{"id":"https://openalex.org/W3012538546","doi":"https://doi.org/10.1109/milcom47813.2019.9020952","title":"Physical Layer Firewall Design using Co-Channel Underlay-Based Watermark Authentication","display_name":"Physical Layer Firewall Design using Co-Channel Underlay-Based Watermark Authentication","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3012538546","doi":"https://doi.org/10.1109/milcom47813.2019.9020952","mag":"3012538546"},"language":"en","primary_location":{"id":"doi:10.1109/milcom47813.2019.9020952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom47813.2019.9020952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033795665","display_name":"Michael Fletcher","orcid":"https://orcid.org/0000-0001-6118-7014"},"institutions":[{"id":"https://openalex.org/I4210146238","display_name":"GIRD Systems (United States)","ror":"https://ror.org/05cww1c54","country_code":"US","type":"company","lineage":["https://openalex.org/I4210146238"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael J. Fletcher","raw_affiliation_strings":["Research & Development, GIRD Systems, Inc., Cincinatti, OH, USA"],"affiliations":[{"raw_affiliation_string":"Research & Development, GIRD Systems, Inc., Cincinatti, OH, USA","institution_ids":["https://openalex.org/I4210146238"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003470317","display_name":"Joseph Gaeddert","orcid":"https://orcid.org/0000-0002-5297-4267"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joseph D. Gaeddert","raw_affiliation_strings":["Hume Center for National Security & Technology, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Hume Center for National Security & Technology, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011390669","display_name":"Alan J. Michaels","orcid":"https://orcid.org/0000-0003-2437-3410"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Alan J. Michaels","raw_affiliation_strings":["Hume Center for National Security & Technology, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Hume Center for National Security & Technology, Virginia Polytechnic Institute and State University, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5033795665"],"corresponding_institution_ids":["https://openalex.org/I4210146238"],"apc_list":null,"apc_paid":null,"fwci":0.7001,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.79111012,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"453","last_page":"457"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7822717428207397},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.7734943628311157},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6409328579902649},{"id":"https://openalex.org/keywords/underlay","display_name":"Underlay","score":0.5463552474975586},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.4911923110485077},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4583645761013031},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4058936834335327},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22292768955230713},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16361790895462036},{"id":"https://openalex.org/keywords/signal-to-noise-ratio","display_name":"Signal-to-noise ratio (imaging)","score":0.1443750262260437}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7822717428207397},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.7734943628311157},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6409328579902649},{"id":"https://openalex.org/C2777679929","wikidata":"https://www.wikidata.org/wiki/Q7883709","display_name":"Underlay","level":3,"score":0.5463552474975586},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.4911923110485077},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4583645761013031},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4058936834335327},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22292768955230713},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16361790895462036},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.1443750262260437},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom47813.2019.9020952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom47813.2019.9020952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1691334661","https://openalex.org/W2023662470","https://openalex.org/W2104487735","https://openalex.org/W2113619583","https://openalex.org/W2147186687","https://openalex.org/W2160403761","https://openalex.org/W2242648860","https://openalex.org/W2283728554","https://openalex.org/W2577020208","https://openalex.org/W2620688973","https://openalex.org/W2734661246","https://openalex.org/W2742568568","https://openalex.org/W2799009589","https://openalex.org/W2805165712","https://openalex.org/W2889252766","https://openalex.org/W2909905693","https://openalex.org/W6731853486"],"related_works":["https://openalex.org/W4255303560","https://openalex.org/W1975029702","https://openalex.org/W1943171502","https://openalex.org/W2744240346","https://openalex.org/W2077074280","https://openalex.org/W4390189335","https://openalex.org/W2313479459","https://openalex.org/W2054601187","https://openalex.org/W1599626576","https://openalex.org/W1999732711"],"abstract_inverted_index":{"The":[0,48],"time-aligned":[1],"injection":[2],"of":[3,42,82],"a":[4],"co-channel":[5],"underlay-based":[6],"watermark":[7,61],"for":[8,45,135],"authentication":[9,111],"at":[10],"the":[11,38,59,66,80],"receiver":[12,54],"is":[13,62,96],"an":[14],"effective":[15],"method":[16],"to":[17,28,65,98,121,131,142],"enhance":[18],"physical":[19,49],"layer":[20,50,145],"security.":[21],"While":[22],"firewalls":[23],"have":[24],"traditionally":[25],"been":[26],"used":[27,73],"manage":[29],"authorized":[30],"traffic":[31],"in":[32,56],"wired":[33],"networks,":[34],"this":[35],"paper":[36],"provides":[37],"design":[39],"and":[40,70,123,141],"implementation":[41],"similar":[43],"functions":[44],"wireless":[46],"networks.":[47],"firewall":[51],"only":[52,114],"allows":[53],"access":[55],"cases":[57],"where":[58],"valid":[60],"detected":[63],"concurrent":[64],"incoming":[67],"primary":[68,102],"signal,":[69],"may":[71],"be":[72],"with":[74,104,113,137],"virtually":[75],"any":[76],"network":[77],"waveform.":[78],"Moreover,":[79],"use":[81,136],"non-repeating":[83],"arbitrary-phase":[84,105],"spread":[85,106],"spectrum":[86,107],"signals":[87,103],"eliminates":[88],"many":[89],"common":[90],"replay":[91],"attacks.":[92],"A":[93],"hardware":[94],"prototype":[95],"built":[97],"receive":[99],"IEEE":[100],"802.11g":[101],"underlays,":[108],"showing":[109],"reliable":[110],"performance":[112],"minor":[115],"bit":[116],"error":[117],"rate":[118],"degradation":[119],"up":[120],"Modulation":[122],"Coding":[124],"Scheme":[125],"5.":[126],"Future":[127],"prototypes":[128],"are":[129],"suggested":[130],"further":[132],"optimize":[133],"performance,":[134],"other":[138],"data":[139],"waveforms,":[140],"demonstrate":[143],"higher":[144],"protocols.":[146]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
