{"id":"https://openalex.org/W2562498650","doi":"https://doi.org/10.1109/milcom.2016.7795495","title":"Realizing physical layer authentication using constellation perturbation on a software-defined radio testbed","display_name":"Realizing physical layer authentication using constellation perturbation on a software-defined radio testbed","publication_year":2016,"publication_date":"2016-11-01","ids":{"openalex":"https://openalex.org/W2562498650","doi":"https://doi.org/10.1109/milcom.2016.7795495","mag":"2562498650"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2016.7795495","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2016.7795495","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2016 - 2016 IEEE Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056385916","display_name":"Ashwin Amanna","orcid":null},"institutions":[{"id":"https://openalex.org/I4210119229","display_name":"ANDRO (United States)","ror":"https://ror.org/02m359g33","country_code":"US","type":"company","lineage":["https://openalex.org/I4210119229"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ashwin Amanna","raw_affiliation_strings":["ANDRO Advanced Applied Technology, LLC, Rome, NY"],"affiliations":[{"raw_affiliation_string":"ANDRO Advanced Applied Technology, LLC, Rome, NY","institution_ids":["https://openalex.org/I4210119229"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077997923","display_name":"Anu Saji","orcid":null},"institutions":[{"id":"https://openalex.org/I4210119229","display_name":"ANDRO (United States)","ror":"https://ror.org/02m359g33","country_code":"US","type":"company","lineage":["https://openalex.org/I4210119229"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anu Saji","raw_affiliation_strings":["ANDRO Advanced Applied Technology, LLC, Rome, NY"],"affiliations":[{"raw_affiliation_string":"ANDRO Advanced Applied Technology, LLC, Rome, NY","institution_ids":["https://openalex.org/I4210119229"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083482567","display_name":"James Bohl","orcid":null},"institutions":[{"id":"https://openalex.org/I4210119229","display_name":"ANDRO (United States)","ror":"https://ror.org/02m359g33","country_code":"US","type":"company","lineage":["https://openalex.org/I4210119229"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"James Bohl","raw_affiliation_strings":["ANDRO Advanced Applied Technology, LLC, Rome, NY"],"affiliations":[{"raw_affiliation_string":"ANDRO Advanced Applied Technology, LLC, Rome, NY","institution_ids":["https://openalex.org/I4210119229"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5105469841","display_name":"Arun Subramanian","orcid":"https://orcid.org/0000-0003-1123-1720"},"institutions":[{"id":"https://openalex.org/I4210134512","display_name":"GE Global Research (United States)","ror":"https://ror.org/03e06qt98","country_code":"US","type":"company","lineage":["https://openalex.org/I4210134512"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Arun Subramanian","raw_affiliation_strings":["GE Global Research, San Ramon, CA"],"affiliations":[{"raw_affiliation_string":"GE Global Research, San Ramon, CA","institution_ids":["https://openalex.org/I4210134512"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5056385916"],"corresponding_institution_ids":["https://openalex.org/I4210119229"],"apc_list":null,"apc_paid":null,"fwci":0.4284,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.80001995,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1207","last_page":"1212"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-defined-radio","display_name":"Software-defined radio","score":0.8086481094360352},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7498038411140442},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7428914308547974},{"id":"https://openalex.org/keywords/universal-software-radio-peripheral","display_name":"Universal Software Radio Peripheral","score":0.7139900326728821},{"id":"https://openalex.org/keywords/phy","display_name":"PHY","score":0.6361926198005676},{"id":"https://openalex.org/keywords/phase-shift-keying","display_name":"Phase-shift keying","score":0.6253087520599365},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.5950585603713989},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4522285759449005},{"id":"https://openalex.org/keywords/phase-locked-loop","display_name":"Phase-locked loop","score":0.4259139597415924},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.42314398288726807},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.4161873459815979},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.39056459069252014},{"id":"https://openalex.org/keywords/bit-error-rate","display_name":"Bit error rate","score":0.3638223707675934},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.2062494456768036},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.19776079058647156},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.17492666840553284},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12126350402832031}],"concepts":[{"id":"https://openalex.org/C171115542","wikidata":"https://www.wikidata.org/wiki/Q1331892","display_name":"Software-defined radio","level":2,"score":0.8086481094360352},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7498038411140442},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7428914308547974},{"id":"https://openalex.org/C192220659","wikidata":"https://www.wikidata.org/wiki/Q1245659","display_name":"Universal Software Radio