Loading [MathJax]/jax/output/SVG/jax.js
SUN Liting, HUANG Zhitao, WANG Xiang, et al. Overview of radio frequency fingerprint extraction in specific emitter identification[J]. Journal of Radars, 2020, 9(6): 1014–1031. doi: 10.12000/JR19115
Citation: SUN Liting, HUANG Zhitao, WANG Xiang, et al. Overview of radio frequency fingerprint extraction in specific emitter identification[J]. Journal of Radars, 2020, 9(6): 1014–1031. doi: 10.12000/JR19115

Overview of Radio Frequency Fingerprint Extraction in Specific Emitter Identification(in English)

DOI: 10.12000/JR19115
Funds:  The Program for Innovative Research Groups of the Hunan Provincial Natural Science Foundation of China (2019JJ10004)
More Information
  • Specific emitter identification is a technique of extracting the radio frequency fingerprints of the received electromagnetic signal only using external feature measurements to determine the specific emitter that transmits the signal. In recent years, the related theories and practical applications of specific emitter identification have been continuously improved, and research on radio frequency fingerprinting feature extraction methods has made great progress. Based on the domestic and foreign academic achievements, this paper systematically reviews the status quo of the fingerprint feature extraction method of specific emitter identification. In addition, a new feature classification framework is proposed based on the inherent logic of fingerprint feature extraction. The classification framework combines the description characteristics of different radio frequency fingerprinting features and the correlation between them. It divides the existing radio frequency features into two main categories: direct measurement features and dimensionality reduction transform features, which have three levels. Finally, this paper analyzes and explores several potential research directions of fingerprint feature extraction, aiming to benefit the research and application of specific radiation source identification.

     

  • Specific Emitter Identification (SEI), also known as Radio Frequency Fingerprinting (RFF), was first proposed by Northrop Grumman of the United States in the 1960s[1]. It refers to the technology of extracting information reflecting a transmitter’s identity (referred to as a “radio frequency fingerprint”) by only using the external characteristics of the received signal and comparing the fingerprint information with a database, thereby determining the specific emitter. The fingerprint of an emitter is an inherent characteristic of the hardware of the transmitting device, which is unforgeable, unavoidable, and unchangeable. Moreover, it a weak signal is attached to the transmitting signal in the form of unintentional modulation.

    SEI technology has a unique role in identifying specific originating individuals and has attracted widespread attention in the fields of spectrum management, network security, cognitive radio, and electronic countermeasures. Particularly, in military applications, SEI technology can identify specific signals from the complex electromagnetic environment and associate them with individual radiation sources, their platforms and weapon systems, and strategic and tactical targets[1]. It is of great significance for quickly grasping battlefield situations and grasping initiatives during wars.

    SEI extracts features containing individual information that characterizes a specific transmitter from the received time series for classification and recognition. Therefore, it is essentially a pattern recognition problem.

    The structure of a typical SEI system, proposed by Talbot et al.[1] in 2003, is presented in Fig. 1. The general processing flow of SEI is as follows: First, the signal is obtained through the radio frequency-receiving subsystem. Second, signal preprocessing is performed, where the received signal is subjected to various processes, such as filtering, denoizing, pulse detection, and signal demodulation. Then, extract the fine features containing the individual information of the radiation source device. Finally, the feature is compared with data in a database and used in classification and recognition algorithms to determine the specific emitter.

    Figure  1.  Structural diagram of typical system for specific emitter identification[1]

    In the traditional SEI (different from the deep learning-based intelligent SEI method) system, the definition and extraction of fingerprint features are of significant importance. Therefore, the fingerprint feature extraction of SEI is specifically analyzed in this study.

    The structure of this paper is as follows: Section 2 briefly introduces the basic connotation of the fingerprint features of SEI. Section 3 briefly describes the two currently commonly used taxonomies. Section 4 is the main content of this article and proposes a detailed fingerprint feature taxonomy framework. It also presents a detailed review and analysis of the research progress of various fingerprint features under this framework. Section 5 focuses on the current status of Artificial Intelligence (AI) technology applied to SEI. Section 6 summarizes and presents the future prospects of the fingerprint feature extraction of SEI.

    The imperfection of the emitter hardware chain leads to the inevitable deviation of modulated signals, i.e., it unintentionally modulates the hardware information to the signal within the allowable range of the normal operation of the system. These subtle differences vary from different transmitters, such that the unintentional modulation carries transmitter-specific information. This physical-layer difference is caused by hardware, which is inevitably attached to the intentional modulation and is nearly impossible to mimic, particularly with radio frequency fingerprints.

    However, related research on the description and characterization of radio frequency fingerprints is very challenging, mainly due to the following three reasons:

    (1) The generation mechanism of radio frequency fingerprints is complex, and the performance is not intuitive and easy to understand like biological fingerprints. It does not have an accurate definition and cannot be accurately modeled and expressed with mathematical tools.

    (2) The fingerprint differences caused by hardware between emitters are very subtle, especially for transmitters of the same model and batch of the same manufacturer.

    (3) A fingerprint is an unintentional modulation attached to a transmitted signal. Compared with the main part of a signal, its energy is weak and easily affected by many factors, such as complex channel conditions, multipath effects, and environmental noise.

    Therefore, SEI needs to extract effective features from as many perspectives as possible to depict real radio frequency fingerprints. These characteristics are called “radio frequency fingerprint features,” which should meet the following basic requirements[24]:

    (1) Universality: The fingerprint features of a transmitter should be universally present in all individual transmitters and all signal samples.

    (2) Uniqueness: Feature parameters are different in the samples of different individual transmitters, i.e., the fingerprint features of different emitters are unique, different, and distinguishable.

    (3) Stability: The feature of the same individual remains stable or does not change significantly within a certain period of time.

    (4) Independence: The individual features of an emitter should be independent of the signal pattern and only related to the transmitter hardware.

    (5) Measurability: Feature parameters can be extracted and detected from observed samples using relevant technologies, and the measurement accuracy can meet the requirements of classification.

    The commonly used taxonomies of fingerprint feature methods for SEI are as follows: Based on the signal type of the analysis object, RFF features can be divided into radar SEI fingerprint features and communication SEI fingerprint features. Based on the signal state of the analysis object, it is divided into transient-state and steady-state features. These taxonomy methods are mainly aimed at the analysis objects of SEI and do not fully consider the performances of features in describing fingerprints and the correlation between different features.

    Related research on radar signals started in the mid-1960s, and conventional radar parameters were initially used as the identification basis[1], the most typical of which is the use of pulse description words (PDWs) (PDW = {RF, PA, PW, TOA, DOA}) to identify specific radar equipment. As the radar system becomes more complex, the waveform design becomes more complicated, the working frequency band of the radar continues to expand, and the working frequency bands of different radars overlap in a wider range, especially the use of phased-array and agile radars. Therefore, conventional radar parameters can no longer provide enough effective information to meet the corresponding identification requirements[5]. The intra-pulse characteristics of radar signals are increasingly used in SEI.

    Compared with radar signals, the research on SEI of communication radiation sources started a little later[6]. SEI of the communication system is also more difficult: communication signal systems are diverse, modulation types are complex and carry a large amount of modulation information, and subtle fingerprint features are usually submerged in the main intentional modulation information. Hence, it is highly difficult to extract fingerprints accurately. Commonly used fingerprint features of communication signals include signal modulation curve-based features and high-dimensional transform domain-based features.

    In addition to radar and communication signals in SEI, some studies have focused on other types of signals, such as satellite signals, navigation signals, wireless network signals (e.g., IEEE802.11 series protocol signals), Global System for Mobile communications system signals, electronic tags (Radio Frequency IDentification, RFID), and related radio frequency signals of other Internet of Things devices.

    Based on the inherent manifestations of signal states, i.e., noise, transient, and steady states, fingerprint features can be divided into transient-state and steady-state features.

    The transient state refers to the process of equipment switching, mode conversion, symbol conversion of the digital communication system, and external excitation changes in the system. The signals in these processes do not contain any modulated communication data and are only related to the physical-layer characteristics of the device, which can better reflect the unintentional modulation characteristics of emitters[7,8]. The fingerprint features extracted in this process are called transient features.

    The premise of transient feature extraction is to accurately obtain complete transient signals. However, the detection of transient signals is relatively complicated, and the main difficulties are as follows. (1)The duration of the transient state is short. (2)Due to noise, the start and end points of the transient state cannot be accurately determined. (3)The amplitude, phase, and frequency characteristics of transient signals are easily affected by nonideal complex channel conditions[9]. Guo et al.[10] compared typical transient analysis methods, focusing on the analysis of five transient characteristics, namely, fractal dimension estimation, entropy, energy trajectory, and inherent shape of the rising edge.

    A steady-state signal refers to the part of the signal transmitted by the transmitting device after the power is stabilized. The communication signal mainly contains the data part to be transmitted and a small amount of noise. Compared with transient signals, steady-state signals are easier to obtain. When the emitter is working in a stable state, the individual difference caused by numerous hardware units (components or modules) in the physical layer is displayed on the signal in the form of “combined forces”, which is stable. However, the state fingerprint features are hidden deep in the modulated signal and noise, making it difficult to extract.

    Considering the inherent logic of fingerprint feature extraction in SEI, this study combined the mathematical principles of feature tools based on the feature extraction method, proposed a new fingerprint feature framework, and divided the existing fingerprint features into two categories, namely, direct measurement features (primary features) and dimensionality reduction transformation features (secondary features). Moreover, combined with the principle of the fingerprint feature analysis, each category is classified in more detail. The features are divided into three levels for SEI.

    The direct measurement feature refers to the feature directly extracted from the received signal based on the basic signal analysis process (e.g., basic parameter information and basic transformation information). Under normal circumstances, the input for calculating direct measurement features can only be the preprocessed signal series. The results can be directly used as a fingerprint feature for SEI. Features with higher dimensionality can also be further subjected to secondary feature transformation, and the final result after the calculation (i.e., dimensionality reduction transformation feature) is used as the fingerprint feature.

    The dimensionality reduction transformation feature is not closely integrated with the signal characteristics and does not rely on the basic knowledge of electromagnetic signal analysis. However, these features are usually considered feature description methods to optimize the direct measurement features. i.e., on the basis of the primary features, the secondary features are extracted based on a certain mathematical transformation. In special cases, it can also be used directly to extract the features of the original signal.

    To facilitate understanding and discussion, let x(n) denote the preprocessed data, F1{} be the direct measurement feature calculation, F2{} be the dimensionality reduction transformation feature extraction, and y(m) denotes the final fingerprint feature result, i.e., the input of the classifier. The extracted fingerprint features are

    y1(m1)=F1{x(n)},m1=1,2,···,M1 (1)
    y2(m2)=F2{F1{x(n)}},m2=1,2,···,M2 (2)

    where y1 and y2 represent the direct measurement feature and dimensionality reduction transformation, respectively, and M1 , M2 ( M2M1 ) is the corresponding feature dimension. However, in theory, it is also possible to directly extract the dimensionality reduction transform characteristics of a signal, i.e., y2(m2)= F2{x(n)} . For example, the fractal dimension estimation of the original signal can be directly used for SEI. In practical applications, this situation is relatively rare, and it usually needs to meet certain prerequisites, such as a specific signal pattern or specific processing. In the taxonomy proposed in this paper, such features that rely on the special structure of the signal and the basic signal analysis methods are classified as direct measurement features. Thus, in a strict sense, the above situation can be expressed by Eq. (2). In short, in this taxonomy, F1{} , F2{} are serial, usually first F1{} and then comes F2{} . F2{} can be omitted in some cases.

