimination of aging stages, spoilage types, and grain varieties. Despite these advances, key challenges remain, such as limited model generalizability, the lack of large-scale multi-source databases, and insufficient validation under real storage conditions. Finally, future directions are proposed that emphasize methodological standardization, algorithmic innovation, and system-level integration to support intelligent, non-destructive, real-time grain quality monitoring. This emerging framework provides a promising powerful pathway for enhancing global food security. Full article
Show Figures

Figure 1

17 pages, 1189 KB  
Article
AI-Driven RF Fingerprinting for Secure Positioning Optimization in 6G Networks
by Ioannis A. Bartsiokas, Maria-Lamprini A. Bartsioka, Anastasios K. Papazafeiropoulos, Dimitra I. Kaklamani and Iakovos S. Venieris
Microwave 2026, 2(1), 1; https://doi.org/10.3390/microwave2010001 - 23 Dec 2025
Viewed by 365
Abstract
Accurate user positioning in 6G networks is essential for next-generation mobile services. However, classical approaches such as time-difference-of-arrival (TDoA) remain vulnerable to dense multipath and NLoS conditions commonly found in indoor and industrial environments. This paper proposes an AI-driven RF fingerprinting framework that [...] Read more.
Accurate user positioning in 6G networks is essential for next-generation mobile services. However, classical approaches such as time-difference-of-arrival (TDoA) remain vulnerable to dense multipath and NLoS conditions commonly found in indoor and industrial environments. This paper proposes an AI-driven RF fingerprinting framework that leverages uplink channel state information (CSI) to achieve robust and privacy-preserving 2D localization. A lightweight convolutional neural network (CNN) extracts location-specific spectral–spatial fingerprints from CSI tensors, while a federated learning (FL) scheme enables distributed training across multiple gNBs without sharing raw channel data. The proposed integration of CSI tensor processing with FL and structured pruning is introduced as a novel solution for practical 6G edge positioning. To further reduce latency and communication costs, a structured pruning mechanism compresses the model by 40–60%, lowering the memory footprint with negligible accuracy loss. A performance evaluation in 3GPP-compliant indoor factory scenarios indicates a median positioning error below 1 m for over 90% of cases, significantly outperforming TDoA. Moreover, the compressed FL model reduces the FL communication load by ~38% and accelerates local training, establishing an efficient, secure, and deployment-ready positioning solution for 6G networks. Full article
Show Figures

Graphical abstract

24 pages, 1220 KB  
Systematic Review
Machine Learning for Predicting Human Drug-Induced Cardiotoxicity: A Scoping Review
by Ja-Young Han, Min Jung Kim, Hyunwoo Kim, KeunOh Choi, Seongjin Ju and Myeong Gyu Kim
Toxics 2025, 13(12), 1087; https://doi.org/10.3390/toxics13121087 - 17 Dec 2025
Viewed by 839
Abstract
Background: Drug-induced cardiotoxicity poses a major challenge in drug development and clinical safety. Although machine learning (ML) methods have shown potential in predicting cardiotoxic risks, prior research has largely focused on specific mechanisms such as human Ether-à-go-go-Related Gene (hERG) inhibition. This scoping review [...] Read more.
Background: Drug-induced cardiotoxicity poses a major challenge in drug development and clinical safety. Although machine learning (ML) methods have shown potential in predicting cardiotoxic risks, prior research has largely focused on specific mechanisms such as human Ether-à-go-go-Related Gene (hERG) inhibition. This scoping review systematically examined studies applying ML models to predict a broad range of drug-induced cardiotoxicity outcomes. Methods: A systematic search of PubMed, EMBASE, SCOPUS, and Web of Science identified studies developing ML models for cardiotoxicity prediction. Extracted data included sources, feature types, algorithms, and performance metrics, categorized by evaluation method (training, testing, cross-validation, or external validation). Results: Twenty-five studies met inclusion criteria, addressing outcomes such as arrhythmia, cardiac failure, heart block, hypertension, and myocardial infarction. Structured resources such as SIDER (Side Effect Resource) were the most common data sources, with features including molecular descriptors, fingerprints, and occasionally, target-based or transcriptomic data. Support vector machines (SVM) and random forest (RF) were the most common algorithms, showing robust predictive performance, with externally validated area under the receiver operating characteristic curve (AUC-ROC) values above 0.70 and accuracy exceeding 0.75 in several studies. Despite variability and limited external validation, ML approaches demonstrate substantial promise for predicting diverse cardiotoxic outcomes. Conclusions: This review underscores the importance of integrating heterogeneous data and rigorous validation for improving cardiotoxicity prediction. Full article
(This article belongs to the Section Drugs Toxicity)
Show Figures