Peripheral","level":3,"score":0.7139900326728821},{"id":"https://openalex.org/C41918916","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"PHY","level":4,"score":0.6361926198005676},{"id":"https://openalex.org/C186378180","wikidata":"https://www.wikidata.org/wiki/Q4874866","display_name":"Phase-shift keying","level":4,"score":0.6253087520599365},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.5950585603713989},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4522285759449005},{"id":"https://openalex.org/C12707504","wikidata":"https://www.wikidata.org/wiki/Q52637","display_name":"Phase-locked loop","level":3,"score":0.4259139597415924},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.42314398288726807},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.4161873459815979},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.39056459069252014},{"id":"https://openalex.org/C56296756","wikidata":"https://www.wikidata.org/wiki/Q840922","display_name":"Bit error rate","level":3,"score":0.3638223707675934},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.2062494456768036},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.19776079058647156},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.17492666840553284},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12126350402832031},{"id":"https://openalex.org/C134652429","wikidata":"https://www.wikidata.org/wiki/Q1052698","display_name":"Jitter","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2016.7795495","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2016.7795495","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2016 - 2016 IEEE Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W131334536","https://openalex.org/W565468617","https://openalex.org/W2026693165","https://openalex.org/W2038257637","https://openalex.org/W2047892990","https://openalex.org/W2082335067","https://openalex.org/W2134957651","https://openalex.org/W2154890510","https://openalex.org/W2275590330"],"related_works":["https://openalex.org/W4251089492","https://openalex.org/W2993899695","https://openalex.org/W2886621694","https://openalex.org/W2540432762","https://openalex.org/W2127011572","https://openalex.org/W1622326982","https://openalex.org/W2354005007","https://openalex.org/W208897493","https://openalex.org/W3123045875","https://openalex.org/W2979617514"],"abstract_inverted_index":{"Ensuring":[0],"secure":[1],"command":[2],"and":[3,118,126,137,171,191,218,247,251,265],"control":[4],"in":[5,26],"a":[6,63,87,120,156,176,227],"tactical":[7],"military":[8],"environment":[9],"is":[10,50,58,224,244,254],"vital":[11],"as":[12,143,145],"the":[13,24,27,37,84,105,161,184,203,242,263,267,270],"combat":[14],"forces":[15],"face":[16],"many":[17],"potentially":[18],"sophisticated":[19],"adversaries":[20],"who":[21],"seek":[22],"out":[23],"vulnerabilities":[25],"communications":[28],"infrastructure.":[29],"Although":[30],"authentication":[31,67,90,111,135,150],"schemes":[32,136],"has":[33],"been":[34],"substantially":[35],"explored,":[36],"ability":[38,106],"of":[39,55,62,86,175,236,269],"new":[40],"techniques":[41],"to":[42,59,74,107,199,226],"coexist":[43,75],"with":[44,76,141],"existing":[45],"system":[46],"(i.e.,":[47],"legacy":[48,77,99,142],"systems)":[49],"often":[51],"overlooked.":[52],"The":[53,148,169,234],"objective":[54],"this":[56,80,114,223],"work":[57],"establish":[60],"feasibility":[61],"physical":[64],"(PHY)":[65],"layer":[66,89,110],"technique":[68],"that":[69,92],"can":[70,93],"be":[71],"implemented":[72],"easily":[73],"systems.":[78],"In":[79],"paper,":[81],"we":[82,116],"discuss":[83],"implementation":[85,170],"PHY":[88,109],"scheme":[91,151,206],"seamlessly":[94],"integrate":[95],"within":[96],"systems":[97],"containing":[98],"receivers,":[100],"which":[101,159],"do":[102],"not":[103],"have":[104],"decode":[108],"tags.":[112],"To":[113],"end,":[115],"design":[117],"evaluate":[119],"quadrature":[121,129],"phase":[122,130,229],"shift":[123,131],"keying":[124,132],"(QPSK)":[125],"\u03c0/4":[127],"Differential":[128],"(DQPSK)":[133],"based":[134],"demonstrate":[138,266],"their":[139],"operation":[140],"well":[144],"non-legacy":[146],"receivers.":[147],"addressed":[149],"follows":[152],"constellation":[153],"perturbation":[154],"by":[155,182],"pre-determined":[157],"angle":[158],"performs":[160],"tag":[162,219,243],"embedding":[163],"without":[164],"incurring":[165],"additional":[166],"network":[167],"bandwidth.":[168],"evaluation":[172],"platform":[173],"consists":[174],"software":[177],"defined":[178],"radio":[179,187],"(SDR)":[180],"testbed":[181],"using":[183],"open":[185],"source":[186],"framework,":[188],"GNU":[189],"Radio,":[190],"Universal":[192],"Software":[193],"Radio":[194],"Peripherals":[195],"(USRP-N210s).":[196],"For":[197],"moderate":[198],"high":[200],"signal-to-noise":[201],"ratios,":[202],"QPSK":[204],"tagging":[205],"achieves":[207],"low":[208],"(<;10":[209],"<sup":[210],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[211],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">-4</sup>":[212],")":[213],"bit":[214],"error":[215,220,238],"rates":[216,221],"(BER)":[217],"(TER);":[222],"due":[225],"novel":[228],"locked":[230],"loop":[231],"(PLL)":[232],"design.":[233],"use":[235],"forward":[237],"correction":[239],"(FEC)":[240],"on":[241],"also":[245],"considered,":[246],"an":[248],"improved":[249],"TER":[250],"power":[252],"saving":[253],"demonstrated.":[255],"Results":[256],"from":[257],"our":[258],"wireless":[259],"SDR":[260],"experiments":[261],"validate":[262],"mechanism":[264],"practicality":[268],"approach.":[271]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
