<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>saucis</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Sakarya University Journal of Computer and Information Sciences</journal-title>
            </journal-title-group>
                                        <issn pub-type="epub">2636-8129</issn>
                                                                                            <publisher>
                    <publisher-name>Sakarya University</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.35377/saucis...1138577</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Artificial Intelligence</subject>
                                                            <subject>Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Yapay Zeka</subject>
                                                            <subject>Mühendislik</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>The Effect of Ambient Temperature On Device Classification Based On Radio Frequency Fingerprint Recognition</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-3793-5470</contrib-id>
                                                                <name>
                                    <surname>Yılmaz</surname>
                                    <given-names>Özkan</given-names>
                                </name>
                                                                    <aff>Aselsan A.Ş.</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-9965-2329</contrib-id>
                                                                <name>
                                    <surname>Yazıcı</surname>
                                    <given-names>Mehmet Akif</given-names>
                                </name>
                                                                    <aff>Istanbul Technical University</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20220831">
                    <day>08</day>
                    <month>31</month>
                    <year>2022</year>
                </pub-date>
                                        <volume>5</volume>
                                        <issue>2</issue>
                                        <fpage>233</fpage>
                                        <lpage>245</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20220630">
                        <day>06</day>
                        <month>30</month>
                        <year>2022</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20220806">
                        <day>08</day>
                        <month>06</month>
                        <year>2022</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2018, Sakarya University Journal of Computer and Information Sciences</copyright-statement>
                    <copyright-year>2018</copyright-year>
                    <copyright-holder>Sakarya University Journal of Computer and Information Sciences</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>Physical layer authentication is an important technique for cybersecurity, especially in military scenarios. Device classification using radio frequency fingerprinting, which is based on recognizing device-unique characteristics of the transient waveform observed at the beginning of a transmission from a radio device, is a promising method in this context. In this study, the effect of the ambient temperature on the performance of radio device classification based on RF fingerprinting is investigated. The waveforms of the transient regions of the transmissions are recorded as images, and ResNet50 and InceptionV3 networks for image classification are used to determine the radio devices. The radio devices used in the study belong to the same brand, model, and production date, making the problem more difficult than classifying radio devices of different brands or models. Our results show that high levels of accuracy can be attained using convolutional neural network models such as ResNet50 and InceptionV3 when the test data and the training data are collected at the same temperature, whereas performance suffers when the test data and the training data belong to different temperature values. We provide the performance figures of a blended training model that uses training data taken at various temperature values. A comparison of the two networks is also provided.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>cybersecurity</kwd>
                                                    <kwd>  device classification</kwd>
                                                    <kwd>  radio frequency fingerprint</kwd>
                                                    <kwd>  double sliding window</kwd>
                                                    <kwd>  image classification</kwd>
                                                    <kwd>  resnet50</kwd>
                                                    <kwd>  inceptionV3</kwd>
                                            </kwd-group>
                            