    Compared with the current methods, the framework refines the classification of fingerprint features, and it is consistent with the inherent logic of fingerprint feature processing and analysis. In addition, it covers all commonly used fingerprint features at this stage and minimizes the overlap of feature methods as much as possible. Hence, researchers should further refine and improve the features and study their combinations.

    The following is a detailed analysis of the classification framework and development status of fingerprint features under various categories. In the taxonomy framework based on the inherent logic of the fingerprint analysis, the two major categories of features are shown in Tab. 1 and 2. Tab. 1 shows the direct measurement feature, and Tab. 2 shows the dimensionality reduction transformation feature.

    Table  1.  Direct measurement features under the feature framework based on the inherent logic of fingerprint feature extraction
    Feature method Reference
    Basic parameter information General parameter [1,11,12]
    Envelope feature [1318]
    Instantaneous feature [1923]
    Modulation parameter [2426]
    Spectrum feature [327]
    Basic transformation
    information
    Time-frequency analysis [2832]
    High-order spectrum [3337]
    Cyclic spectrum [38,39]
    Hilbert spectrum [4043]
    Signal special structure
    Signal preamble [23,44,45]
    Radar signal analysis [4651]
    Decomposition and
    reconstruction information
    EMD [42,43,5255]
    ITD [5663]
    VMD [9,43,64,65]
    Phase space analysis [2,6669]
    Segmentation reconstruction [70,71]
    Transmitter hardware characteristics Equivalent circuit model [72]
    Nonlinear circuit model [73]
    Frequency source circuit [74]
     | Show Table
    DownLoad: CSV
    Table  2.  Dimensionality reduction feature under feature framework based on the inherent logic of fingerprint feature extraction
    Feature Method Reference
    Waveform skeleton [7578]
    Fractal and complexity [42,79,80]
    Specific path integration/slicing [38,39,81]
    Entropy [59,65,8284]
    SVD [36,38,85]
    Traditional dimensionality reduction [3,8688]
     | Show Table
    DownLoad: CSV

    The direct measurement feature refers to the fingerprint feature that is closely related to the common basic signal analysis methods. This type of feature directly acts on the preprocessed signal to obtain or retain as much of the original signal’s fingerprint information as possible. This study mainly considers the following aspects of the direct measurement fingerprint features of SEI:

    Basic parameter information: commonly used communication signal parameters, radar signal parameters, time-domain and frequency-domain basic parameter information, and other parameters that can be used to identify individual information in the conventional signal processing process;

    Basic transformation information: basic signal transformation, including time-frequency transformation, high-order spectrum analysis, and cyclic spectrum analysis;

    Signal special structure: specific structures contained in the transmitted signal, such as the IEEE802.11 series protocol signal frame header and handshake signal in digital radio transmission, which are used to meet specific communication requirements or corresponding standards;

    Decomposition and reconstruction information: corresponding transformations of the received time series to improve the data dimension, including adaptive signal decomposition methods and phase space reconstruction methods;

    Transmitter hardware characteristics: the fingerprint feature generation mechanism modeling analysis carried out according to the nonideal characteristics of the related hardware in the signal transmission process.

    Basic parameter information refers to the conventional parameters of the signal, such as the conventional parameters of the radar signal (e.g., PDW); envelope shape; rising edge time; intra-pulse characteristics, including Instantaneous Frequency (IF) and Instantaneous Phase (IP); symbol rate of the communication signal; carrier frequency deviation; spectral characteristics; modulation parameters; and modulation domain errors (including IQ imbalance and constellation offset). Such features are mainly concentrated in the time and frequency domains and are common in various signal processing procedures. Compared with other signal processing processes, SEI usually requires high accuracy for estimating such parameters.

    Fingerprint features based on the basic parameter information are divided into five categories in this paper: conventional parameters, envelope characteristics, instantaneous parameters, modulation errors, and spectral distribution characteristics. The following describes their applications in SEI.

    (1) General parameter

    The SEI technology based on the features of conventional radar parameters mainly relies on the features directly measured or estimated by the signal measurement and detection systems[1,11], such as carrier frequency, pulse azimuth, pulse coding method, pulse width, pulse arrival time, and pulse amplitude. Then, these features are compared with the known signal parameters in the database to obtain relevant information about the intercepted pulse signal[12]. The early radar system was relatively simple, the electromagnetic signal density was small, the pulse signal frequency domain span was small and less overlapped, the signal form was simple, and the parameters were relatively stable, so the corresponding signal identification based on the conventional parameters was effective before. Nowadays, as the electromagnetic environment is becoming increasingly complex, the signal is diversified, and the difference in signal parameters is constantly shrinking. Thus, it is difficult to accurately confirm the specific emitter using conventional parameters directly as fingerprint features.

    (2) Envelope feature

    Due to the nonideality of the electronic device itself, there is inevitably a slight difference in transmitter performance. This subtle difference can be mapped on the shape of the signal’s time-domain pulse envelope, so the waveform is accompanied by the characteristics of a specific transmitter, which can be used as a basis for individual identification. The pulse envelope waveform of the radar signal is shown in Fig. 2.

    Figure  2.  Radar pulse envelope

    The received signal can be affected by the multipath effect, transmitter phase noise, and additive noise, and its pulse envelope will produce varying degrees of distortion and fading[13]. When the influence of the multipath effect is large, the pulse envelope shape may even change. Studies have found that the rising edge of the pulse envelope is the least affected by the multipath among the envelope parameters. Therefore, the front edge of the envelope (including the rising edge and part of the pulse top waveform) is often used as the fingerprint feature of the radiation source[14,15].

    In Ref. [16], the wavelet transform technology for the envelope analysis was combined, and high-precision envelope information was extracted as the fingerprint feature of SEI. In Ref. [14], Liu Xu et al. combined the recurrence rate analysis method to detect the start and end points of a signal and defined three new variables, namely, fitting rising angle, fitting falling angle, and P/S, to describe the envelope shape of pulses. In Ref. [15], two envelope features R and J excavated the spurious characteristics of the spurious modulation of the signal envelope to a certain extent. Rehman et al.[17] used the short-time Fourier transform spectrogram to detect the transient energy envelope curve of the Bluetooth signal and extracted the area under the normalized curve, duration of the transient, kurtosis, skewness, and variance of the curve to describe the subtle characteristics of the envelope. In Ref. [18], four envelope features, namely, Linear Envelope (LE), Tangent Envelope (TE), Quadratic Envelope (QE), and Sigmoid function Envelope (SE), were defined.

    Particularly, the radar pulse waveform is susceptible to atmospheric propagation effects, making incidental amplitude modulation an unreliable parameter.

    (3) Instantaneous feature

    Instantaneous features include IF, IP, and Instantaneous Amplitude (IA). The estimation methods of the instantaneous parameters mainly include the Hilbert Transform (HT), energy separation, generalized zero crossings, empirical Amplitude Modulated (AM)-Frequency Modulated (FM) decomposition, direct quadrature, and normalized HT[19]. Among them, the HT is the most commonly used.

    The transient features are mainly used in the transient state of the signal and the frame header structure (preamble) of specific signals. The changes in amplitude, phase, and frequency of the processes often become different over time. Fig. 3 shows the IF features of secondary response signals when four civil aviation aircraft communicate with the ground. Hall et al.[20] extracted a number of features from the IF, IP, and IA of the transient state, including the standard deviation of normalized instantaneous features, variance of change in amplitude, standard deviation of normalized I/Q data, power per section, and average change in DWT coefficients. In Ref. [21], the five-dimensional feature vector was defined based on the IA, which effectively realizes the identification of wireless network cards and Bluetooth devices. Huang et al.[22] specifically addressed the problem of individual identification of Frequency-Shift Keying (FSK) radio stations, completed the estimation of FSK frequency distortion parameters, and established the basis of the IF fingerprint model. In Ref. [23], an envelope and IP were combined to extract the individual characteristics of radar signals, and the influence of the radar operating mode on device-specific features was analyzed based on measured data.

    Figure  3.  Instantaneous phase characteristics of the secondary response signals of four civil aviation aircrafts

    (4) Modulation parameter

    The fingerprint feature based on the modulation domain error is also called the constellation shape error fingerprint feature. It is a steady-state fingerprint feature (i.e., PAssive RAdiometric Device Identification System, PARADIS) proposed by Brik et al.[24] in 2008. This method takes into account the influence of various nonideal characteristics of a device on the modulation signal, including the I/Q channel offset, frequency offset, and limiting effect on the amplitude, which usually appear as constellation deterioration in the modulation domain. The nonlinear characteristics of the oscillator source, mixer, power amplifier, and other devices in different radiation source hardware devices are slightly different. Therefore, the shape of the signal constellation diagram is different. Based on the differences in the constellation diagram shape, we can determine the radiation source where the signal comes from.

    Brik et al.[24] compared the difference in the distribution of scattered points on the constellation diagram; defined fingerprint features, such as phase error, amplitude error, and I/Q channel offset; and successfully realized the identification of 138 wireless network cards (quadrature phase shift keying modulation). In Refs. [25,26], further research was performed on the modulation domain error based on the work of Brik et al.[24]. The former extracts constellation diagrams on the basis of carrier recovery, symbol rate estimation, and timing estimation and uses the Hausdorff distance to measure the similarity of transmitters. The latter analyzes the influence of phase noise on the modulation domain, dynamically clusters the observation points of the received signal, obtains a reconstructed constellation, and completes the classification of the constellation according to the maximum likelihood criterion.

    The fingerprint feature based on the constellation error gets rid of the dependence on the signal time-domain waveform, suppresses the influence of noise and bad channel effect to a certain extent, and is easily implemented in the hardware. However, its shortcomings are also prominent. First, it is only applicable to digital modulation signals. Second, it is necessary to accurately estimate information, such as frequency, code rate, and modulation pattern, and the recognition effect largely depends on the results of the digital demodulation.

    (5) Spectrum feature

    The reference frequency of the signal generated by the individual crystal oscillators of different emitters is different, which causes the difference between the carrier frequency and the code rate of the signal, and the relative deviation (the ratio of the deviation to the standard deviation) has nothing to do with the standard deviation. In Ref. [3], the accurate estimation of the carrier frequency and code rate was examined, and the effectiveness of frequency deviation as a fingerprint feature to identify specific emitters was verified.

    Although the relative deviation between the carrier frequency and the code rate is distinguishable, the implementation of SEI requires an extremely high estimation accuracy, and it is difficult to obtain the standard value of the signal parameter in practical applications. Thus, it is impossible to obtain an accurate relative deviation for SEI.

    In addition, the asymmetric characteristics of the spectrum can be used as fingerprint features to identify individual radiation sources[27].

    On the basis of basic parameters, transform-domain information, such as time-frequency spectrum, high-order spectrum, and Hilbert spectrum, have recently been widely used for RFF.

