{"id":"https://openalex.org/W2290621023","doi":"https://doi.org/10.1109/tifs.2016.2516904","title":"PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement","display_name":"PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement","publication_year":2016,"publication_date":"2016-01-12","ids":{"openalex":"https://openalex.org/W2290621023","doi":"https://doi.org/10.1109/tifs.2016.2516904","mag":"2290621023"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2016.2516904","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2516904","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050525779","display_name":"Vireshwar Kumar","orcid":"https://orcid.org/0000-0002-2214-1571"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vireshwar Kumar","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090830151","display_name":"Jung\u2010Min Park","orcid":"https://orcid.org/0000-0002-4879-8467"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jung-Min Jerry Park","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064314482","display_name":"Kaigui Bian","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaigui Bian","raw_affiliation_strings":["School of Electronics Engineering and Computer Science, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics Engineering and Computer Science, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5050525779"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":3.5322,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.92941181,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"11","issue":"5","first_page":"1027","last_page":"1038"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8512866497039795},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.6250548362731934},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.618821382522583},{"id":"https://openalex.org/keywords/phy","display_name":"PHY","score":0.5887154936790466},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.5709956288337708},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5362578630447388},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42052358388900757},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4129617214202881},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4051632583141327},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3420332968235016},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.21862080693244934}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8512866497039795},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.6250548362731934},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.618821382522583},{"id":"https://openalex.org/C41918916","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"PHY","level":4,"score":0.5887154936790466},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.5709956288337708},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5362578630447388},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42052358388900757},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4129617214202881},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4051632583141327},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3420332968235016},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.21862080693244934}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2016.2516904","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2516904","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1780153499","display_name":null,"funder_award_id":"1431244","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3980249608","display_name":null,"funder_award_id":"1265886","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4000131320","display_name":null,"funder_award_id":"61572051","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7163042074","display_name":null,"funder_award_id":"1314598","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8169242032","display_name":null,"funder_award_id":"1547241","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F1128112387","display_name":"Motorola Solutions","ror":null},{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1555903958","https://openalex.org/W1968034188","https://openalex.org/W1971066773","https://openalex.org/W1981557991","https://openalex.org/W1986952076","https://openalex.org/W2006921752","https://openalex.org/W2008449560","https://openalex.org/W2012166391","https://openalex.org/W2029409284","https://openalex.org/W2075504752","https://openalex.org/W2082335067","https://openalex.org/W2091860253","https://openalex.org/W2093935141","https://openalex.org/W2098663993","https://openalex.org/W2103056119","https://openalex.org/W2115735006","https://openalex.org/W2117268846","https://openalex.org/W2121247918","https://openalex.org/W2128442736","https://openalex.org/W2131086249","https://openalex.org/W2134893787","https://openalex.org/W2134957651","https://openalex.org/W2142384583","https://openalex.org/W2145406327","https://openalex.org/W2153644609","https://openalex.org/W2154890510","https://openalex.org/W2155886813","https://openalex.org/W2157956640","https://openalex.org/W2159126760","https://openalex.org/W2245608838","https://openalex.org/W2248608259","https://openalex.org/W2798333393","https://openalex.org/W3149547152","https://openalex.org/W6683549911"],"related_works":["https://openalex.org/W2994999158","https://openalex.org/W2945523224","https://openalex.org/W4313639042","https://openalex.org/W2444418218","https://openalex.org/W4241709719","https://openalex.org/W1488909492","https://openalex.org/W2727597159","https://openalex.org/W2116285675","https://openalex.org/W4285813075","https://openalex.org/W2061637199"],"abstract_inverted_index":{"Spectrum":[0],"security":[1],"and":[2,115,134,189],"enforcement":[3],"is":[4,28,44,94,179],"one":[5],"of":[6,25,35,81],"the":[7,33,58,68,74,91,97,105,112,128,135,144,164,171,175,183,187,198,203],"major":[8,30],"challenges":[9],"that":[10,104,195],"need":[11],"to":[12,32,45,48,65,70,96,111,150,169],"be":[13,20],"addressed":[14],"before":[15],"spectrum":[16,36],"sharing":[17],"technologies":[18],"can":[19],"adopted":[21],"widely.":[22],"The":[23],"problem":[24],"rogue":[26,42],"transmitters":[27,72],"a":[29,79,102,124,152],"threat":[31],"viability":[34],"sharing.":[37],"One":[38],"approach":[39],"for":[40,159],"deterring":[41],"transmissions":[43],"enable":[46],"receivers":[47],"authenticate":[49,66,71],"or":[50,210],"uniquely":[51],"identify":[52],"transmitters.":[53],"Although":[54],"cryptographic":[55],"mechanisms":[56],"at":[57,73],"higher":[59,85],"layers":[60],"have":[61],"been":[62],"widely":[63],"used":[64],"transmitters,":[67],"ability":[69],"physical":[75],"(PHY)":[76],"layer":[77,86],"has":[78],"number":[80],"key":[82],"advantages":[83],"over":[84],"approaches.":[87],"In":[88,139],"existing":[89,119],"schemes,":[90],"authentication":[92,106,136,155,160,172,190],"signal":[93,99,107,114,173],"added":[95],"message":[98,113,129,176,188,208],"in":[100],"such":[101],"way":[103],"appears":[108],"as":[109],"noise":[110],"vice":[116],"versa.":[117],"Hence,":[118],"schemes":[120],"are":[121],"constrained":[122,181],"by":[123,167,182],"fundamental":[125],"tradeoff":[126,185],"between":[127,186],"signal's":[130,137],"signal-to-noise":[131],"ratio":[132],"(SNR)":[133],"SNR.":[138],"this":[140],"paper,":[141],"we":[142],"extend":[143],"precoded":[145],"duobinary":[146],"signaling":[147],"(P-DS)":[148],"technique":[149],"devise":[151],"new":[153],"PHY-layer":[154],"scheme":[156],"called":[157],"P-DS":[158,168],"(P-DSA).":[161],"P-DSA":[162,178,196],"exploits":[163],"redundancy":[165],"introduced":[166],"embed":[170],"into":[174],"signal.":[177],"not":[180],"aforementioned":[184],"signals.":[191],"Our":[192],"results":[193],"show":[194],"improves":[197],"detection":[199],"performance":[200],"compared":[201],"with":[202],"prior":[204],"art":[205],"without":[206],"sacrificing":[207],"throughput":[209],"increasing":[211],"transmission":[212],"power.":[213]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":7}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
