D. Antonioli, N. O. Tippenhauer, and K. Rasmussen, Bias: Bluetooth impersonation attacks, Proceedings of the IEEE Symposium on Security and Privacy (S&P), p.2020

E. Ronen, A. Shamir, A. Weingarten, and C. O'flynn, Iot goes nuclear: Creating a zigbee chain reaction, 2017 IEEE Symposium on Security and Privacy (SP), pp.195-212, 2017.

, Experiments datasets

J. Hall, M. Barbeau, and E. Kranakis, Radio frequency fingerprinting for intrusion detection in wireless networks, IEEE Trans. Dependable Secure Comput, 2005.

S. Ur-rehman, K. Sowerby, and C. Coghill, Rf fingerprint extraction from the energy envelope of an instantaneous transient signal, p.2012

, Australian Communications Theory Workshop, pp.90-95, 2012.

M. Köse, S. Ta?cioglu, and Z. Telatar, Rf fingerprinting of iot devices based on transient energy spectrum, IEEE Access, vol.7, pp.18-715, 2019.

B. Danev, Physical-layer identification of wireless devices, ETHZ, pp.25-90, 2011.

B. Danev, D. Zanetti, and S. Capkun, On physical-layer identification of wireless devices, ACM Computing Surveys (CSUR), vol.45, issue.1, pp.1-29, 2012.

V. Brik, S. Banerjee, M. Gruteser, and S. Oh, Paradis : Physical 802 . 11 device identification with radiometric signatures, 2008.

B. Chatterjee, D. Das, S. Maity, and S. Sen, Rf-puf: Enhancing iot security through authentication of wireless nodes using in-situ machine learning, IEEE Internet of Things Journal, vol.6, issue.1, pp.388-398, 2019.

B. W. Ramsey, B. E. Mullins, M. A. Temple, and M. R. Grimaila, Wireless intrusion detection and device fingerprinting through preamble manipulation, IEEE Transactions on Dependable and Secure Computing, vol.12, issue.5, pp.585-596, 2015.

D. Nouichi, M. Abdelsalam, Q. Nasir, and S. Abbas, Iot devices security using rf fingerprinting, 2019 Advances in Science and Engineering Technology Int. Conferences (ASET), pp.1-7, 2019.

J. Hasse, T. Gloe, and M. Beck, Forensic identification of gsm mobile phones, Proceedings of the first ACM workshop on Information hiding and multimedia security, pp.131-140, 2013.

P. Laperdrix, N. Bielova, B. Baudry, and G. Avoine, Browser fingerprinting: A survey, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02864872

P. Eckersley, How unique is your web browser?, pp.1-18, 2010.

K. Boda, Á. M. Földes, G. G. Gulyás, and S. Imre, User tracking on the web via cross-browser fingerprinting, Nordic conference on secure it systems, pp.31-46, 2011.

, Hackrf one official webpage

, Limesdr mini official webpage

P. Pons and M. Latapy, Computing communities in large networks using random walks, J. Graph Algorithms Appl, vol.10, pp.191-218, 2006.

L. Kaufmann and P. Rousseeuw, Clustering by means of medoids, Data Analysis based on the L1-Norm and Related Methods, vol.01, pp.405-416, 1987.

M. Girvan and M. E. Newman, Community structure in social and biological networks, Proceedings of the National Academy of Sciences, vol.99, issue.12, pp.7821-7826, 2002.

A. Clauset, M. Newman, and C. Moore, Finding community structure in very large networks, Physical review. E, Statistical, nonlinear, and soft matter physics, vol.70, p.66111, 2005.