{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:01:49Z","timestamp":1743073309128,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_3","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"33-49","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure Radio Frequency DCS Watermark-Aided Physical Layer Authentication Design for NB-IoT Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8540-5693","authenticated-orcid":false,"given":"Hongqing","family":"Huang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5303-0639","authenticated-orcid":false,"given":"Lin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"key":"3_CR1","unstructured":"3GPP: Evolved universal terrestrial radio access (E-UTRA) physical channels and modulation (TS 36.211 V 13.2.0 Rel. 13), August 2016"},{"key":"3_CR2","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"issue":"2","key":"3_CR3","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1109\/JIOT.2018.2846803","volume":"6","author":"J Cao","year":"2019","unstructured":"Cao, J., Yu, P., Ma, M., Gao, W.: Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network. IEEE Internet Things J. 6(2), 1561\u20131575 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"3_CR4","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1109\/5.771068","volume":"87","author":"IJ Cox","year":"1999","unstructured":"Cox, I.J., Miller, M.L., McKellips, A.L.: Watermarking as communications with side information. Proc. IEEE 87(7), 1127\u20131141 (1999)","journal-title":"Proc. IEEE"},{"key":"3_CR5","unstructured":"Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: Proceedings of 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), Buffalo-Niagara Falls, NY, USA, 26\u201329 June, pp. 5 pp.-570. IEEE Press, Piscataway (2006)"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Halak, B., Zwolinski, M., Mispan, M.S.: Overview of PUF-based hardware security solutions for the internet of things. In: Proceedings of 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), Abu Dhabi, United Arab Emirates, 16\u201319 October, pp. 1\u20134. IEEE Press, Piscataway (2016)","DOI":"10.1109\/MWSCAS.2016.7870046"},{"issue":"12","key":"3_CR7","doi-asserted-by":"publisher","first-page":"2262","DOI":"10.1109\/LCOMM.2019.2944811","volume":"23","author":"H Huang","year":"2019","unstructured":"Huang, H., Zhang, L.: Reliable and secure constellation shifting aided differential radio frequency watermark design for NB-IoT systems. IEEE Commu. Lett. 23(12), 2262\u20132265 (2019)","journal-title":"IEEE Commu. Lett."},{"issue":"4","key":"3_CR8","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1109\/WCL.2012.050112.120059","volume":"1","author":"T Jiang","year":"2012","unstructured":"Jiang, T., Zeng, H., Yan, Q., Lou, W., Hou, Y.T.: On the limitation of embedding cryptographic signature for primary transmitter authentication. IEEE Wireless Commun. Lett. 1(4), 324\u2013327 (2012)","journal-title":"IEEE Wireless Commun. Lett."},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Liu, F.J., Wang, X., Tang, H.: Robust physical layer authentication using inherent properties of channel impulse response. In: Proceedings of 2011 - MILCOM 2011 Military Communications Conference, Baltimore, MD, USA, 7\u201310 November, pp. 538\u2013542. IEEE Press, Piscataway (2011)","DOI":"10.1109\/MILCOM.2011.6127727"},{"issue":"4","key":"3_CR10","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TSP.2003.809385","volume":"51","author":"HS Malvar","year":"2003","unstructured":"Malvar, H.S., Florencio, D.A.F.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process. 51(4), 898\u2013905 (2003)","journal-title":"IEEE Trans. Signal Process."},{"key":"3_CR11","doi-asserted-by":"publisher","first-page":"1660","DOI":"10.1109\/ACCESS.2015.2389854","volume":"2","author":"C Perera","year":"2014","unstructured":"Perera, C., Liu, C.H., Jayawardena, S., Chen, M.: A survey on Internet of Things from industrial market perspective. IEEE Access 2, 1660\u20131679 (2014)","journal-title":"IEEE Access"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Tirkel, A.Z., Osborne, C.F., Van Schyndel, R.G.: Image watermarking-a spread spectrum application. In: Proceedings of ISSSTA 1995 International Symposium on Spread Spectrum Techniques and Applications, Mainz, Germany, 25 September, vol. 2, pp. 785\u2013789. IEEE Press, Piscataway (1996)","DOI":"10.1109\/ISSSTA.1996.563231"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/ACCESS.2015.2398734","volume":"3","author":"G Verma","year":"2015","unstructured":"Verma, G., Yu, P., Sadler, B.M.: Physical layer authentication via fingerprint embedding using software-defined radios. IEEE Access 3, 81\u201388 (2015)","journal-title":"IEEE Access"},{"issue":"8","key":"3_CR14","doi-asserted-by":"publisher","first-page":"2307","DOI":"10.1109\/TCYB.2017.2740309","volume":"48","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Zhu, G., Kwong, S., Shi, Y.: A study on the security levels of spread-spectrum embedding schemes in the WOA framework. IEEE Trans. Cybern. 48(8), 2307\u20132320 (2018)","journal-title":"IEEE Trans. Cybern."},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Xiao, L., Greenstein, L., Mandayam, N., Trappe, W.: Fingerprints in the ether: using the physical layer for wireless authentication. In: Proceedings of 2007 IEEE International Conference on Communications, Glasgow, UK, 24\u201328 June, pp. 4646\u20134651. IEEE Press, Piscataway (2007)","DOI":"10.1109\/ICC.2007.767"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"14749","DOI":"10.1109\/ACCESS.2017.2726552","volume":"5","author":"X Xie","year":"2017","unstructured":"Xie, X., Xu, Z., Xie, H.: Channel capacity analysis of spread spectrum watermarking in radio frequency signals. IEEE Access 5, 14749\u201314756 (2017)","journal-title":"IEEE Access"},{"issue":"7","key":"3_CR17","doi-asserted-by":"publisher","first-page":"1068","DOI":"10.1109\/LSP.2017.2710144","volume":"24","author":"Z Xu","year":"2017","unstructured":"Xu, Z., Yuan, W.: Watermark BER and channel capacity analysis for QPSK-based RF watermarking by constellation dithering in AWGN channel. IEEE Signal Process. Lett. 24(7), 1068\u20131072 (2017)","journal-title":"IEEE Signal Process. Lett."},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Yang, B., Zhang, L., Qiao, D., Zhao, G., Imran, M.A.: Narrowband Internet of Things (NB-IoT) and LTE systems co-existence analysis. In: Proceedings of IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136 (2018)","DOI":"10.1109\/GLOCOM.2018.8647484"},{"issue":"1","key":"3_CR19","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/TIFS.2007.916273","volume":"3","author":"PL Yu","year":"2008","unstructured":"Yu, P.L., Baras, J.S., Sadler, B.M.: Physical-layer authentication. IEEE Trans. Inf. Forensics Security 3(1), 38\u201351 (2008)","journal-title":"IEEE Trans. Inf. Forensics Security"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Yu, Z., Jingyong, X., Yongxiang, L., Yong, C., Qiongli, L.: A spectrum watermark embedding and extracting method based on spread spectrum technique. In: Proceedings of 2016 IEEE International Conference on Electronic Information and Communication Technology (ICEICT), pp. 16\u201322 (2016)","DOI":"10.1109\/ICEICT.2016.7879644"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T06:31:45Z","timestamp":1723789905000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}