Figure 1

14 pages, 2119 KB  
Article
Japanese Rice Variety Identification by Fluorescence Fingerprinting, Near-Infrared Spectroscopy, and Machine Learning
by Rikuto Akiyama, Yvan Llave and Takashi Matsumoto
AgriEngineering 2025, 7(11), 374; https://doi.org/10.3390/agriengineering7110374 - 5 Nov 2025
Viewed by 731
Abstract
This study developed identification models for five domestic rice varieties—Akitakomachi (Akita 31), Hitomebore (Tohoku 143), Hinohikari (Nankai 102), Koshihikari (Etsunan 17) and Nanatsuboshi (Soriku 163)—using fluorescence spectroscopy, near-infrared (NIR) spectroscopy, and machine learning. Two-dimensional fluorescence images were generated from excitation emission matrix (EEM) [...] Read more.
This study developed identification models for five domestic rice varieties—Akitakomachi (Akita 31), Hitomebore (Tohoku 143), Hinohikari (Nankai 102), Koshihikari (Etsunan 17) and Nanatsuboshi (Soriku 163)—using fluorescence spectroscopy, near-infrared (NIR) spectroscopy, and machine learning. Two-dimensional fluorescence images were generated from excitation emission matrix (EEM) spectra in the 250–550 nm and 900–1700 nm ranges. Four machine learning hybrid models combining a convolutional neural network (CNN) with k-nearest neighbor algorithm (KNN), random forest (RF), logistic regression (LR), and support vector machine (SVM), were constructed using Python (ver. 3.13.2) by integrating feature extraction from CNN with traditional algorithms. The performances of KNN, RF, LR, and SVM were compared with NIR spectra. The NIR+KNN model achieved 0.9367 accuracy, while the fluorescence fingerprint+CNN model reached 0.9717. The CNN+KNN model obtained the highest mean accuracy (0.9817). All hybrid models outperformed individual algorithms in discrimination accuracy. Fluorescence images revealed at 280 nm excitation/340 nm emission linked to tryptophan, and weaker peaks at 340 nm excitation/440 nm emission, likely due to advanced glycation end products. Hence, combining fluorescent fingerprinting with deep learning enables accurate, reproducible rice variety identification and could prove useful for assessing food authenticity in other agricultural products. Full article
Show Figures

Figure 1

16 pages, 3508 KB  
Article
Reconfigurable Multi-Channel Gas-Sensor Array for Complex Gas Mixture Identification and Fish Freshness Classification
by He Wang, Dechao Wang, Hang Zhu and Tianye Yang
Sensors 2025, 25(19), 6212; https://doi.org/10.3390/s25196212 - 7 Oct 2025
Cited by 1 | Viewed by 3390
Abstract
Oxide semiconductor gas sensors are widely used due to their low cost, rapid response, small footprint, and ease of integration. However, in complex gas mixtures their selectivity is often limited by inherent cross-sensitivity. To address this, we developed a reconfigurable sensor-array system that [...] Read more.
Oxide semiconductor gas sensors are widely used due to their low cost, rapid response, small footprint, and ease of integration. However, in complex gas mixtures their selectivity is often limited by inherent cross-sensitivity. To address this, we developed a reconfigurable sensor-array system that supports up to 12 chemiresistive sensors with four- or six-electrode configurations, independent thermal control, and programmable gas paths. As a representative case study, we designed a customized array for fish-spoilage biomarkers, intentionally leveraging the cross-sensitivity and broad-spectrum responses of metal-oxide sensors. Following principal component analysis (PCA) preprocessing, we evaluated convolutional neural network (CNN), random forest (RF), and particle swarm optimization–tuned support vector machine (PSO-SVM) classifiers. The RF model achieved 94% classification accuracy. Subsequent channel optimization (correlation analysis and feature-importance assessment) reduced the array from 12 to 8 sensors and improved accuracy to 96%, while simplifying the system. These results demonstrate that deliberately leveraging cross-sensitivity within a carefully selected array yields an information-rich odor fingerprint, providing a practical platform for complex gas-mixture identification and food-freshness assessment. Full article
(This article belongs to the Section Chemical Sensors)
Show Figures

