{"id":"https://openalex.org/W2787288665","doi":"https://doi.org/10.1186/s13638-019-1413-5","title":"Authentication of satellite navigation signals by wiretap coding and artificial noise","display_name":"Authentication of satellite navigation signals by wiretap coding and artificial noise","publication_year":2019,"publication_date":"2019-04-18","ids":{"openalex":"https://openalex.org/W2787288665","doi":"https://doi.org/10.1186/s13638-019-1413-5","mag":"2787288665"},"language":"en","primary_location":{"id":"doi:10.1186/s13638-019-1413-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-019-1413-5","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-019-1413-5","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-019-1413-5","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039934282","display_name":"Francesco Formaggio","orcid":"https://orcid.org/0000-0002-3456-1557"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Francesco Formaggio","raw_affiliation_strings":["Department of Information Engineering, University of Padova, via Gradenigo 6/A, Padova, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Padova, via Gradenigo 6/A, Padova, Italy","institution_ids":["https://openalex.org/I138689650"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076790432","display_name":"Stefano Tomasin","orcid":"https://orcid.org/0000-0003-3253-6793"},"institutions":[{"id":"https://openalex.org/I138689650","display_name":"University of Padua","ror":"https://ror.org/00240q980","country_code":"IT","type":"education","lineage":["https://openalex.org/I138689650"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Stefano Tomasin","raw_affiliation_strings":["Department of Information Engineering, University of Padova, via Gradenigo 6/A, Padova, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Padova, via Gradenigo 6/A, Padova, Italy","institution_ids":["https://openalex.org/I138689650"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5039934282"],"corresponding_institution_ids":["https://openalex.org/I138689650"],"apc_list":{"value":1140,"currency":"GBP","value_usd":1398},"apc_paid":{"value":1140,"currency":"GBP","value_usd":1398},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00260849,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2019","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7805778980255127},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6059149503707886},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.5983502268791199},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.584367036819458},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.5377832055091858},{"id":"https://openalex.org/keywords/gnss-applications","display_name":"GNSS applications","score":0.505957305431366},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48899805545806885},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.48736149072647095},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4552532434463501},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.43399858474731445},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.27897292375564575},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.24669763445854187},{"id":"https://openalex.org/keywords/global-positioning-system","display_name":"Global Positioning System","score":0.16021034121513367},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.1167677640914917}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7805778980255127},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6059149503707886},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.5983502268791199},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.584367036819458},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.5377832055091858},{"id":"https://openalex.org/C14279187","wikidata":"https://www.wikidata.org/wiki/Q5514012","display_name":"GNSS applications","level":3,"score":0.505957305431366},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48899805545806885},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.48736149072647095},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4552532434463501},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.43399858474731445},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.27897292375564575},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.24669763445854187},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.16021034121513367},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.1167677640914917},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1186/s13638-019-1413-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-019-1413-5","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-019-1413-5","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1802.04513","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1802.04513","pdf_url":"https://arxiv.org/pdf/1802.04513","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2787288665","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1802.04513.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"pmh:oai:doaj.org/article:cd7596949cc141d28ef3434906854a0e","is_oa":true,"landing_page_url":"https://doaj.org/article/cd7596949cc141d28ef3434906854a0e","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking, Vol 2019, Iss 1, Pp 1-17 (2019)","raw_type":"article"},{"id":"doi:10.48550/arxiv.1802.04513","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1802.04513","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13638-019-1413-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13638-019-1413-5","pdf_url":"https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-019-1413-5","source":{"id":"https://openalex.org/S82675988","display_name":"EURASIP Journal on Wireless Communications and Networking","issn_l":"1687-1472","issn":["1687-1472","1687-1499"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Wireless Communications and Networking","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2787288665.pdf","grobid_xml":"https://content.openalex.org/works/W2787288665.grobid-xml"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W252932944","https://openalex.org/W949353694","https://openalex.org/W1528401588","https://openalex.org/W1556811593","https://openalex.org/W1588594383","https://openalex.org/W1684424876","https://openalex.org/W1824580093","https://openalex.org/W2003925783","https://openalex.org/W2005801175","https://openalex.org/W2015086338","https://openalex.org/W2062612962","https://openalex.org/W2105044760","https://openalex.org/W2109418578","https://openalex.org/W2130423988","https://openalex.org/W2144136361","https://openalex.org/W2150010995","https://openalex.org/W2159470227","https://openalex.org/W2240181383","https://openalex.org/W2272901026","https://openalex.org/W2902257054","https://openalex.org/W4300580367","https://openalex.org/W6600518997"],"related_works":["https://openalex.org/W2962895494","https://openalex.org/W2602272935","https://openalex.org/W2591862181","https://openalex.org/W2112123834","https://openalex.org/W2755948683","https://openalex.org/W2512446541","https://openalex.org/W2848862870","https://openalex.org/W2090488857","https://openalex.org/W3102886933","https://openalex.org/W2284715751","https://openalex.org/W2317127693","https://openalex.org/W2177090658","https://openalex.org/W1987963139","https://openalex.org/W1986952076","https://openalex.org/W3067183320","https://openalex.org/W3013669421","https://openalex.org/W2922254723","https://openalex.org/W2122969154","https://openalex.org/W3125245754","https://openalex.org/W3043963370"],"abstract_inverted_index":{"In":[0,24],"order":[1],"to":[2,29,98],"combat":[3],"the":[4,26,30,48,56,61,64,68,72,75,96,101,104,108,112,116,120],"spoofing":[5],"of":[6,63,74,103,110,115],"global":[7],"navigation":[8,31,57],"satellite":[9,27],"system":[10],"(GNSS)":[11],"signals,":[12],"we":[13],"propose":[14],"a":[15,37,79,86],"novel":[16],"signal":[17,32,35,58,66],"authentication":[18,34,39,65,76,117],"method":[19],"based":[20],"on":[21],"information-theoretic":[22],"security.":[23],"particular,":[25],"superimposes":[28],"an":[33],"containing":[36],"secret":[38],"message":[40,118],"corrupted":[41],"by":[42,107],"artificial":[43],"noise":[44],"(AN).":[45],"We":[46,99],"impose":[47],"following":[49],"properties:":[50],"The":[51],"legitimate":[52],"receiver":[53,97],"synchronizes":[54],"with":[55,67],"and":[59,119],"stores":[60],"samples":[62],"same":[69],"synchronization.":[70],"After":[71],"transmission":[73],"signal,":[77],"through":[78],"separate":[80],"public":[81,94],"asynchronous":[82],"ground":[83],"channel":[84],"(e.g.,":[85],"secure":[87],"Internet":[88],"connection)":[89],"additional":[90],"information":[91],"is":[92],"made":[93],"allowing":[95],"assess":[100],"performance":[102],"proposed":[105],"scheme":[106],"analysis":[109],"both":[111],"secrecy":[113],"capacity":[114],"attack":[121,126],"success":[122],"probability":[123],"under":[124],"various":[125],"scenarios.":[127]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
