{"id":"https://openalex.org/W4417002654","doi":"https://doi.org/10.1109/jiot.2025.3640226","title":"P-MDTA: Multistage Trust Evolution Method for Physical Layer Satellite Link Authentication","display_name":"P-MDTA: Multistage Trust Evolution Method for Physical Layer Satellite Link Authentication","publication_year":2025,"publication_date":"2025-12-04","ids":{"openalex":"https://openalex.org/W4417002654","doi":"https://doi.org/10.1109/jiot.2025.3640226"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3640226","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3640226","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103457430","display_name":"Haoran Yang","orcid":"https://orcid.org/0000-0001-7517-8012"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haoran Yang","raw_affiliation_strings":["Big Data Institute, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Big Data Institute, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Desong Zou","orcid":"https://orcid.org/0009-0006-0852-5145"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Desong Zou","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110368193","display_name":"Yang Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Zhu","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jiarui Li","orcid":"https://orcid.org/0009-0002-0260-2710"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiarui Li","raw_affiliation_strings":["School of Informatics, Xiamen University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"School of Informatics, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004012018","display_name":"Haixin Sun","orcid":"https://orcid.org/0000-0001-8249-1197"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haixin Sun","raw_affiliation_strings":["School of Informatics, Xiamen University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"School of Informatics, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100458457","display_name":"Haijun Zhang","orcid":"https://orcid.org/0000-0002-1648-0227"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haijun Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Harbin Institute of Technology, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008248041","display_name":"Shangpeng Wang","orcid":"https://orcid.org/0009-0007-9757-9897"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shangpeng Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5103457430"],"corresponding_institution_ids":["https://openalex.org/I139660479"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.46150406,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"4","first_page":"7625","last_page":"7638"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12042","display_name":"Satellite Communication Systems","score":0.48350000381469727,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12042","display_name":"Satellite Communication Systems","score":0.48350000381469727,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.30079999566078186,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.045499999076128006,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7368999719619751},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.7117000222206116},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.669700026512146},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.620199978351593},{"id":"https://openalex.org/keywords/communications-satellite","display_name":"Communications satellite","score":0.4350000023841858},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.4284000098705292},{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.37389999628067017},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.35530000925064087}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8590999841690063},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7368999719619751},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.7117000222206116},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.669700026512146},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.620199978351593},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5062999725341797},{"id":"https://openalex.org/C121308736","wikidata":"https://www.wikidata.org/wiki/Q149918","display_name":"Communications satellite","level":3,"score":0.4350000023841858},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.4284000098705292},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.37389999628067017},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3666999936103821},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3614000082015991},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.35530000925064087},{"id":"https://openalex.org/C19269812","wikidata":"https://www.wikidata.org/wiki/Q26540","display_name":"Satellite","level":2,"score":0.34209999442100525},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.32670000195503235},{"id":"https://openalex.org/C12570599","wikidata":"https://www.wikidata.org/wiki/Q2891044","display_name":"Link layer","level":3,"score":0.3061000108718872},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.3050000071525574},{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.2953999936580658},{"id":"https://openalex.org/C2778027091","wikidata":"https://www.wikidata.org/wiki/Q25346003","display_name":"Satellite system","level":4,"score":0.29490000009536743},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.288100004196167},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.2768999934196472},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2727999985218048},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.2703000009059906},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2630000114440918},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2599000036716461},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.2515999972820282}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3640226","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3640226","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4076372864","display_name":null,"funder_award_id":"61972398","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4155186754","display_name":null,"funder_award_id":"No.61972398","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G672469689","display_name":null,"funder_award_id":"CX20250249","funder_id":"https://openalex.org/F4320326217","funder_display_name":"Hunan Provincial Innovation Foundation for Postgraduate"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320326217","display_name":"Hunan Provincial Innovation Foundation for Postgraduate","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W2003925783","https://openalex.org/W2115735006","https://openalex.org/W2166221619","https://openalex.org/W2728092904","https://openalex.org/W3006762012","https://openalex.org/W3021626678","https://openalex.org/W3045415097","https://openalex.org/W3086751733","https://openalex.org/W3089706104","https://openalex.org/W3097305705","https://openalex.org/W3107179866","https://openalex.org/W3157275269","https://openalex.org/W3189540113","https://openalex.org/W3196302005","https://openalex.org/W3216299177","https://openalex.org/W4212879593","https://openalex.org/W4280530302","https://openalex.org/W4285282745","https://openalex.org/W4312312028","https://openalex.org/W4312327787","https://openalex.org/W4313041210","https://openalex.org/W4387935021","https://openalex.org/W4388543861","https://openalex.org/W4388837964","https://openalex.org/W4392173910","https://openalex.org/W4397000135","https://openalex.org/W4399311127","https://openalex.org/W4400276855","https://openalex.org/W4401155419","https://openalex.org/W4406098510","https://openalex.org/W4408612646","https://openalex.org/W4413276666"],"related_works":[],"abstract_inverted_index":{"Satellite":[0],"communication":[1],"links":[2],"leveraging":[3],"multi-source":[4],"physical":[5,18],"layer":[6,19],"features":[7],"provide":[8],"critical":[9],"authentication":[10,61,75],"technology":[11],"for":[12],"secure":[13,120],"satellite":[14],"networks.":[15],"However,":[16],"existing":[17],"security":[20],"schemes":[21],"suffer":[22],"two":[23],"major":[24],"limitations:":[25],"i)":[26],"most":[27],"methods":[28],"perform":[29],"one-shot":[30],"decisions":[31],"without":[32],"tracking":[33],"trust":[34,60,104],"evolution":[35,105],"over":[36],"changing":[37],"link":[38],"geometries;":[39],"ii)":[40],"fixed":[41],"decision":[42],"rules":[43],"fail":[44],"to":[45],"accumulate":[46],"evidence":[47],"and":[48,80,106,124,127,132],"degrade":[49],"robustness":[50],"when":[51],"spoofing":[52],"parameters":[53],"adapt.":[54],"We":[55],"propose":[56],"a":[57,66,87],"multi-stage":[58],"dynamic":[59],"framework.":[62],"Firstly,":[63],"we":[64,85],"introduce":[65],"multi-feature":[67],"statistical":[68],"detection":[69],"module":[70],"that":[71,92,115],"performs":[72],"real-time":[73],"preliminary":[74],"based":[76],"on":[77,111],"Doppler":[78],"shifts":[79],"power":[81],"residual":[82],"analysis.":[83],"Then":[84],"design":[86],"particle-filtering-based":[88],"trust-state":[89],"estimation":[90],"mechanism":[91],"fuses":[93],"historical":[94],"credibility":[95],"with":[96],"new":[97],"observations":[98],"via":[99],"adaptive":[100],"resampling,":[101],"enabling":[102],"continuous":[103],"swift":[107],"anomaly":[108],"response.":[109],"Experiments":[110],"STK-simulated":[112],"datasets":[113],"demonstrate":[114],"the":[116],"proposed":[117],"method":[118],"increases":[119],"throughput":[121],"by":[122,130],"5.5%":[123],"reduces":[125],"false-alarm":[126],"missed-detection":[128],"rates":[129],"27%":[131],"29%,":[133],"respectively.":[134]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-04T00:00:00"}