    (1) Time-frequency analysis

    Time-frequency analysis, particularly Joint Time-Frequency Analysis (JTFA), provides joint distribution information of the time and frequency domains. It clearly describes the relationship between the signal frequency and time and is a powerful tool for analyzing time-varying non-stationary signals. The most common time-frequency analysis methods include the Short-Time Fourier Transform (STFT), wavelet transform, Wegener distribution, and quadratic time-frequency distribution.

    Fingerprint features based on STFT were analyzed in Ref. [28]. In Ref. [29], the time–frequency characteristics of binary signals were systematically analyzed. In Ref. [30], the wavelet transform was used to extract the unintentional modulation of RFID. In Ref. [31], transmitter identification methods based on the wavelet transform were systematically analyzed. In Ref. [32], the improved Choi-Williams Distribution (CWD) of Wigner-Ville distribution was introduced, the CWD was used to convert the one-dimensional (1D) time-domain signal to a two-dimensional (2D) time-frequency domain image, and the modulation information was extracted in the time-frequency plane.

    Such fingerprint features are often limited by the inherent drawbacks of time-frequency tools and face a series of problems. For example, (1)STFT has shortcomings in solving nonlinear problems. (2)A contradiction exists between the choice of window function and its length and the resolution of the spectrogram. (3)The wavelet transform method relies on the choice of wavelet packet and has low precision and poor adaptability. (4)There are serious cross terms in quadratic time-frequency analysis methods, and the energy of the entire time-frequency plane may appear negative.

    (2) High-order spectrum

    Actual signals do not strictly obey the Gaussian distribution, and the signals emitted by different emitters show non-Gaussian characteristics. A high-order spectrum, like the Fourier transform of high-order cumulants, is an effective non-Gaussian analysis tool. The high-order spectrum does not affect the time, can retain the signal amplitude and phase information, and suppress the Gaussian noise. Among them, the third-order spectrum, also known as the bispectrum, with the characteristics of a time-shift invariance, scale variability, and phase retention, is the most widely used in SEI. Fig. 4 shows the bispectrum feature distribution of two FM radio signals, which indicates that there are significant differences in the bispectrum features of signals from different radiation sources.

    Figure  4.  Bispectrum characteristic images of two FM radio signal

    The bispectrum feature is a third-order statistical feature with a relatively large complexity, and the unique information of the transmitter is scattered in a high-dimensional space, making classification and recognition difficult. Therefore, when utilizing high-order spectrum features, the dimensionality reduction transform algorithms, such as representative slice integration, should be combined, and the dimensionality reduction feature based on the distribution of high-dimensional data should be extracted.

    In Refs. [3337], high-order spectra were chosen as the preliminary high-dimensional features, and different mathematical tools were used to extract the secondary features. In Ref. [3], Locally Linear Embedding (LLE) manifold reduction was used to perform a dimensionality reduction analysis on high-dimensional Square Integral Bispectra (SIB) features and improves the distance definition of LLE samples and output dimension estimation method for SEI.

    (3) Cyclic spectrum

    Cyclo-stationarity is an important characteristic of a modulated signal. The cyclic spectral density function contains information, such as frequency and phase related to the modulated signal. Cyclic spectrum analysis can distinguish the signal from the noise with non-cyclic stationery. Therefore, the anti-interference, signal analysis, and characterization ability of the cyclic spectrum analysis are stronger than those of the power spectrum[38]. The most commonly used non-parametric cyclic spectrum estimation methods are the time-domain and frequency-domain smooth periodogram methods.

    In Ref. [39], the α cross-sectional spectrum (cyclic spectrum slice) of the cyclic spectrum density f=0 was chosen as the initial high-dimensional feature, and the cyclic spectrum difference in the signal was analyzed to achieve the purpose of SEI.

    (4) Hilbert spectrum

    The Hilbert spectrum is derived from the Hilbert-Huang Transform (HHT). Intrinsic Mode Functions (IMFs) can be obtained after the Empirical Mode Decomposition (EMD) of the signal is subjected to the HT. After the HT, the relationship among time, frequency, and amplitude of the IMF can be obtained. The distribution of amplitude on the time-frequency plane is the Hilbert spectrum H(t,ω) .

    Wang et al.[40] used the improved HHT algorithm to calculate the signal Hilbert spectrum . Wang Li[41] summarized some of the fingerprint features that can be extracted on the basis of the HHT. In Ref. [42], the Hilbert edge spectrum was extracted. In Ref. [43], the performance of the HHT fingerprint features in a single-hop scenario and relaying scenario and in different channels was paid attention to.

    Some signals have unique structural characteristics and can be used for SEI, such as the preamble of the wireless signal under the 802.11 protocols, and its format is shown in Fig. 5. Under the same standard, the preamble contains the same content, which can avoid the impact of different modulation information, is more robust than other features, and is suitable for the identification of different wireless network devices.

    Figure  5.  Preamble format of standard IEEE802.11b

    In Refs. [23,44], a Wi-Fi signal preamble was used to identify wireless network cards. In Ref. [45], seven software radio peripheral transmitters (Universal Software Radio Peripheral, USRP) were combined with the signal generated by the protocol simulation to identify emitters.

    However, most types of signals do not have a preamble, and in the case of non-cooperation, it is usually impossible to obtain a complete data frame header.

    Similar to the preamble, radar signals also have special structures or parameters that can be used for identification, such as the Ambiguity Function (AF) and Doppler[46]. Among them, the AF was first used for radar analysis and waveform design, and now it is also often used to characterize the individual differences of different signals. In Ref. [47], radar signal sorting was performed by extracting the main ridge slice of the ambiguity function. In Ref. [48], the local AF slice was defined, and its fast estimation algorithm was proposed on the basis of the method in Ref. [47] to extract and identify different radar pulse data. Wang Lei et al.[4951] further optimized the fingerprinting features of the AF .

    SEI does not focus on the main information conveyed in the signal transmission process, but it pays attention to details other than the main components of the signal. Using decomposition and reconstruction algorithms to improve the original signal dimension, fingerprint-related features can be extracted from a higher level, and at the same time, a new idea for separating the main component and secondary component (spurious component) of the signal can be provided.

    Commonly used decomposition methods include EMD, Intrinsic Time-scale Decomposition (ITD), and Variational Mode Decomposition (VMD). Reconstruction methods include phase space reconstruction and segmentation reconstruction.

    Decomposition and reconstruction make the data have higher dimensions, more variables, and more complex forms. Therefore, understanding the differences and connections between different signal components in a high-dimensional space and extracting the truly meaningful information are the keys to use such features to realize SEI. Otherwise, mapping data to high-dimensional space can only result in greater computational pressure and information redundancy.

    (1) EMD

    EMD was first proposed by Norden et al.[52] in 1998, which is a posterior adaptive time-frequency analysis method for nonlinear and non-stationary signals.

    The basic calculation method of EMD is to use the tertiary spline interpolation method to continuously and iteratively search for the upper and lower envelopes of the local maximum and minimum points of the original signal, obtain the IMF components, and complete the decomposition process. Fig. 6 shows the time-domain waveforms of a signal and all the decomposed IMFs after EMD. The first layer of the sub-pictures is the original signal waveform, and the remaining sub-pictures correspond to each IMF. The figure shows that EMD basically works according to the frequency from high to low. The first few layers of IMF components with high frequency and low amplitude can be roughly understood as high-frequency spurious components attached to the signal.

    Figure  6.  Schematic of empirical mode decomposition results

    In the past 20 years, there have been many SEI-related studies based on EMD at home and abroad. In Ref. [53], EMD was first used for SEI and compared with wavelet decomposition. In Ref. [54], IMF was used to reconstruct signals to obtain stable time-frequency distribution characteristics. Liang et al.[55] used EMD to separate the main components and spurious components containing individual information about the radiation source. In Ref. [42], the fractal features of IMF in the time and frequency domains were extracted, combining IF and Hilbert edge spectrum as fingerprint features. In Ref. [43], three different features based on EMD were proposed, and its performance was explored for the first time in the relay scene.

    (2) ITD

    In 2007, Frei M G et al.[56] proposed ITD, which decomposes a signal into the sum of several inherent rotation components and a monotonic trend. Compared with EMD, the process of filtering and interpolation is subtracted.

    In Ref. [57], the instantaneous parameters of ITD were used to reconstruct the time spectrum, and the spectral symmetry deviation coefficient of the signal spectrum was defined as a feature. In Ref. [58], the fractal features, RJ features, and edge spectrum features of different rotation components after ITD were extracted. In Ref. [59], ITD was combined with the nonlinear analysis method, the correlation coefficient was used to filter out the appropriate signal components, and the entropy data of each layer of the signal were extracted. Ren et al.[60] combined ITD and image processing methods to extract corresponding fingerprint features. In addition, ITD has a wide range of applications in the fields of the biological signal[61], fault diagnosis[62], and system detection[61,63].

    (3) VMD

    VMD was proposed by Dragomiretskiy et al.[64] in 2014. It is a non-recursive adaptive quasi-orthogonal signal decomposition method in the time and frequency domains. It plays an important role in the nonlinear signal analysis[65]. The VMD method has stable decomposition results with simple calculations and no modal aliasing problems. The decomposed basic component IMF has the characteristics of AM–FM modulated narrowband signals, and its IF has a practical physical meaning, which has natural advantages for SEI. Satija et al.[9] applied VMD to fingerprint recognition based on the method proposed in Ref. [43] and constructed VMD entropy (VMD-Entropy) and cumulant (VMD-EM2) as fingerprint features.

    (4) Signal reconstruction

    The received signal can be understood as a 1D time series formed by high-dimensional data projections carrying transmission information and emitter-specific fingerprint information. Therefore, the reconstruction of the signal can also be called ascending-dimensional restoration. Common reconstruction methods include phase space reconstruction based on nonlinear signal characteristics, segmentation reconstruction, and parameter imaging.

    The phase space analysis is one of the basic analysis methods of nonlinear dynamics. Each phase point in the phase space corresponds to a state of the dynamic system, and the change in the phase point corresponds to the state evolution of the system. The use of a time series to construct a phase space equivalent to the original phase space of the system, i.e., phase space reconstruction, is the first step to analyze the nonlinearity of the time series[66].

    Theoretically, different transmitters correspond to different nonlinear systems, and there must be hardware fingerprint characteristics inherent to the specific transmitter in the reconstructed phase space. Carrol[67] first used the phase space reconstruction method to solve the SEI problem. Xu Dan[2], Yuan Yingjun[68], and Zhu Shengli[69] discussed in detail the application of phase space theory to SEI in their doctoral dissertations.

    In addition to phase space reconstruction, domestic and foreign scholars have also tried other segmentation reconstruction methods. For example, T. J. Bihl et al.[70] proposed a signal segmentation and feature vector combination method based on a sliding window function. Zhu[71] reconstructed a time series into a Horizontal Visibility Graph (HVG).

    The analysis of the fingerprint mechanism is an important research content of SEI, which is of great significance for exploring the physical nature of signal fingerprint features and extracting effective fingerprint features.

    In Ref. [72], the hardware structure of transmitters was first introduced, the equivalent circuit model of the radio frequency oscillator for the transmitter with a free-running oscillator was constructed, and a modeled SEI technology was proposed. When the modulation voltage greatly changes, this method can make up for the shortcomings of traditional methods in measuring the rising- and falling-edge delays. Xu Zhijun et al.[73] specifically studied the nonlinear distortion of nonlinear power amplifiers by performing a Taylor series analysis on the signal. Huang Yuanling et al.[74] analyzed the equivalent Mathematical model of the transmitter frequency source circuit and established an Autoregressive Moving Average (ARMA) model to describe the phase noise characteristics of a transmitter. They proposed to construct the fingerprint characteristics of the radiation source through the ARMA parameter estimation, thereby completing SEI.

