{"id":"https://openalex.org/W3039197289","doi":"https://doi.org/10.1155/2020/2194840","title":"Authentication and Secrecy of Multicast Communication Scenario: Artificial Noise-Aided Costas Sequence Matrix FDA Approach","display_name":"Authentication and Secrecy of Multicast Communication Scenario: Artificial Noise-Aided Costas Sequence Matrix FDA Approach","publication_year":2020,"publication_date":"2020-06-30","ids":{"openalex":"https://openalex.org/W3039197289","doi":"https://doi.org/10.1155/2020/2194840","mag":"3039197289"},"language":"en","primary_location":{"id":"doi:10.1155/2020/2194840","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/2194840","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/2194840.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/2194840.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024126941","display_name":"Shaddrack Yaw Nusenu","orcid":"https://orcid.org/0000-0001-8492-4769"},"institutions":[{"id":"https://openalex.org/I4210151633","display_name":"Koforidua Technical University","ror":"https://ror.org/05vexvt14","country_code":"GH","type":"education","lineage":["https://openalex.org/I4210151633"]}],"countries":["GH"],"is_corresponding":true,"raw_author_name":"Shaddrack Yaw Nusenu","raw_affiliation_strings":["Koforidua Technical University (KTU), Koforidua, Ghana"],"affiliations":[{"raw_affiliation_string":"Koforidua Technical University (KTU), Koforidua, Ghana","institution_ids":["https://openalex.org/I4210151633"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5024126941"],"corresponding_institution_ids":["https://openalex.org/I4210151633"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.5137,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.64349822,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9790999889373779,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.850510835647583},{"id":"https://openalex.org/keywords/multicast","display_name":"Multicast","score":0.8089560270309448},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.6616936326026917},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5525389909744263},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5477957725524902},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.5422852635383606},{"id":"https://openalex.org/keywords/precoding","display_name":"Precoding","score":0.47208234667778015},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4251611530780792},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4121694266796112},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.34062010049819946},{"id":"https://openalex.org/keywords/mimo","display_name":"MIMO","score":0.21237844228744507},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18632152676582336},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.18321341276168823}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.850510835647583},{"id":"https://openalex.org/C32295351","wikidata":"https://www.wikidata.org/wiki/Q899288","display_name":"Multicast","level":2,"score":0.8089560270309448},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.6616936326026917},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5525389909744263},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5477957725524902},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.5422852635383606},{"id":"https://openalex.org/C160562895","wikidata":"https://www.wikidata.org/wiki/Q7239557","display_name":"Precoding","level":4,"score":0.47208234667778015},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4251611530780792},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4121694266796112},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.34062010049819946},{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.21237844228744507},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18632152676582336},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.18321341276168823}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/2194840","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/2194840","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/2194840.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b5d2466cd64f4e25bf55b8951d9e2686","is_oa":true,"landing_page_url":"https://doaj.org/article/b5d2466cd64f4e25bf55b8951d9e2686","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/2194840","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/2194840","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/2194840.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.9100000262260437,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3039197289.pdf","grobid_xml":"https://content.openalex.org/works/W3039197289.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W1957358593","https://openalex.org/W1981647260","https://openalex.org/W1992996890","https://openalex.org/W1993039929","https://openalex.org/W2040317577","https://openalex.org/W2043769961","https://openalex.org/W2080693943","https://openalex.org/W2096236228","https://openalex.org/W2103063389","https://openalex.org/W2106194367","https://openalex.org/W2111451941","https://openalex.org/W2112513314","https://openalex.org/W2113706820","https://openalex.org/W2128153585","https://openalex.org/W2133108373","https://openalex.org/W2142143226","https://openalex.org/W2150970357","https://openalex.org/W2156214717","https://openalex.org/W2163185922","https://openalex.org/W2218552649","https://openalex.org/W2328196818","https://openalex.org/W2436620493","https://openalex.org/W2481778652","https://openalex.org/W2560693949","https://openalex.org/W2578975026","https://openalex.org/W2585219350","https://openalex.org/W2589972337","https://openalex.org/W2791324210","https://openalex.org/W2800822737","https://openalex.org/W2918831922","https://openalex.org/W2937767317","https://openalex.org/W2962911767","https://openalex.org/W2963456405","https://openalex.org/W2963616899","https://openalex.org/W2964028646","https://openalex.org/W2978511100","https://openalex.org/W3101700108","https://openalex.org/W3104706117","https://openalex.org/W3105108969"],"related_works":["https://openalex.org/W4281688526","https://openalex.org/W1979654659","https://openalex.org/W2951619176","https://openalex.org/W2878548210","https://openalex.org/W2952382957","https://openalex.org/W3027724803","https://openalex.org/W1969034288","https://openalex.org/W2145047504","https://openalex.org/W1747611275","https://openalex.org/W2997417282"],"abstract_inverted_index":{"In":[0,135],"multicast":[1,56,169],"communication":[2],"scenario,":[3],"the":[4,19,65,124,140,147,154],"desired":[5,69],"users":[6],"are":[7],"decomposed":[8],"into":[9,160],"M":[10,15],"groups":[11,70],"to":[12,26,92,162],"receive":[13],"private":[14],"useful":[16,118],"data":[17,119],"from":[18],"transmitter,":[20],"while":[21],"eavesdroppers":[22],"(Eves)":[23],"group":[24,73],"tries":[25],"intercept.":[27],"Since":[28],"wireless":[29],"security":[30],"system":[31],"consists":[32],"of":[33],"authentication":[34,71],"and":[35,75,116,145,164],"secure":[36],"transmission,":[37],"we":[38,63,87,102,137],"propose":[39],"directional":[40],"modulation":[41],"(DM)":[42],"artificial":[43],"noise":[44],"(AN)":[45],"matrix-aided":[46,90],"Costas":[47],"sequence":[48],"(CS)":[49],"matrix":[50,67],"frequency":[51],"diverse":[52],"array":[53],"(FDA)":[54],"in":[55,59,84,168],"precoding":[57],"systems":[58],"this":[60],"paper.":[61],"Specifically,":[62],"utilize":[64],"CS":[66],"for":[68],"(i.e.,":[72],"identity),":[74],"it":[76],"is":[77,133],"shared":[78],"via":[79],"a":[80],"low-speed":[81],"forward":[82],"link":[83],"advance.":[85],"Next,":[86],"design":[88,163],"AN":[89],"FDA":[91],"offer":[93],"robust":[94],"antieavesdropping":[95],"method":[96],"based":[97,122],"on":[98,123],"leakage":[99,120],"concept.":[100],"Furthermore,":[101],"devise":[103],"secrecy":[104,107,148,166],"metrics,":[105],"namely,":[106],"outage":[108],"probability":[109],"(SOP),":[110],"asymptotic":[111],"Eve\u2019s":[112,127],"detectability":[113],"error":[114],"probability,":[115],"average":[117],"rate,":[121],"scenario":[125],"where":[126],"instantaneous":[128],"channel":[129],"state":[130],"information":[131],"(CSI)":[132],"unavailable.":[134],"addition,":[136],"numerically":[138],"analyze":[139],"proposed":[141,155],"energy":[142,149],"beamforming":[143],"focusing":[144],"evaluate":[146],"efficiency.":[150],"Via":[151],"simulation":[152],"results,":[153],"scheme":[156],"gives":[157],"important":[158],"insights":[159],"how":[161],"measure":[165],"performances":[167],"scenarios.":[170]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
