{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:45:29Z","timestamp":1740123929847,"version":"3.37.3"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,10,6]],"date-time":"2020-10-06T00:00:00Z","timestamp":1601942400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,6]],"date-time":"2020-10-06T00:00:00Z","timestamp":1601942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11235-020-00724-3","type":"journal-article","created":{"date-parts":[[2020,10,6]],"date-time":"2020-10-06T23:07:10Z","timestamp":1602025630000},"page":"403-422","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Message authentication algorithm for OFDM communication systems"],"prefix":"10.1007","volume":"76","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0234-4419","authenticated-orcid":false,"given":"Reem","family":"Melki","sequence":"first","affiliation":[]},{"given":"Hassan N.","family":"Noura","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Hernandez Fernandez","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,6]]},"reference":[{"key":"724_CR1","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.phycom.2018.12.001","volume":"32","author":"Y Acar","year":"2019","unstructured":"Acar, Y., & Cooklev, T. (2019). High performance OFDM with index modulation. Physical Communication, 32, 192\u2013199.","journal-title":"Physical Communication"},{"key":"724_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.phycom.2018.10.008","volume":"32","author":"R Melki","year":"2019","unstructured":"Melki, R., Noura, H., Mansour, M., & Chehab, A. (2019). A survey on OFDM physical layer security. Physical Communication, 32, 1\u201330.","journal-title":"Physical Communication"},{"issue":"1","key":"724_CR3","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/JIOT.2018.2846578","volume":"6","author":"R Melki","year":"2018","unstructured":"Melki, R., Noura, H., Mansour, M., & Chehab, A. (2018). An efficient OFDM-based encryption scheme using a dynamic key approach. IEEE Internet of Things Journal, 6(1), 361\u2013378.","journal-title":"IEEE Internet of Things Journal"},{"key":"724_CR4","first-page":"1","volume":"24","author":"H Noura","year":"2018","unstructured":"Noura, H., Melki, R., Chehab, A., & Mansour, M. (2018). A physical encryption scheme for low-power wireless M2M devices: A dynamic key approach. Mobile Networks and Applications, 24, 1\u201317.","journal-title":"Mobile Networks and Applications"},{"key":"724_CR5","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.comnet.2016.06.021","volume":"109","author":"N Tippenhauer","year":"2016","unstructured":"Tippenhauer, N., Rasmussen, K., & Capkun, S. (2016). Physical-layer integrity for wireless messages. Computer Networks, 109, 31\u201338.","journal-title":"Computer Networks"},{"issue":"4","key":"724_CR6","doi-asserted-by":"publisher","first-page":"1567","DOI":"10.1109\/SURV.2013.021313.00164","volume":"15","author":"Y Rahmatallah","year":"2013","unstructured":"Rahmatallah, Y., & Mohan, S. (2013). Peak-to-average power ratio reduction in OFDM systems: A survey and taxonomy. IEEE Communications Surveys & Tutorials, 15(4), 1567\u20131592.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"724_CR7","unstructured":"Prasad, R. (2004) OFDM for wireless communications systems. Artech House."},{"issue":"6","key":"724_CR8","doi-asserted-by":"publisher","first-page":"3775","DOI":"10.1109\/TWC.2017.2688405","volume":"16","author":"H Rahbari","year":"2017","unstructured":"Rahbari, H., & Krunz, M. (2017). Exploiting frame preamble waveforms to support new physical-layer functions in OFDM-based 80211 systems. IEEE Transactions on Wireless Communications, 16(6), 3775\u20133786.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"724_CR9","doi-asserted-by":"crossref","unstructured":"Franzin, R., et al. (2017). A performance comparison between OFDM and FBMC in PLC applications. In IEEE international conference on ecuador technical chapters meeting (ETCM). IEEE.","DOI":"10.1109\/ETCM.2017.8247476"},{"key":"724_CR10","doi-asserted-by":"crossref","unstructured":"Moles-Cases, V., et. al. (2017). A comparison of OFDM, QAM-FBMC, and OQAM-FBMC waveforms subject to phase noise. In Proceedings of IEEE international conference on communications (ICC) (pp. 1\u20136). IEEE.","DOI":"10.1109\/ICC.2017.7997301"},{"key":"724_CR11","unstructured":"Surnilla, G., & Surnilla, K. (2019). Method and apparatus for vehicular communication, September\u00a05. US Patent App. 15\/910,946."