    With the development of hardware, particularly the development of programmable device technology, the exploration of a fingerprint mechanism of a radiation source and extraction of an effective feature method by modeling and analyzing the transmitter hardware have become increasingly difficult.

    In the SEI field, the direct measurement features extracted above can be directly inputted to the classifier for identification. However, due to some specific reasons, such as high dimensionality and limited characterization capabilities, some direct measurement features need to be further purified into the secondary feature. Secondary feature extraction refers to feature transformation or dimensionality reduction on the premise of keeping the original information of the feature as much as possible, exploring deeper and more accurate fingerprint features, and facilitating easy classification or recognition by the classifier. In this paper, this type of secondary feature is also called the dimensionality reduction transform feature.

    The dimensionality reduction transformation feature is essentially a feature analysis and processing method, which is mainly considered from two perspectives in this paper:

    (1) High-dimensional feature transformation: This involves secondary features that are closely related to the original signal structure and primary features (direct measurement features). Statistical tools are commonly used to characterize directly extracted high-dimensional features to achieve feature dimensionality reduction or feature transformation according to the feature distribution.

    (2) Traditional feature dimensionality reduction: The traditional dimensionality reduction method of machine learning is directly used, and the mathematical correlation is used to achieve dimensionality reduction.

    Parts of the dimensionality reduction transformation features are shown in Tab. 2.

    (1) Waveform skeleton

    According to the principle of non-increasing information in signal processing, the signal waveform itself is the carrier of the subtle features of a radiator signal that is more robust and contains the most information. The waveform skeleton method aims to minimize the influence of the transmission channel and restore the signal waveform emitted by the emitter, which includes the manifold learning-master curve method and compressed sensing.

    The master curve belongs to the category of manifold learning, which refers to a smooth curve that passes through the center of the data distribution and satisfies self-consistency. This curve is the skeleton of the data collection, which can better describe the characteristics of the data distribution and retain the information of the data, as shown in Fig. 7. Using a smooth curve instead of the principal component line to analyze the data and finding the smooth curve between the symmetrical variables is an extension of the nonlinear method that more accurately describes the actual problem[75].

    Figure  7.  Data skeleton extracted by principal curve

    In Refs. [76,77], the signal was analyzed by combining the non-parametric power spectrum and direct bispectrum, extract the spectrum skeleton of the spectral line distribution, and then combine the multifractal dimension to describe the skeleton as the signal fingerprint feature. However, the power spectrum and bispectrum of many signals are not suitable for extracting the skeleton structure, and their representation ability is not strong in some cases. Hence, a lot of information will be lost.

    In addition to the above-mentioned master curve method, compressed sensing[78] can also be used to extract the waveform skeleton.

    (2) Fractal and complexity

    A fractal is a powerful tool used to analyze the irregularity of non-stationary series and has been widely used in non-stationary and nonlinear signal processing in recent years. Fractal features commonly used in fingerprint feature extraction are the information dimension, box dimension, variance dimension, and Lempel–Ziv complexity. Gui Yunchuan et al.[42] calculated the fractal features of eigenmode functions (i.e., IMF) in the time and frequency domains on the basis of the EMD, combined with the fractal dimension on the Hilbert edge spectrum and spectral symmetry coefficient to form the feature vector. Tang et al.[79] calculated the variance fractal dimension of a modulated radio signal and the Mandelbrot singular fractal dimension spectrum and projected the modulation feature and nonlinear transformation feature of the signal to the fractal feature space. In Ref. [80], the box dimension and variance dimension were used to characterize each segment of the signal segmentation to realize SEI.

    (3) Specific path integration/slicing

    Taking a bispectrum as an example, the direct use of a bispectrum matrix for feature extraction and recognition requires the calculation of complex 2D templates, and the computational efficiency is relatively low. Therefore, it is necessary to convert the 2D function into 1D by integrating the bispectrum. Specific path integrals can be divided into the Radial Integral Bispectrum (RIB), Axial Integral Bispectrum (AIB), Circular Integral Bispectrum (CIB), and SIB according to different paths[4,81], as shown in Fig. 8.

    Figure  8.  Integral paths of bispectrum

    In addition, the idea of slicing high-dimensional spectrograms is similar to that of specific path integration, but some slices are still high in dimensionality. Hence, further feature dimensionality reduction is needed. The dimensionality reduction method of cyclic spectrum features often uses slices[38,39].

    (4) Entropy

    Entropy is an indicator that measures the degree of chaos in a system. In information theory, it is also called Shannon entropy or information entropy. After the received time series is decomposed and reconstructed, the dimensionality reduction transformation feature can be extracted in combination with the basic principle of entropy calculation. In Ref. [82], a method for extracting the individual characteristics of emitters based on the permutation entropy of communication signals was proposed, and entropies that characterize the subtle features of an original system were extracted. In addition to permutation entropy, other entropy algorithms include sample entropy[59], energy entropy[65], wavelet entropy[83], and correlation entropy[84].

    (5) Singular value decomposition

    Liu Ting[38] performed singular value decomposition (SVD) on a matrix obtained via the cyclic spectrum transformation, which extracted comprehensive and subtle inherent characteristics of a radiation source signal. Some scholars also performed SVD of 2D full-plane information after time–frequency spectrum transformation and then combined the eigenvalue and eigenvectors into a fingerprint feature. Sahmel[85] used the singular value space method to study the identification of SEI for OFDM signals. They also converted high-dimensional features into images and converted the extraction and identification of subtle features of radiation sources into image recognition problems.

    In addition, high-order statistics[36] can achieve a certain dimensionality reduction effect in SEI.

    The traditional dimensionality reduction methods in pattern recognition can also be used as a means of extracting secondary fingerprint features, which mainly include linear discriminant analysis[86] and principal component analysis[3,87,88]. However, this kind of method does not fully integrate the structural characteristics of fingerprint features, such as a high degree of non-correlation and nonlinearity, and cannot maintain the original information well. Moreover, the direct application of mathematical correlation to SEI ignores the distribution characteristics of features, and there are many adaptability problems.

    In recent years, the popularity of deep learning AI methods has continued to rise, and breakthroughs have been made in the fields of image processing and natural language understanding. Regarding the identification of individual radiation sources, the addition of AI not only improves the identification effect to a certain extent but also affects the original classic SEI framework and redefines the analysis and processing process.

    Early related research tended to use neural networks as a classifier. The input of the network is generally fingerprint features extracted with expert knowledge, usually high-dimensional features, and the network structure is mainly a Convolutional Neural Network (CNN). In Ref. [88], an STFT time spectrogram was taken as an input. In Ref. [89], the bispectrum feature was used after dimensionality reduction. In Ref. [90], the author considered the energy of the time-frequency distribution and compared the CNN’s classification performance with those of traditional classifiers, such as Support Vector Machines (SVM), naive Bayes, random forests, decision trees, and K-nearest neighbors).

    Later, some studies have merged two links, namely, feature extraction and classification recognition, directly inputted the received original I/Q complex data, and outputted radiation source recognition results, which achieved a certain recognition effect[91]. At this stage, the end-to-end approach has become increasingly common[92,93].

    With the development of neural networks, new research ideas, such as network structure improvements and adaptive testing of different signal styles, have gradually appeared in the SEI field[9395]. In addition, due to the inherent advantages of deep learning, such as strong learning and computing capabilities, research on fingerprint recognition in specific scenarios can be performed, such as the use of a generative adversarial network, to identify illegally confronted devices in large-scale autonomous networks[96].

    However, deep learning itself is poor in interpretability. Its feature extraction and analysis logic are similar to a black box. In addition, the corresponding mechanism behind fingerprint features has not been completely solved. Therefore, although the AI method has significantly improved the recognition effect, the possibility of overfitting is still large, and its performance in new data and new scenarios is often unsatisfactory. This bottleneck also limits the transformation of fingerprint identification methods based on deep learning to practical application systems.

    At this stage, two main solutions for such problems are proposed:

    (1) Data enhancement of original data

    Common methods include changing the signal-to-noise ratio of the training data and adjusting the signal carrier frequency. In Ref. [97], inspired by the image data enhancement technology, the data enhancement of SEI through the random integration method was realized.

    (2) Research combining the mechanism of fingerprint features

    Expert knowledge can be used to remove interference information, artificially strip out non-hardware circuit fingerprint factors, and guide the neural network to learn real fingerprint features. For example, in Ref. [98], the carrier frequency offset was estimated and removed; the influence of the channel environment, parameter changes, and other related factors were reduced or eliminated; and finally, the time-domain complex baseband error signal was obtained as the input of the deep CNN network. The recognition rate reached 92.29%.

    Compared with the previous end-to-end methods, the idea of combining fingerprint mechanisms to improve the performance of SEI systems based on deep learning puts forward higher requirements for signal analysis and fingerprint understanding.

    After decades of development, the issue in SEI has become more profound, and related technology applications have gradually matured. Nowadays, traditional SEI largely relies on the definition and extraction of fingerprint features. Many types and numbers of features are involved, and the angles of extraction and analysis and the theoretical knowledge based on them are also different. However, as the electromagnetic environment is becoming increasingly complex, the manufacturing process of related electronic devices has been greatly improved, and the physical differences have been shrinking, making it more difficult to extract effective fingerprint features. In the future, the related methods of SEI technology, especially the feature extraction method, still need in-depth research on the following three aspects:

    Deep learning-based SEI methods can get rid of the dependence on expert knowledge, change the traditional processing procedures that require manual pre-definition, realize automatic learning of fingerprint features, and improve the adaptability of feature methods to a certain extent. Using AI methods to mine the individual information of radiation sources contained in electromagnetic signals will certainly play a great role in SEI issues in the future.

    However, at this stage, the intelligent and automatic fingerprint feature extraction is still in the trial and exploration stage. In particular, how to combine expert experience, make better use of the advantages of intelligent computing, and extract the truly stable and effective fingerprint features of the radiation source, among other issues, require more detailed and in-depth research.

    There are many types of existing features, the scope of application of a single feature is limited, and the advantages of different features are different. Therefore, comprehensive utilization of features will characterize the radio frequency fingerprints of emitters from other angles and provide more comprehensive information for SEI.

    In the field of SEI, the comprehensive utilization of feature methods not only includes the traditional problem of multi-feature fusion in pattern recognition but also emphasizes the dependence on the understanding of signals and aims to combine the advantages of different types of fingerprint features in the ability to describe the fingerprint from different angles. We need to avoid useless redundancy and prevent the omission of information. For example, the time- and frequency-domain features were integrated after VMD decomposition in Ref. [9], while the decision tree was used to select the optimal feature combination subset in Ref. [99].

    Aiming at the problem of SEI, the basic idea of the comprehensive utilization of multiple features in the future should be to improve the adaptability of fingerprint features to different signals, enhance the pertinence of specific signals, and promote the complementary advantages of original features. In other words, future SEI-related research should improve the use of original excellent features while defining and extracting new features.