Figure 1

18 pages, 1018 KB  
Article
An Event-Based Time-Incremented SNN Architecture Supporting Energy-Efficient Device Classification
by David L. Weathers, Michael A. Temple and Brett J. Borghetti
Electronics 2025, 14(18), 3712; https://doi.org/10.3390/electronics14183712 - 19 Sep 2025
Viewed by 1030
Abstract
Recent advances in Radio Frequency (RF)-based device classification have shown promise in enabling secure and efficient wireless communications. However, the energy efficiency and low-latency processing capabilities of neuromorphic computing have yet to be fully leveraged in this domain. This paper is a first [...] Read more.
Recent advances in Radio Frequency (RF)-based device classification have shown promise in enabling secure and efficient wireless communications. However, the energy efficiency and low-latency processing capabilities of neuromorphic computing have yet to be fully leveraged in this domain. This paper is a first step toward enabling an end-to-end neuromorphic system for RF device classification, specifically supporting development of a neuromorphic classifier that enforces temporal causality without requiring non-neuromorphic classifier pre-training. This Spiking Neural Network (SNN) classifier streamlines the development of an end-to-end neuromorphic device classification system, further expanding the energy efficiency gains of neuromorphic processing to the realm of RF fingerprinting. Using experimentally collected WirelessHART transmissions, the TI-SNN achieves classification accuracy above 90% while reducing fingerprint density by nearly seven-fold and spike activity by over an order of magnitude compared to a baseline Rate-Encoded SNN (RE-SNN). These reductions translate to significant potential energy savings while maintaining competitive accuracy relative to Random Forest and CNN baselines. The results position the TI-SNN as a step toward a fully neuromorphic “RF Event Radio” capable of low-latency, energy-efficient device discrimination at the edge. Full article
(This article belongs to the Special Issue Advances in 5G and Beyond Mobile Communication)
Show Figures

Figure 1

21 pages, 4267 KB  
Article
Chemometric Differentiation of Organic Honeys from Southeastern Türkiye Based on Free Amino Acid and Phenolic Profiles
by Semra Gürbüz and Şeyda Kıvrak
Foods 2025, 14(17), 3105; https://doi.org/10.3390/foods14173105 - 5 Sep 2025
Viewed by 1119
Abstract
Verifying the geographical origin of honey is crucial for its market value and for preventing fraudulent practices. This study aimed to characterize the chemical profiles of organic honeys from three distinct regions in Southeastern Türkiye—Şırnak Faraşin, Siirt Merkez, and Siirt Pervari—to establish a [...] Read more.
Verifying the geographical origin of honey is crucial for its market value and for preventing fraudulent practices. This study aimed to characterize the chemical profiles of organic honeys from three distinct regions in Southeastern Türkiye—Şırnak Faraşin, Siirt Merkez, and Siirt Pervari—to establish a robust method for geographical authentication. A total of 51 multifloral honey samples were analyzed. The concentrations of 20 free amino acids (FAAs) and 16 phenolic compounds were quantified using (UPLC-ESI-MS/MS). The resulting data were subjected to both an unsupervised (PCA, CA) and supervised (PLS-DA, RF, SVM) chemometric analysis to identify biochemical markers for each region. The results revealed a distinct chemical fingerprint for each region. Based on the FAA profiles, the PLS-DA method provided the best overall classification, achieving an excellent discrimination with a total accuracy of 94.1% in the Şırnak Faraşin honeys. For the phenolic compound profiles, the RF method achieved the highest correct classification rate for Şırnak Faraşin honeys at 88.2%. This study demonstrates that an integrated approach, combining FAA and phenolic profiles with supervised chemometric methods, provides a successful and reliable model for determining the geographical origin of these multifloral honeys. Full article
Show Figures