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1] 	O. Ureten and N. Serinken, &quot;Wireless security through RF fingerprinting,&quot; Canadian Journal of Electrical and Computer Engineering, vol. 32, no. 1, pp. 27-33, 2007.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2] 	D. R. Reising, M. A. Temple and M. J. Mendenhall, &quot;Improving intra-cellular security using air monitoring with RF fingerprints,&quot; in 2010 IEEE Wireless Communication and Networking Conference, Sydney, NSW, Australia, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3] 	A. C. Polak, S. Dolatshahi and D. L. Goeckel, &quot;Identifying wireless users via transmitter imperfections,&quot; IEEE Journal on selected areas in communications, vol. 29, no. 7, pp. 1469-1479, 2011.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4] 	S. Mathur, A. Reznik, C. Ye, R. Mukherjee, A. Rahman, Y. Shah, W. Trappe and N. Mandayam, &quot;Exploiting the physical layer for enhanced security [security and privacy in emerging wireless networks],&quot; IEEE Wireless Communications, vol. 17, no. 5, pp. 63-70, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5] 	B. Danev, H. Luecken, S. Capkun and K. El Defrawy, &quot;Attacks on physical-layer identification,&quot; in Proceedings of the third ACM conference on Wireless network security, Hoboken, New Jersey, USA, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6] 	K. Merchant, S. Revay, G. Stantchev and B. Nousain, &quot;Deep learning for RF device fingerprinting in cognitive communication networks,&quot; IEEE Journal of Selected Topics in Signal Processing, vol. 12, no. 1, pp. 160-167, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7] 	I. O. Kennedy and A. M. Kuzminskiy, &quot;RF fingerprint detection in a wireless multipath channel,&quot; in 7th International Symposium on Wireless Communication Systems, York, UK, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8] 	O. Ureten and N. Serinken, &quot;Bayesian detection of Wi-Fi transmitter RF fingerprints,&quot; Electronics Letters, vol. 41, no. 6, pp. 373-374, 2005.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9] 	J. Toonstra and W. Kinsner, &quot;A radio transmitter fingerprinting system ODO-1,&quot; in Proceedings of 1996 Canadian Conference on Electrical and Computer Engineering, Calgary, AB, Canada, 1996.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10] M. Woelfle, M. Temple, M. Mullins and M. Mendenhall, &quot;Detecting, identifying and locating bluetooth devices using RF fingerprints,&quot; in 2009 Military Communications Conference (MILCOM 2009), Boston, MA, USA, 2009.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11] 	D. Zanetti, B. Danev and S. Capkun, &quot;Physical-layer identification of UHF RFID tags,&quot; in Proceedings of the sixteenth annual international conference on Mobile computing and networking, Chicago, IL, USA, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12] S. U. Rehman, K. W. Sowerby and C. Coghill, &quot;Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers,&quot; Journal of Computer and System Sciences, vol. 80, no. 3, pp. 591-601, 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13] O. Tekbas, N. Serinken and O. Ureten, &quot;An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions,&quot; Canadian Journal of Electrical and Computer Engineering, vol. 29, no. 3, pp. 203-209, 2004.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14] S. Riyaz, K. Sankhe, S. Ioannidis and K. Chowdhury, &quot;Deep learning convolutional neural networks for radio identification,&quot; IEEE Communications Magazine, vol. 56, no. 9, pp. 146-152, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15] S. U. Rehman, K. W. Sowerby, S. Alam and I. Ardekani, &quot;Radio frequency fingerprinting and its challenges,&quot; in 2014 IEEE Conference on Communications and Network Security, San Francisco, CA, USA, 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16] S. Wang, H. Jiang, X. Fang, Y. Ying, J. Li and B. Zhang, &quot;Radio frequency fingerprint identification based on deep complex residual network,&quot; IEEE Access, vol. 8, pp. 204417-204424, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17] 	W. C. Suski II, M. A. Temple, M. J. Mendenhall and R. F. Mills, &quot;Radio frequency fingerprinting commercial communication devices to enhance electronic security,&quot; International Journal of Electronic Security and Digital Forensics, vol. 1, no. 3, pp. 301-322, 2008.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18] N. Soltanieh, Y. Norouzi, Y. Yang and N. C. Karmakar, &quot;A review of radio frequency fingerprinting techniques,&quot; IEEE Journal of Radio Frequency Identification, vol. 4, no. 3, pp. 222-233, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19] D. Shaw and W. Kinsner, &quot;Multifractal modelling of radio transmitter transients for classification,&quot; in IEEE WESCANEX 97 Communications, Power and Computing, Winnipeg, MB, Canada, 1997.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20] J. Terry and J. Heiskala, OFDM wireless LANs: A theoretical and practical guide, Indianapolis, Indiana, USA: Sams publishing, 2002.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21] J. Li, D. Bi, Y. Ying, K. Wei and B. Zhang, &quot;An improved algorithm for extracting subtle features of radiation source individual signals,&quot; Electronics, vol. 8, no. 2, p. 246, 2019.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