    Most features can only be adapted to limited signal types, and their scope and conditions of applications are unclear. When a new signal form appears, it is usually necessary to combine expert knowledge to explore and screen the available features. In addition, the original recognition effect in the face of a new situation is often greatly compromised or even invalid. The electromagnetic environment is becoming increasingly complex, and the types and patterns of signals are increasing, which changes the adaptability and scalability of fingerprint features. In addition, the boundary characteristics of the fingerprint feature of SEI are worthy of attention.

    As the application of SEI technology becomes increasingly extensive, growing requirements are put forward for fingerprint features. Whether it is manually defined by expert knowledge or automatic learning based on AI technology, the fingerprint features of SEI technology in the future will need to be developed in a more refined, intelligent, complex, and in-depth direction.

  • [1]
    TALBOT K I, DULEY P R, and HYATT M H. Specific emitter identification and verification[J]. Technology Review Journal, 2003, : 113–133.
    [2]
    许丹. 辐射源指纹机理及识别方法研究[D]. [博士论文], 国防科学技术大学, 2008.

    XU Dan. Research on mechanism and methodology of specific emitter identification[D]. [Ph.D. dissertation], National University of Defense Technology, 2008.
    [3]
    徐书华. 基于信号指纹的通信辐射源个体识别技术研究[D]. [博士论文], 华中科技大学, 2007.

    XU Shuhua. On the identification technique of individual transmitter based on signalprints[D]. [Ph.D. dissertation], Huazhong University of Science and Technology, 2007.
    [4]
    资晓军, 谢丹, 杨剑波. 通信辐射源指纹特征提取算法研究[J]. 舰船电子工程, 2017, 37(3): 63–65, 121. doi: 10.3969/j.issn.1672-9730.2017.03.016

    ZI Xiaojun, XIE Dan, and YANG Jianbo. Emitter fingerprint feature extraction algorithm[J]. Ship Electronic Engineering, 2017, 37(3): 63–65, 121. doi: 10.3969/j.issn.1672-9730.2017.03.016
    [5]
    LANGLEY L E. Specific emitter identification (SEI) and classical parameter fusion technology[C]. The WESCON’93, San Francisco, USA, 1993: 377–381.
    [6]
    贾永强. 通信辐射源个体识别技术研究[D]. [博士论文], 电子科技大学, 2017.

    JIA Yongqiang. The research on communication emitters identification technology[D]. [Ph.D. dissertation], School of Electronic Engineering, 2017.
    [7]
    DANEV B and CAPKUN S. Transient-based identification of wireless sensor nodes[C]. 2009 International Conference on Information Processing in Sensor Networks, San Francisco, USA, 2009: 25–36.
    [8]
    YUAN Yingjun, HUANG Zhitao, WU Hao, et al. Specific emitter identification based on Hilbert-Huang transform-based time-frequency-energy distribution features[J]. IET Communications, 2014, 8(13): 2404–2412. doi: 10.1049/iet-com.2013.0865
    [9]
    SATIJA U, TRIVEDI N, BISWAL G, et al. Specific emitter identification based on variational mode decomposition and spectral features in single hop and relaying scenarios[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(3): 581–591. doi: 10.1109/TIFS.2018.2855665
    [10]
    GUO Shanzeng, WHITE R E, and LOW M. A comparison study of radar emitter identification based on signal transients[C]. 2018 IEEE Radar Conference (RadarConf18), Oklahoma City, USA, 2018: 0286–0291.
    [11]
    DAVIES C L and HOLLANDS P. Automatic processing for ESM[J]. IEE Proceedings F - Communications,Radar and Signal Processing, 1982, 129(3): 164–171. doi: 10.1049/ip-f-1.1982.0025
    [12]
    ABRAHAMZADEH A, SEYEDIN S A, and DEHGHAN M. Digital-signal-type identification using an efficient identifier[J].EURASIP Journal on Advances in Signal Processing, 2007, 2007: 63.
    [13]
    王宏伟, 赵国庆, 王玉军. 基于脉冲包络前沿波形的雷达辐射源个体识别[J]. 航天电子对抗, 2009, 25(2): 35–38. doi: 10.3969/j.issn.1673-2421.2009.02.011

    WANG Hongwei, ZHAO Guoqing, and WANG Yujun. A specific emitter identification method based on front edge waveform of radar signal envelop[J]. Aerospace Electronic Warfare, 2009, 25(2): 35–38. doi: 10.3969/j.issn.1673-2421.2009.02.011
    [14]
    刘旭, 罗鹏飞, 李纲. 基于拟合角特征及SVM的雷达辐射源个体识别[J]. 计算机工程与应用, 2011, 47(8S): 281–284.

    LIU Xu, LUO Pengfei, and LI Gang. Radar emitter individual identification based on fitting angle features and SVM[J]. Computer Engineering and Applications, 2011, 47(8S): 281–284.
    [15]
    XU Shuhua, XU Lina, XU Zhengguang, et al. Individual radio transmitter identification based on spurious modulation characteristics of signal envelop[C]. 2008 IEEE Military Communications Conference, San Diego, USA, 2008: 1–5.
    [16]
    张国柱, 黄可生, 姜文利, 等. 基于信号包络的辐射源细微特征提取方法[J]. 系统工程与电子技术, 2006, 28(6): 795–797, 936. doi: 10.3321/j.issn:1001-506X.2006.06.002

    ZHANG Guozhu, HUANG Kesheng, JIANG Weili, et al. Emitter feature extract method based on signal envelope[J]. Systems Engineering and Electronics, 2006, 28(6): 795–797, 936. doi: 10.3321/j.issn:1001-506X.2006.06.002
    [17]
    REHMAN S U, SOWERBY K, and COGHILL C. RF fingerprint extraction from the energy envelope of an instantaneous transient signal[C]. 2012 Australian Communications Theory Workshop (AusCTW), Wellington, New Zealand, 2012: 90–95.
    [18]
    WU Longwen, ZHAO Yaqin, FENG Mengfei, et al. Specific emitter identification using IMF-DNA with a joint feature selection algorithm[J]. Electronics, 2019, 8(9): 934. doi: 10.3390/electronics8090934
    [19]
    FENG Zhipeng, ZHANG Dong, and ZUO M J. Adaptive mode decomposition methods and their applications in signal analysis for machinery fault diagnosis: A review with examples[J]. IEEE Access, 2017, 5: 24301–24331. doi: 10.1109/ACCESS.2017.2766232
    [20]
    HALL J, BARBEAU M, and KRANAKIS E. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting[C]. Communications, Internet, and Information Technology, St. Thomas, US Virgin Islands, USA, 2004: 201–206.
    [21]
    HALL J, BARBEAU M, and KRANAKIS E. Detecting rogue devices in bluetooth networks using radio frequency fingerprinting[C]. The 3rd IASTED International Conference on Communications and Computer Networks, Lima, Peru, 2006: 108–113.
    [22]
    黄渊凌, 郑辉. 基于瞬时频率畸变特性的FSK电台指纹特征提取[J]. 电讯技术, 2013, 53(7): 868–872. doi: 10.3969/j.issn.1001-893x.2013.07.009

    HUANG Yuanling and ZHENG Hui. FSK radio fingerprints extraction based on distortions of instantaneous frequency[J]. Telecommunication Engineering, 2013, 53(7): 868–872. doi: 10.3969/j.issn.1001-893x.2013.07.009
    [23]
    PADILLA P, PADILLA J L, and VALENZUELA-VALDÉS J F. Radiofrequency identification of wireless devices based on RF fingerprinting[J]. Electronics Letters, 2013, 49(22): 1409–1410. doi: 10.1049/el.2013.2759
    [24]
    BRIK V, BANERJEE S, GRUTESER M, et al. Wireless device identification with radiometric signatures[C]. The 14th Annual International Conference on Mobile Computing and Networking, MOBICOM 2008, San Francisco, USA, 2008: 116–127.
    [25]
    王威, 李诗娴, 王新. 基于星座图的通信辐射源个体识别方法[J]. 湖南城市学院学报: 自然科学版, 2017, 26(5): 51–55. doi: 10.3969/j.issn.1672-7304.2017.05.0011

    WANG Wei, LI Shixian, and WANG Xin. A communication SEI approach based on constellation diagram[J]. Journal of Hunan City University:Natural Science, 2017, 26(5): 51–55. doi: 10.3969/j.issn.1672-7304.2017.05.0011
    [26]
    程汉文, 吴乐南. 基于星座图和相似性度量的调制方式识别[J]. 应用科学学报, 2008, 26(2): 111–116. doi: 10.3969/j.issn.0255-8297.2008.02.001

    CHENG Hanwen and WU Le’nan. Classification of modulation techniques using constellation shape and similarity measure[J]. Journal of Applied Sciences-Electronics and Information Engineering, 2008, 26(2): 111–116. doi: 10.3969/j.issn.0255-8297.2008.02.001
    [27]
    RU Xiaohu, LIU Zheng, HUANG Zhitao, et al. Evaluation of unintentional modulation for pulse compression signals based on spectrum asymmetry[J]. IET Radar,Sonar&Navigation, 2017, 11(4): 656–663. doi: 10.1049/iet-rsn.2016.0248
    [28]
    叶文强, 俞志富. 基于联合时频辐射源信号识别方法[J]. 电子信息对抗技术, 2018, 33(5): 16–19, 50. doi: 10.3969/j.issn.1674-2230.2018.05.004

    YE Wenqiang and YU Zhifu. Signal recognition method based on joint time-frequency radiant source[J]. Electronic Information Warfare Technology, 2018, 33(5): 16–19, 50. doi: 10.3969/j.issn.1674-2230.2018.05.004
    [29]
    FLAMANT J, LE BIHAN N, and CHAINAIS P. Time-frequency analysis of bivariate signals[J]. Applied and Computational Harmonic Analysis, 2019, 46(2): 351–383. doi: 10.1016/j.acha.2017.05.007
    [30]
    BERTONCINI C, RUDD K, NOUSAIN B, et al. Wavelet fingerprinting of Radio-Frequency IDentification (RFID) tags[J]. IEEE Transactions on Industrial Electronics, 2012, 59(12): 4843–4850. doi: 10.1109/TIE.2011.2179276
    [31]
    HIPPENSTIEL R D. Wavelet based approach to transmitter identification[R]. NPS-EC-95-014, 1995.
    [32]
    高敬鹏, 孔维宇, 刘佳琪, 等. 基于时频分析的自适应PCA辐射源调制识别[J]. 应用科技, 2018, 45(5): 33–37. doi: 10.11991/yykj.201712013

    GAO Jingpeng, KONG Weiyu, LIU Jiaqi, et al. Research on emitter modulation recognition of the adaptive PCA based on time-frequency analysis[J]. Applied Science and Technology, 2018, 45(5): 33–37. doi: 10.11991/yykj.201712013
    [33]
    XIE Zhenhua, XU Luping, NI Guangren, et al. A new feature vector using selected line spectra for pulsar signal bispectrum characteristic analysis and recognition[J]. Chinese Journal of Astronomy and Astrophysics, 2007, 7(4): 565–571.
    [34]
    蔡忠伟, 李建东. 基于双谱的通信辐射源个体识别[J]. 通信学报, 2007, 28(2): 75–79. doi: 10.3321/j.issn:1000-436X.2007.02.012

    CAI Zhongwei and LI Jiandong. Study of transmitter individual identification based on bispectra[J]. Journal on Communications, 2007, 28(2): 75–79. doi: 10.3321/j.issn:1000-436X.2007.02.012
    [35]
    王欢欢, 张涛. 结合时域分析和改进双谱的通信信号特征提取算法[J]. 信号处理, 2017, 33(6): 864–871. doi: 10.16798/j.issn.1003-0530.2017.06.012

    WANG Huanhuan and ZHANG Tao. Extraction algorithm of communication signal characteristics based on improved bispectra and time-domain Analysis[J]. Journal of Signal Processing, 2017, 33(6): 864–871. doi: 10.16798/j.issn.1003-0530.2017.06.012
    [36]
    杨举, 卢选民, 周亚建. 基于多谱与支持向量机的通信辐射源个体识别[J]. 计算机仿真, 2010, 27(11): 349–353. doi: 10.3969/j.issn.1006-9348.2010.11.088

    YANG Ju, LU Xuanmin, and ZHOU Yajian. Transmitter individual identification based on polyspectra and support Vector Machine[J]. Computer Simulation, 2010, 27(11): 349–353. doi: 10.3969/j.issn.1006-9348.2010.11.088
    [37]
    GONG Yong, HU Guyu, and PAN Zhisong. Radio transmitter identification based on bispectra with tensor representation[C]. 2010 2nd International Conference on Computer Engineering and Technology, Chengdu, China, 2010: V3-294–V3-298.
    [38]
    刘婷. 基于循环平稳分析的雷达辐射源特征提取与融合识别[D]. [硕士论文], 西安电子科技大学, 2009.