Figure 1

22 pages, 1609 KB  
Article
Open-Set Radio Frequency Fingerprint Identification Method Based on Multi-Task Prototype Learning
by Zhao Ma, Shengliang Fang and Youchen Fan
Sensors 2025, 25(17), 5415; https://doi.org/10.3390/s25175415 - 2 Sep 2025
Viewed by 1569
Abstract
Radio frequency (RF) fingerprinting, as an emerging physical layer security technology, demonstrates significant potential in the field of Internet of Things (IoT) security. However, most existing methods operate under a ‘closed-set’ assumption, failing to effectively address the continuous emergence of unknown devices in [...] Read more.
Radio frequency (RF) fingerprinting, as an emerging physical layer security technology, demonstrates significant potential in the field of Internet of Things (IoT) security. However, most existing methods operate under a ‘closed-set’ assumption, failing to effectively address the continuous emergence of unknown devices in real-world scenarios. To tackle this challenge, this paper proposes an open-set radio frequency fingerprint identification (RFFI) method based on Multi-Task Prototype Learning (MTPL). The core of this method is a multi-task learning framework that simultaneously performs discriminative classification, generative reconstruction, and prototype clustering tasks through a deep network that integrates an encoder, a decoder, and a classifier. Specifically, the classification task aims to learn discriminative features with class separability, the generative reconstruction task aims to preserve intrinsic signal characteristics and enhance detection capability for out-of-distribution samples, and the prototype clustering task aims to promote compact intra-class distributions for known classes by minimizing the distance between samples and their class prototypes. This synergistic multi-task optimization mechanism effectively shapes a feature space highly conducive to open-set recognition. After training, instead of relying on direct classifier outputs, we propose to adopt extreme value theory (EVT) to statistically model the tail distribution of the minimum distances between known class samples and their prototypes, thereby adaptively determining a robust open-set discrimination threshold. Comprehensive experiments on a real-world dataset with 16 Wi-Fi devices show that the proposed method outperforms five mainstream open-set recognition methods, including SoftMax thresholding, OpenMax, and MLOSR, achieving a mean AUROC of 0.9918. This result is approximately 1.7 percentage points higher than the second-best method, demonstrating the effectiveness and superiority of the proposed approach for building secure and robust wireless authentication systems. This validates the effectiveness and superiority of our approach in building secure and robust wireless authentication systems. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

17 pages, 2421 KB  
Article
Cross-Receiver Radio Frequency Fingerprint Identification: A Source-Free Adaptation Approach
by Jian Yang, Shaoxian Zhu, Zhongyi Wen and Qiang Li
Sensors 2025, 25(14), 4451; https://doi.org/10.3390/s25144451 - 17 Jul 2025
Cited by 1 | Viewed by 1599
Abstract
Radio frequency fingerprint identification (RFFI) leverages the unique characteristics of radio signals resulting from inherent hardware imperfections for identification, making it essential for applications in telecommunications, cybersecurity, and surveillance. Despite the advancements brought by deep learning in enhancing RFFI accuracy, challenges persist in [...] Read more.
Radio frequency fingerprint identification (RFFI) leverages the unique characteristics of radio signals resulting from inherent hardware imperfections for identification, making it essential for applications in telecommunications, cybersecurity, and surveillance. Despite the advancements brought by deep learning in enhancing RFFI accuracy, challenges persist in model deployment, particularly when transferring RFFI models across different receivers. Variations in receiver hardware can lead to significant performance declines due to shifts in data distribution. This paper introduces the source-free cross-receiver RFFI (SCRFFI) problem, which centers on adapting pre-trained RF fingerprinting models to new receivers without needing access to original training data from other devices, addressing concerns of data privacy and transmission limitations. We propose a novel approach called contrastive source-free cross-receiver network (CSCNet), which employs contrastive learning to facilitate model adaptation using only unlabeled data from the deployed receiver. By incorporating a three-pronged loss function strategy—minimizing information entropy loss, implementing pseudo-label self-supervised loss, and leveraging contrastive learning loss—CSCNet effectively captures the relationships between signal samples, enhancing recognition accuracy and robustness, thereby directly mitigating the impact of receiver variations and the absence of source data. Our theoretical analysis provides a solid foundation for the generalization performance of SCRFFI, which is corroborated by extensive experiments on real-world datasets, where under realistic noise and channel conditions, that CSCNet significantly improves recognition accuracy and robustness, achieving an average improvement of at least 13% over existing methods and, notably, a 47% increase in specific challenging cross-receiver adaptation tasks. Full article
Show Figures