    LIU Ting. Feature extraction and fusion recognition of radar radiation source based on cyclic stationary analysis[D]. [Master dissertation], Xidian University, 2009.
    [39]
    陈志伟, 徐志军, 王金明, 等. 一种基于循环谱切片的通信辐射源识别方法[J]. 数据采集与处理, 2013, 28(3): 284–288. doi: 10.3969/j.issn.1004-9037.2013.03.005

    CHEN Zhiwei, XU Zhijun, WANG Jinming, et al. Emitter identification method based on cyclic spectrum density slice[J]. Journal of Data Acquisition&Processing, 2013, 28(3): 284–288. doi: 10.3969/j.issn.1004-9037.2013.03.005
    [40]
    王欢欢, 张涛, 孟凡玉. 基于时频域细微特征的辐射源个体识别[J]. 信息工程大学学报, 2018, 19(1): 23–29. doi: 10.3969/j.issn.1671-0673.2018.01.006

    WANG Huanhuan, ZHANG Tao, and MENG Fanyu. Specific emitter identification based on time-frequency domain characteristic[J]. Journal of Information Engineering University, 2018, 19(1): 23–29. doi: 10.3969/j.issn.1671-0673.2018.01.006
    [41]
    王丽. 低频辐射源细微特征分析[D]. [硕士论文], 南京航空航天大学, 2014.

    WANG Li. Analysis of subtle characteristics of low-frequency radiation[D]. [Master dissertation], Nanjing University of Aeronautics and Astronautics, 2014.
    [42]
    桂云川, 杨俊安, 吕季杰, 等. 基于经验模态分解的通信辐射源分形特征提取算法[J]. 探测与控制学报, 2016, 38(1): 104–108.

    GUI Yunchuan, YANG Jun’an, LV Jijie, et al. A fractal feature extraction algorithm based on empirical mode decomposition[J]. Journal of Detection&Control, 2016, 38(1): 104–108.
    [43]
    ZHANG Jingwen, WANG Fanggang, DOBRE O A, et al. Specific emitter identification via Hilbert-Huang transform in single-hop and relaying scenarios[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(6): 1192–1205.
    [44]
    YUAN H L and HU A Q. Preamble-based detection of Wi-Fi transmitter RF fingerprints[J]. Electronics Letters, 2010, 46(16): 1165–1167. doi: 10.1049/el.2010.1220
    [45]
    WU Qingyang, FERES C, KUZMENKO D, et al. Deep learning based RF fingerprinting for device identification and wireless security[J]. Electronics Letters, 2018, 54(24): 1405–1407.
    [46]
    叶浩欢, 柳征, 姜文利. 考虑多普勒效应的脉冲无意调制特征比较[J]. 电子与信息学报, 2012, 34(11): 118–123. doi: 10.3724/SP.J.1146.2012.00400

    YE Haohuan, LIU Zheng, and JIANG Wenli. A comparison of unintentional modulation on pulse features with the consideration of Doppler effect[J]. Journal of Electronics&Information Technology, 2012, 34(11): 118–123. doi: 10.3724/SP.J.1146.2012.00400
    [47]
    普运伟, 金炜东, 朱明, 等. 雷达辐射源信号模糊函数主脊切面特征提取方法[J]. 红外与毫米波学报, 2008, 27(2): 133–137. doi: 10.3321/j.issn:1001-9014.2008.02.012

    PU Yunwei, JIN Weidong, ZHU Ming, et al. Extracting the main ridge slice characteristics of ambiguity function for radar emitter signals[J]. Journal of Infrared and Millimeter Waves, 2008, 27(2): 133–137. doi: 10.3321/j.issn:1001-9014.2008.02.012
    [48]
    李林, 姬红兵. 基于模糊函数的雷达辐射源个体识别[J]. 电子与信息学报, 2009, 31(11): 2546–2551. doi: 10.3724/SP.J.1146.2008.01406

    LI Lin and JI Hongbing. Specific emitter identification based on ambiguity function[J]. Journal of Electronics&Information Technology, 2009, 31(11): 2546–2551. doi: 10.3724/SP.J.1146.2008.01406
    [49]
    王磊, 姬红兵, 史亚. 基于模糊函数特征优化的雷达辐射源个体识别[J]. 红外与毫米波学报, 2011, 30(1): 74–79.

    WANG Lei, JI Hongbing, and SHI Ya. Feature optimization of ambiguity function for radar emitter recognition[J]. Journal of Infrared and Millimeter Waves, 2011, 30(1): 74–79.
    [50]
    王磊, 姬红兵, 李林. 基于模糊函数零点切片特征优化的辐射源个体识别[J]. 西安电子科技大学学报: 自然科学版, 2010, 37(2): 285–289, 304.

    WANG Lei, JI Hongbing, and LI Lin. Specific emitter recognition based on feature optimization of ambiguity function zero-slice[J]. Journal of Xidian University, 2010, 37(2): 285–289, 304.
    [51]
    王磊, 姬红兵, 史亚. 基于模糊函数代表性切片的运动雷达辐射源识别[J]. 系统工程与电子技术, 2010, 32(8): 1630–1634. doi: 10.3969/j.issn.1001-506X.2010.08.16

    WANG Lei, JI Hongbing, and SHI Ya. Moving radar emitter recognition based on representative-cut feature of ambiguity function[J]. Systems Engineering and Electronics, 2010, 32(8): 1630–1634. doi: 10.3969/j.issn.1001-506X.2010.08.16
    [52]
    HUANG N E, SHEN Zheng, LONG S R, et al. The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis[J]. Proceedings of the Royal Society A:Mathematical,Physical and Engineering Sciences, 1998, 454(1971): 903–995.
    [53]
    SONG Chunyun, XU Jianmin, and ZHAN Yi. A method for specific emitter identification based on empirical mode decomposition[C]. 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, Beijing, China, 2010: 54–57.
    [54]
    哈章, 刘湘德, 蔡强, 等. 基于EMD时频重构特征的航管应答器个体识别[J]. 电子信息对抗技术, 2012, 27(3): 1–5, 27. doi: 10.3969/j.issn.1674-2230.2012.03.001

    HA Zhang, LIU Xiangde, CAI Qiang, et al. Study of specific emitter identification for ATC transponder[J]. Electronic Information Warfare Technology, 2012, 27(3): 1–5, 27. doi: 10.3969/j.issn.1674-2230.2012.03.001
    [55]
    梁江海, 黄知涛, 袁英俊, 等. 一种基于经验模态分解的通信辐射源个体识别方法[J]. 中国电子科学研究院学报, 2013, 8(4): 393–397, 417. doi: 10.3969/j.issn.1673-5692.2013.04.013

    LIANG Jianghai, HUANG Zhitao, YUAN Yingjun, et al. A method based on empirical mode decomposition for identifying transmitter individuals[J]. Journal of CAEIT, 2013, 8(4): 393–397, 417. doi: 10.3969/j.issn.1673-5692.2013.04.013
    [56]
    FREI M G and OSORIO I. Intrinsic time-scale decomposition: time-frequency-energy analysis and real-time filtering of non-stationary signals[J]. Proceedings of the Royal Society A:Mathematical,Physical and Engineering Sciences, 2007, 463(2078): 321–342. doi: 10.1098/rspa.2006.1761
    [57]
    李学成, 段田东, 徐文艳, 等. 基于固有时间尺度分解的信号细微特征识别[J]. 信息工程大学学报, 2014, 15(5): 570–575. doi: 10.3969/j.issn.1671-0673.2014.05.010

    LI Xuecheng, DUAN Tiandong, XU Wenyan, et al. ITD-based identification of signal fine features[J]. Journal of Information Engineering University, 2014, 15(5): 570–575. doi: 10.3969/j.issn.1671-0673.2014.05.010
    [58]
    桂云川, 杨俊安, 吕季杰. 基于固有时间尺度分解模型的通信辐射源特征提取算法[J]. 计算机应用研究, 2017, 34(4): 1172–1175. doi: 10.3969/j.issn.1001-3695.2017.04.049

    GUI Yunchuan, YANG Jun’an, and LYU Jijie. Feature extraction algorithm based on intrinsic time-scale decomposition model for communication transmitter[J]. Application Research of Computers, 2017, 34(4): 1172–1175. doi: 10.3969/j.issn.1001-3695.2017.04.049
    [59]
    任东方, 张涛, 韩洁. 结合ITD与非线性分析的通信辐射源个体识别方法[J]. 信号处理, 2018, 34(3): 331–339. doi: 10.16798/j.issn.1003-0530.2018.03.010

    REN Dongfang, ZHANG Tao, and HAN Jie. Approach of specific communication emitter identification combining ITD and nonlinear analysis[J]. Journal of Signal Processing, 2018, 34(3): 331–339. doi: 10.16798/j.issn.1003-0530.2018.03.010
    [60]
    任东方, 张涛, 韩洁, 等. 基于ITD与纹理分析的特定辐射源识别方法[J]. 通信学报, 2017, 38(12): 160–168. doi: 10.11959/j.issn.1000-436x.2017299

    REN Dongfang, ZHANG Tao, HAN Jie, et al. Specific emitter identification based on ITD and texture analysis[J]. Journal on Communications, 2017, 38(12): 160–168. doi: 10.11959/j.issn.1000-436x.2017299
    [61]
    MARTIS R J, ACHARYA U R, TAN J H, et al. Application of Intrinsic Time-scale Decomposition (ITD) to EEG signals for automated seizure prediction[J]. International Journal of Neural Systems, 2013, 23(5): 1350023. doi: 10.1142/S0129065713500238
    [62]
    AN Xueli, JIANG Dongxiang, CHEN Jie, et al. Application of the intrinsic time-scale decomposition method to fault diagnosis of wind turbine bearing[J]. Journal of Vibration and Control, 2012, 18(2): 240–245. doi: 10.1177/1077546311403185
    [63]
    XU Yonggang, XIE Zhicong, CUI Linli, et al. The feature extraction method of gear magnetic memory signal[J]. Advanced Materials Research, 2013, 819: 206–211. doi: 10.4028/www.scientific.net/AMR.819.206
    [64]
    DRAGOMIRETSKIY K and ZOSSO D. Variational mode decomposition[J]. IEEE Transactions on Signal Processing, 2014, 62(3): 531–544. doi: 10.1109/TSP.2013.2288675
    [65]
    陈尚, 郑翔. 基于VMD能量熵与支持向量机的断路器机械故障诊断方法研究[J]. 黑龙江电力, 2019, 41(1): 60–63.

    CHEN Shang and ZHENG Xiang. Research on mechanical fault diagnosis method of circuit breaker based on VMD energy entropy and support vector machine[J]. Heilongjiang Electric Power, 2019, 41(1): 60–63.
    [66]
    孟庆芳. 非线性动力系统时间序列分析方法及其应用研究[D]. [博士论文], 山东大学, 2008.

    MENG Qingfang. Nonlinear dynamical time series analysis methods and its application[D]. [Ph.D. dissertation], Shandong University, 2008.
    [67]
    CARROLL T L. A nonlinear dynamics method for signal identification[J]. Chaos:An Interdisciplinary Journal of Nonlinear Science, 2007, 17(2): 023109. doi: 10.1063/1.2722870
    [68]
    袁英俊. 通信辐射源个体识别关键技术研究[D]. [博士论文], 长沙: 国防科技大学, 2014.

    YUAN Yingjun. Research on key technology of communication specific emitter identification[D]. [Ph.D. dissertation], National University of Defense Technology, 2014.
    [69]
    朱胜利. 混沌信号处理在辐射源个体识中的应用研究[D]. [博士论文], 电子科技大学, 2018.

    ZHU Shengli. Research on applications of chaotic signal processing in specific emitter identification[D]. [Ph.D. dissertation], School of Information and Communication, 2018.
    [70]
    BIHL T J, BAUER K W, and TEMPLE M A. Feature selection for RF fingerprinting with multiple discriminant analysis and using ZigBee device emissions[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(8): 1862–1874. doi: 10.1109/TIFS.2016.2561902
    [71]
    ZHU Shengli and GAN Lu. Specific emitter identification based on visibility graph entropy[J]. Chinese Physics Letters, 2018, 35(3): 030501.
    [72]
    许丹, 徐海源, 卢启中, 等. 基于自激振荡器模型的辐射源个体识别方法[J]. 信号处理, 2008, 24(1): 122–126. doi: 10.3969/j.issn.1003-0530.2008.01.029

    XU Dan, XU Haiyuan, LU Qizhong, et al. A specific emitter identification method based on self-excitation oscillator model[J]. Signal Processing, 2008, 24(1): 122–126. doi: 10.3969/j.issn.1003-0530.2008.01.029
    [73]
    徐志军, 陈志伟, 王金明, 等. 基于功放特性的辐射源识别的改进方法[J]. 南京邮电大学学报: 自然科学版, 2013, 33(6): 54–58.

    XU Zhijun, CHEN Zhiwei, WANG Jinming, et al. An improved method for emitter identification based on character of power amplifier[J]. Journal of Nanjing University of Posts and Telecommunications:Natural Science, 2013, 33(6): 54–58.
    [74]
    黄渊凌, 郑辉. 一种基于相噪特性的辐射源指纹特征提取方法[J]. 计算机仿真, 2013, 30(9): 182–185. doi: 10.3969/j.issn.1006-9348.2013.09.042

    HUANG Yuanling and ZHENG Hui. Emitter fingerprint feature extraction method based on characteristics of phase noise[J]. Computer Simulation, 2013, 30(9): 182–185. doi: 10.3969/j.issn.1006-9348.2013.09.042
    [75]
    马驰, 张红云, 苗夺谦. 改进的主曲线算法在指纹骨架提取中的应用[J]. 计算机工程与应用, 2010, 46(16): 170–173.

    MA Chi, ZHANG Hongyun, and MIAO Duoqian. Improvement of principal curves algorithm and its application in finger-print skeleton extraction[J]. Computer Engineering and Applications, 2010, 46(16): 170–173.
    [76]
    王欢欢, 张涛. 基于高阶谱谱骨架的信号细微特征识别[J]. 计算机应用与软件, 2017, 34(8): 179–184. doi: 10.3969/j.issn.1000-386x.2017.08.032

    WANG Huanhuan and ZHANG Tao. Higher-order spectrum skeleton application to signal fine character identification[J]. Computer Applications and Software, 2017, 34(8): 179–184. doi: 10.3969/j.issn.1000-386x.2017.08.032
    [77]
    李学成, 段田东, 徐文艳, 等. 基于软K段主曲线的信号细微特征识别[J]. 计算机应用与软件, 2015, 32(5): 198–202. doi: 10.3969/j.issn.1000-386x.2015.05.048

    LI Xuecheng, DUAN Tiandong, XU Wenyan, et al. Identifying imperceptible feature of signals based on soft K-segments algorithm for principal curves[J]. Computer Applications and Software, 2015, 32(5): 198–202. doi: 10.3969/j.issn.1000-386x.2015.05.048
    [78]
    官建平. 基于双谱的辐射源个体识别技术[D]. [硕士论文], 西安电子科技大学, 2014.

    GUAN Jianping. Study of individual transmitter identification based on bispectrum[D]. [Master dissertation], Xidian University, 2014.
    [79]
    唐智灵, 杨小牛, 李建东. 调制无线电信号的分形特征研究[J]. 物理学报, 2011, 60(5): 550–556.

    TANG Zhiling, YANG Xiaoniu, and LI Jiandong. Study on fractal features of modulated radio signal[J]. Acta Physica Sinica, 2011, 60(5): 550–556.
    [80]
    WU Longwen, ZHAO Yaqin, WANG Zhao, et al. Specific emitter identification using fractal features based on box-counting dimension and variance dimension[C]. 2017 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Bilbao, Spain, 2017: 226–231.
    [81]
    桂云川, 杨俊安, 万俊. 基于双谱特征融合的通信辐射源识别算法[J]. 探测与控制学报, 2016, 38(5): 91–95.

    GUI Yunchuan, YANG Jun’an, and WAN Jun. A transmitter recognition algorithm based on dual spectrum feature fusion[J]. Journal of Detection&Control, 2016, 38(5): 91–95.
    [82]
    HUANG Guangquan, YUAN Yingjun, WANG Xiang, et al. Specific emitter identification based on nonlinear dynamical characteristics[J]. Canadian Journal of Electrical and Computer Engineering, 2016, 39(1): 34–41. doi: 10.1109/CJECE.2015.2496143
    [83]
    徐玉龙, 王金明, 徐志军, 等. 基于小波熵的辐射源指纹特征提取方法[J]. 数据采集与处理, 2014, 29(4): 631–635. doi: 10.3969/j.issn.1004-9037.2014.04.022

    XU Yulong, WANG Jinming, XU Zhijun, et al. Fingerprint feature extraction method for emitters based on wavelet entropy[J]. Journal of Data Acquisition and Processing, 2014, 29(4): 631–635. doi: 10.3969/j.issn.1004-9037.2014.04.022
    [84]
    唐哲, 雷迎科. 基于最大相关熵的通信辐射源个体识别方法[J]. 通信学报, 2016, 37(12): 175–179. doi: 10.11959/j.issn.1000-436x.2016283

    TANG Zhe and LEI Yingke. Method of individual communication transmitter identification based on maximum correntropy[J]. Journal on Communications, 2016, 37(12): 175–179. doi: 10.11959/j.issn.1000-436x.2016283
    [85]
    SAHMEL P H, REED J H, and SPOONER C M. Eigenspace approach to specific emitter identification[J]. Frequenz, 2010, 64(11/12): 229–235.
    [86]
    王磊. 雷达辐射源个体识别的方法研究[D]. [博士论文], 西安电子科技大学, 2011.

    WANG Lei. On methods for specific radar emitter identification[D]. [Ph.D. dissertation], Xidian University, 2011.
    [87]
    XU Shuhua, HUANG Benxiong, XU Lina, et al. Radio transmitter classification using a new method of stray features analysis combined with PCA[C]. Military Communications Conference, Orlando, USA, 2007: 1–5.
    [88]
    YE Wenqiang and PENG Cong. Recognition algorithm of emitter signals based on PCA+CNN[C]. 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference, Chongqing, China, 2018: 2410–2414.
    [89]
    DING Lida, WANG Shilian, WANG Fanggang, et al. Specific emitter identification via convolutional neural networks[J]. IEEE Communications Letters, 2018, 22(12): 2591–2594.
    [90]
    BITAR N, MUHAMMAD S, and REFAI H H. Wireless technology identification using deep convolutional neural networks[C]. 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, Montreal, Canada, 2017: 1–6.
    [91]
    WONG L J, HEADLEY W C, ANDREWS S, et al. Clustering learned CNN features from raw I/Q data for emitter identification[C]. MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), Los Angeles, USA, 2018: 26–33.
    [92]
    RIYAZ S, SANKHE K, IOANNIDIS S, et al. Deep learning convolutional neural networks for radio identification[J]. IEEE Communications Magazine, 2018, 56(9): 146–152. doi: 10.1109/MCOM.2018.1800153
    [93]
    YOUSSEF K, BOUCHARD L, HAIGH K, et al. Machine learning approach to RF transmitter identification[J]. IEEE Journal of Radio Frequency Identification, 2018, 2(4): 197–205. doi: 10.1109/JRFID.2018.2880457
    [94]
    MCGINTHY J M, WONG L J, and MICHAELS A J. Groundwork for neural network-based specific emitter identification authentication for IoT[J]. IEEE Internet of Things Journal, 2019, 6(4): 6429–6440. doi: 10.1109/JIOT.2019.2908759
    [95]
    WU Xiaopo, SHI Yangming, MENG Weibo, et al. Specific emitter identification for satellite communication using probabilistic neural networks[J]. International Journal of Satellite Communications and Networking, 2019, 37(3): 283–291. doi: 10.1002/sat.1286
    [96]
    ROY D, MUKHERJEE T, CHATTERJEE M, et al. RFAL: Adversarial learning for RF transmitter identification and classification[J]. IEEE Transactions on Cognitive Communications and Networking, 2020, 6(2): 783–801. doi: 10.1109/TCCN.2019.2948919
    [97]
    XIE Feiyi, WEN Hong, WU Jinsong, et al. Data augmentation for radio frequency fingerprinting via pseudo-random integration[J]. IEEE Transactions on Emerging Topics in Computational Intelligence, 2019, . doi: 10.1109/TETCI.2019.2907740
    [98]
    MERCHANT K, REVAY S, STANTCHEV G, et al. Deep learning for RF device fingerprinting in cognitive communication networks[J]. IEEE Journal of Selected Topics in Signal Processing, 2018, 12(1): 160–167. doi: 10.1109/JSTSP.2018.2796446
    [99]
    程旗, 赵浩然. 一种基于决策树的信号分类方法[J]. 电子世界, 2018, (13): 28–29, 32.