Figure 1

13 pages, 3506 KB  
Article
Development of an HPTLC-MS Method for the Differentiation of Celosiae Semen: Celosia argentea Versus C. cristata
by Kyu Won Kim, Geonha Park, Sejin Ku and Young Pyo Jang
Molecules 2025, 30(13), 2786; https://doi.org/10.3390/molecules30132786 - 28 Jun 2025
Viewed by 880
Abstract
Celosiae Argentea Semen (CAS), derived from Celosia argentea L., is traditionally used in Korean and Chinese medicine to treat eye disorders and liver heat and is recognized in official Pharmacopeias. In contrast, Celosiae Cristatae Semen (CCS), despite its frequent presence in the market, [...] Read more.
Celosiae Argentea Semen (CAS), derived from Celosia argentea L., is traditionally used in Korean and Chinese medicine to treat eye disorders and liver heat and is recognized in official Pharmacopeias. In contrast, Celosiae Cristatae Semen (CCS), despite its frequent presence in the market, is not officially listed. The morphological and chemical similarities between the two pose challenges for accurate identification. This study presents an integrative method combining digital image analysis and high-performance thin-layer chromatography coupled with mass spectrometry (HPTLC-MS) to differentiate CAS from CCS. Digital microscopy and ImageJ analysis showed that CCS has a projection area over twice that of CAS. Chemically, an optimized HPTLC method using ethyl acetate, methanol, water, and formic acid revealed distinct fingerprint patterns under UV 366 nm and white light. Notably, celosin F was exclusively detected in CAS, while celosin H, J, and K were characteristic of CCS. ESI-TOF-MS analysis confirmed these markers, resolving an overlap in RF values. Repeatability tests showed total SDs of sucrose for intra-day, inter-day, and inter-analysis precision were 0.006, 0.004, and 0.005, respectively, confirming method reliability. This combined approach offers a rapid, reliable, and practical tool for distinguishing these two medicinal seeds, supporting enhanced quality control and regulatory standardization in pharmaceutical applications. Full article
Show Figures

Figure 1

26 pages, 9222 KB  
Article
Evaluation of Confusion Behaviors in SEI Models
by Brennan Olds, Ethan Maas and Alan J. Michaels
Sensors 2025, 25(13), 4006; https://doi.org/10.3390/s25134006 - 27 Jun 2025
Viewed by 742
Abstract
Radio Frequency Machine Learning (RFML) has in recent years become a popular method for performing a variety of classification tasks on received signals. Among these tasks is Specific Emitter Identification (SEI), which seeks to associate a received signal with the physical emitter that [...] Read more.
Radio Frequency Machine Learning (RFML) has in recent years become a popular method for performing a variety of classification tasks on received signals. Among these tasks is Specific Emitter Identification (SEI), which seeks to associate a received signal with the physical emitter that transmitted it. Many different model architectures, including individual classifiers and ensemble methods, have proven their capabilities for producing high accuracy classification results when performing SEI. Though the works studying different model architectures report on successes, there is a notable absence regarding the examination of systemic failures and negative traits associated with learned behaviors. This work studies those failure patterns for a 64-radio SEI classification problem by isolating common patterns in incorrect classification results across multiple model architectures and two distinct control variables: Signal-to-Noise Ratio (SNR) and the quantity of training data utilized. This work finds that many of the RFML-based models devolve to selecting from amongst a small subset of classes (≈10% of classes) as SNRs decrease and that observed errors are reasonably consistent across different SEI models and architectures. Moreover, our results validate the expectation that ensemble models are generally less brittle, particularly at a low SNR, yet they appear not to be the highest-performing option at a high SNR. Full article
(This article belongs to the Special Issue Sensors for Enabling Wireless Spectrum Access)
Show Figures