    CHENG Qi and ZHAO Haoran. A signal classification method based on decision tree[J]. Electronics World, 2018, (13): 28–29, 32.
  • Relative Articles

    [1]LIU Fan, LU Shihang, CHEN Zihao. MIMO-ISAC Precoding Design Toward Random Signals[J]. Journal of Radars. doi: 10.12000/JR25019
    [2]LIU Kangsheng, LING Qing, YAN Wenjun, ZHANG Limin, YU Keyuan, LIU Hengyan. Weak Labeling-specific Emitter Identification Algorithm Based on the Weakly Supervised Wav-KAN Network[J]. Journal of Radars. doi: 10.12000/JR24248
    [3]HE Jun, FU Ruigang, FU Qiang. Review of Automatic Target Recognition Evaluation Method Development[J]. Journal of Radars, 2023, 12(6): 1215-1228. doi: 10.12000/JR23094
    [4]ZHAO Yurui, HUANG Zhitao, WANG Xiang. A Review of Specific Emitter Identification Based on Phase Space Reconstruction[J]. Journal of Radars, 2023, 12(4): 713-737. doi: 10.12000/JR23057
    [5]XING Mengdao, XIE Yiyuan, GAO Yuexin, ZHANG Jinsong, LIU Jiaming, WU Zhixin. Electromagnetic Scattering Characteristic Extraction and Imaging Recognition Algorithm: A Review[J]. Journal of Radars, 2022, 11(6): 921-942. doi: 10.12000/JR22232
    [6]SUI Jinping, LIU Zhen, LIU Li, LI Xiang. Progress in Radar Emitter Signal Deinterleaving[J]. Journal of Radars, 2022, 11(3): 418-433. doi: 10.12000/JR21147
    [7]ZHOU Zibo, ZHANG Chaowei, XIA Saiqiang, XU Daoming, GAO Yan, ZENG Xiaoshuang. Feature Extraction of Rotor Blade Targets Based on Phase Compensation in a Passive Bistatic Radar[J]. Journal of Radars, 2021, 10(6): 929-943. doi: 10.12000/JR21132
    [8]Luo Ying, Gong Yishuai, Chen Yijun, Zhang Qun. Multi-target Micro-motion Feature Extraction Based on Tracking Pulses in MIMO Radar[J]. Journal of Radars, 2018, 7(5): 575-584. doi: 10.12000/JR18035
    [9]Zhang Qun, Hu Jian, Luo Ying, Chen Yijun. Research Progresses in Radar Feature Extraction, Imaging, and Recognition of Target with Micro-motions[J]. Journal of Radars, 2018, 7(5): 531-547. doi: 10.12000/JR18049
    [10]Yang Qi, Deng Bin, Wang Hongqiang, Qin Yuliang. Advancements in Research on Micro-motion Feature Extraction in the Terahertz Region[J]. Journal of Radars, 2018, 7(1): 22-45. doi: 10.12000/JR17087
    [11]Wang Jun, Zheng Tong, Lei Peng, Wei Shaoming. Study on Deep Learning in Radar[J]. Journal of Radars, 2018, 7(4): 395-411. doi: 10.12000/JR18040
    [12]Zhao Shuang, Lu Weihong, Feng Cunqian, Wang Yizhe. Three-Dimensional Precession Feature Extraction of Ballistic Targets Based on Narrowband Radar Network[J]. Journal of Radars, 2017, 6(1): 98-105. doi: 10.12000/JR15129
    [13]Wang Lu, Zhang Fan, Li Wei, Xie Xiao-ming, Hu Wei. A Method of SAR Target Recognition Based on Gabor Filter and Local Texture Feature Extraction[J]. Journal of Radars, 2015, 4(6): 658-665. doi: 10.12000/JR15076
    [14]HAN Ping, WANG Huan. Synthetic Aperture Radar Target Feature Extraction and Recognition Based on Improved Sparsity Preserving Projections[J]. Journal of Radars, 2015, 4(6): 674-680. doi: 10.12000/JR15068
    [15]Feng Cun-qian, Li Jing-qing, He Si-san, Zhang Hao. Micro-Doppler Feature Extraction and Recognition Based on Netted Radar for Ballistic Targets[J]. Journal of Radars, 2015, 4(6): 609-620. doi: 10.12000/JR15084
    [16]Zhang Zhi-long, Yang Wei-ping, Li Ji-cheng. Remote Sensing Image Feature Extracting Based Multiple Ant Colonies Cooperation[J]. Journal of Radars, 2014, 3(1): 92-100. doi: 10.3724/SP.J.1300.2014.13129
    [17]Lu Ping-ping, Du Kang-ning, Yu Wei-dong, Wang Yu, Deng Yun-Kai. Feature Fusion Based Road Extraction for HJ-1-C SAR Image[J]. Journal of Radars, 2014, 3(3): 352-360. doi: DOI: 10.3724/SP.J.1300.2013.13059
    [18]Zhang Jian-jun, Cao Jie, Wang Yuan-yuan. Gradient Algorithm on Stiefel Manifold and Application in Feature Extraction[J]. Journal of Radars, 2013, 2(3): 309-313. doi: 10.3724/SP.J.1300.2013.13048
    [19]Sun Zhi-jun, Xue Lei, Xu Yang-ming, Sun Zhi-yong. Shared Representation of SAR Target and Shadow Based on Multilayer Auto-encoder[J]. Journal of Radars, 2013, 2(2): 195-202. doi: 10.3724/SP.J.1300.2012.20085
    [20]Luo Ying, Zhang Qun, Wang Guo-zheng, Guan Hua, Bai You-qing. Micro-motion Signature Extraction Method for Wideband Radar Based on Complex Image OMP Decomposition[J]. Journal of Radars, 2012, 1(4): 361-369. doi: 10.3724/SP.J.1300.2012.20065
  • Cited by

    Periodical cited type(23)

    1. 蓝天亮,茅玉龙,杨明远. 一种导航雷达辐射源细微特征提取方法. 舰船科学技术. 2024(10): 147-151 .
    2. 兰博森,李胜勇,陈剑,于凯翔,李洪科. 基于载波频率特征的雷达辐射源个体识别. 舰船电子工程. 2024(09): 74-77+123 .
    3. 王艳云,牛朝阳,李远丽,李芳润,湛嘉祺. 开集场景下基于多重高斯残差原型网络的辐射源个体识别. 信息工程大学学报. 2024(06): 646-652 .
    4. 徐雨芯,曹建军,王保卫,翁年凤,顾楚梅. 基于特征选择和聚类的动态选择性集成模型. 广西科学. 2024(05): 1002-1010 .
    5. 孙丽婷,王翔,黄知涛. 基于多域判别核典型相关分析的辐射源指纹特征融合方法. 中国科学:信息科学. 2023(01): 146-163 .
    6. 陈翔,汪连栋,许雄,申绪涧,冯蕴天. 基于Raw I/Q和深度学习的射频指纹识别方法综述. 雷达学报. 2023(01): 214-234 . 本站查看
    7. 杨海宇,郭文普,康凯,何婧媛,边强. 注意力机制和CNN结合的雷达辐射源个体识别. 兵器装备工程学报. 2023(04): 290-296 .
    8. 赵雨睿,黄知涛,王翔. 基于相空间重构的辐射源个体识别技术综述. 雷达学报. 2023(04): 713-737 . 本站查看
    9. 肖易寒,王博煜,曹宗恒,张瑞,杨志钢. 雷达脉内信号识别与参数测量实验设计. 实验室研究与探索. 2023(08): 127-131+148 .
    10. 杜明洋,杜蒙,潘继飞,毕大平. 基于生成对抗网络的雷达脉内信号去噪与识别. 西安电子科技大学学报. 2023(06): 133-147 .
    11. 薛坚,刘乐,黄桂根. 基于AHP的雷达辐射源工作模式识别方法. 中国电子科学研究院学报. 2023(12): 1073-1078 .
    12. 叶得学,韩如冰,颜鲁合. 基于轻量级DenseNet和ZigBee的指纹识别方法. 湖南科技大学学报(自然科学版). 2023(04): 78-87 .
    13. 赵火军,程旗,李捷,高晓利,王维. 基于残差重构网络的射频信号个体识别. 兵工自动化. 2022(04): 64-68 .
    14. 肖易寒,李栋年,于祥祯,宋柯. 基于参数优化VMD和LightGBM的雷达辐射源个体识别. 航空兵器. 2022(02): 93-100 .
    15. 罗正华,李霞,杨耀如,向博,罗晓笛. 基于二维双树复小波变换的无人机个体识别. 电讯技术. 2022(05): 591-596 .
    16. 史亚,张文博,朱明哲,王磊,徐胜军. 雷达辐射源个体识别综述. 电子与信息学报. 2022(06): 2216-2229 .
    17. 寸陈韬,李天昀,朱家威,查雄. 基于多域特征融合学习的辐射源个体识别算法. 信息工程大学学报. 2022(03): 277-285 .
    18. 徐雨芯,顾楚梅,曹建军,许金勇,魏志虎. 基于蚁群特征选择并行分类集成学习的孪生辐射源个体识别. 兵工学报. 2022(12): 3132-3141 .
    19. 王国涛,姜秋喜,刘鑫,惠小东. 雷达告警器面临的挑战与思考. 舰船电子对抗. 2022(06): 31-34 .
    20. 张振,贾济铖,康健,林云. 射频指纹识别技术方法综述. 无线电通信技术. 2021(03): 249-258 .
    21. 杨洁,岳美君,曾耀平. 基于VMD和熵特征的雷达辐射源信号识别. 计算机技术与发展. 2021(10): 13-17 .
    22. 徐晋凯,谢钧. 辐射源识别技术发展研究. 信息技术与网络安全. 2021(10): 1-7 .
    23. 朱家威,李天昀,寸陈韬. 一种基于正交失衡的MIMO OFDM辐射源指纹提取方法. 信息工程大学学报. 2021(05): 530-536+544 .

    Other cited types(35)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(16)  / Tables(4)

    Article views(12900) PDF downloads(881) Cited by(58)
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    • Table  1.  Direct measurement features under the feature framework based on the inherent logic of fingerprint feature extraction
      Feature method Reference
      Basic parameter information General parameter [1,11,12]
      Envelope feature [1318]
      Instantaneous feature [1923]
      Modulation parameter [2426]
      Spectrum feature [327]
      Basic transformation
      information
      Time-frequency analysis [2832]
      High-order spectrum [3337]
      Cyclic spectrum [38,39]
      Hilbert spectrum [4043]
      Signal special structure
      Signal preamble [23,44,45]
      Radar signal analysis [4651]
      Decomposition and
      reconstruction information
      EMD [42,43,5255]
      ITD [5663]
      VMD [9,43,64,65]
      Phase space analysis [2,6669]
      Segmentation reconstruction [70,71]
      Transmitter hardware characteristics Equivalent circuit model [72]
      Nonlinear circuit model [73]
      Frequency source circuit [74]
       | Show Table
      DownLoad: CSV
    • Table  2.  Dimensionality reduction feature under feature framework based on the inherent logic of fingerprint feature extraction
      Feature Method Reference
      Waveform skeleton [7578]
      Fractal and complexity [42,79,80]
      Specific path integration/slicing [38,39,81]
      Entropy [59,65,8284]
      SVD [36,38,85]
      Traditional dimensionality reduction [3,8688]
       | Show Table
      DownLoad: CSV