Figure 1

35 pages, 8431 KB  
Article
Integrating Physical Unclonable Functions with Machine Learning for the Authentication of Edge Devices in IoT Networks
by Abdul Manan Sheikh, Md. Rafiqul Islam, Mohamed Hadi Habaebi, Suriza Ahmad Zabidi, Athaur Rahman Bin Najeeb and Adnan Kabbani
Future Internet 2025, 17(7), 275; https://doi.org/10.3390/fi17070275 - 21 Jun 2025
Cited by 3 | Viewed by 1515
Abstract
Edge computing (EC) faces unique security threats due to its distributed architecture, resource-constrained devices, and diverse applications, making it vulnerable to data breaches, malware infiltration, and device compromise. The mitigation strategies against EC data security threats include encryption, secure authentication, regular updates, tamper-resistant [...] Read more.
Edge computing (EC) faces unique security threats due to its distributed architecture, resource-constrained devices, and diverse applications, making it vulnerable to data breaches, malware infiltration, and device compromise. The mitigation strategies against EC data security threats include encryption, secure authentication, regular updates, tamper-resistant hardware, and lightweight security protocols. Physical Unclonable Functions (PUFs) are digital fingerprints for device authentication that enhance interconnected devices’ security due to their cryptographic characteristics. PUFs produce output responses against challenge inputs based on the physical structure and intrinsic manufacturing variations of an integrated circuit (IC). These challenge-response pairs (CRPs) enable secure and reliable device authentication. Our work implements the Arbiter PUF (APUF) on Altera Cyclone IV FPGAs installed on the ALINX AX4010 board. The proposed APUF has achieved performance metrics of 49.28% uniqueness, 38.6% uniformity, and 89.19% reliability. The robustness of the proposed APUF against machine learning (ML)-based modeling attacks is tested using supervised Support Vector Machines (SVMs), logistic regression (LR), and an ensemble of gradient boosting (GB) models. These ML models were trained over more than 19K CRPs, achieving prediction accuracies of 61.1%, 63.5%, and 63%, respectively, thus cementing the resiliency of the device against modeling attacks. However, the proposed APUF exhibited its vulnerability to Multi-Layer Perceptron (MLP) and random forest (RF) modeling attacks, with 95.4% and 95.9% prediction accuracies, gaining successful authentication. APUFs are well-suited for device authentication due to their lightweight design and can produce a vast number of challenge-response pairs (CRPs), even in environments with limited resources. Our findings confirm that our approach effectively resists widely recognized attack methods to model PUFs. Full article
(This article belongs to the Special Issue Distributed Machine Learning and Federated Edge Computing for IoT)
Show Figures

Figure 1

25 pages, 5629 KB  
Article
Signal Preprocessing for Enhanced IoT Device Identification Using Support Vector Machine
by Rene Francisco Santana-Cruz, Martin Moreno, Daniel Aguilar-Torres, Román Arturo Valverde-Domínguez and Rubén Vázquez-Medina
Future Internet 2025, 17(6), 250; https://doi.org/10.3390/fi17060250 - 31 May 2025
Viewed by 924
Abstract
Device identification based on radio frequency fingerprinting is widely used to improve the security of Internet of Things systems. However, noise and acquisition inconsistencies in raw radio frequency signals can affect the effectiveness of classification, identification and authentication algorithms used to distinguish Bluetooth [...] Read more.
Device identification based on radio frequency fingerprinting is widely used to improve the security of Internet of Things systems. However, noise and acquisition inconsistencies in raw radio frequency signals can affect the effectiveness of classification, identification and authentication algorithms used to distinguish Bluetooth devices. This study investigates how the RF signal preprocessing techniques affect the performance of a support vector machine classifier based on radio frequency fingerprinting. Four options derived from an RF signal preprocessing technique are evaluated, each of which is applied to the raw radio frequency signals in an attempt to improve the consistency between signals emitted by the same Bluetooth device. Experiments conducted on raw Bluetooth signals from twentyfour smartphone radios from two public databases of RF signals show that selecting an appropriate RF signal preprocessing approach can significantly improve the effectiveness of a support vector machine classifier-based algorithm used to discriminate Bluetooth devices. Full article
Show Figures

Graphical abstract

Back to TopTop