},{"key":"724_CR12","doi-asserted-by":"publisher","first-page":"100179","DOI":"10.1016\/j.vehcom.2019.100179","volume":"19","author":"M Arif","year":"2019","unstructured":"Arif, M., et al. (2019). A survey on security attacks in VANETs: Communication, applications and challenges. Vehicular Communications, 19, 100179.","journal-title":"Vehicular Communications"},{"key":"724_CR13","unstructured":"PRIME\u00a0Alliance TWG. Specification for powerline intelligent metering evolution. R1.3.6, April 2013."},{"key":"724_CR14","unstructured":"PRIME Alliance TWG. (2014). Specification for powerline intelligent metering. Evolution, R1, 4."},{"key":"724_CR15","doi-asserted-by":"crossref","unstructured":"Naik, P., & Murthy, K. (2019) Framework for controlling interference and power consumption on femto-cells in-wireless system. In Proceedings of the computational methods in systems and software (pp. 199\u2013208). Springer.","DOI":"10.1007\/978-3-030-30329-7_19"},{"issue":"6","key":"724_CR16","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MWC.2014.7000982","volume":"21","author":"T Adame","year":"2014","unstructured":"Adame, T., Bel, A., Bellalta, B., Barcelo, J., & Oliver, M. (2014). IEEE 802.11 ah: The WiFi approach for M2M communications. IEEE Wireless Communications, 21(6), 144\u2013152.","journal-title":"IEEE Wireless Communications"},{"issue":"2","key":"724_CR17","first-page":"480","volume":"6","author":"M Chen","year":"2012","unstructured":"Chen, M., Wan, J., & Li, F. (2012). Machine-to-machine communications: Architectures, standards and applications. KSII Transactions on Internet & Information Systems, 6(2), 480\u2013497.","journal-title":"KSII Transactions on Internet & Information Systems"},{"key":"724_CR18","doi-asserted-by":"crossref","unstructured":"Jiang, D., & Delgrossi, L. (2008). IEEE 802.11 p: Towards an international standard for wireless access in vehicular environments. In IEEE Transactions on Vehicular Technology (VTC Spring) (pp. 2036\u20132040). IEEE.","DOI":"10.1109\/VETECS.2008.458"},{"key":"724_CR19","unstructured":"Chang, K., & Mason, B. (2012). The IEEE 802.15. 4G standard for smart metering utility networks. In Proceedings IEEE international conference smart grid communications (SmartGridComm) (pp. 476\u2013480). IEEE."},{"key":"724_CR20","doi-asserted-by":"crossref","unstructured":"Mangalvedhe, N., Ratasuk, R., & Ghosh, A. (2016) NB-IoT deployment study for low power wide area cellular IoT. In Proceedings of IEEE annual international symposium on personal, indoor, and mobile radio communications (PIMRC) (pp. 1\u20136). IEEE.","DOI":"10.1109\/PIMRC.2016.7794567"},{"key":"724_CR21","unstructured":"G\u00a0ITU. 9960, unified high-speed wire-line based home networking transceivers-system architecture and physical layer specification, 2010."},{"key":"724_CR22","unstructured":"Unified High-Speed Wireline-Based Home. Networking transceivers-data link layer specification."},{"key":"724_CR23","unstructured":"HOME\u00a0PLUG ALLIANCE. Homeplug 1.0 technology white paper, 2005, 2014."},{"key":"724_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/892628","volume":"2013","author":"L Yonge","year":"2013","unstructured":"Yonge, L., et al. (2013). An overview of the HomePlug AV2 technology. Journal of Electrical and Computer Engineering, 2013, 1\u201320.","journal-title":"Journal of Electrical and Computer Engineering"},{"key":"724_CR25","first-page":"1","volume":"2018","author":"H Guo","year":"2018","unstructured":"Guo, H., Chen, C., Gao, Y., Li, X., & Jin, J. (2018). A secure three-factor multiserver authentication protocol against the honest-but-curious servers. Wireless Communications and Mobile Computing, 2018, 1\u201314.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"724_CR26","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.cose.2018.10.012","volume":"86","author":"G Ohtake","year":"2019","unstructured":"Ohtake, G., Safavi-Naini, R., & Zhang, L. (2019). Outsourcing scheme of ABE encryption secure against malicious adversary. Computers & Security, 86, 437\u2013452.","journal-title":"Computers & Security"},{"issue":"1","key":"724_CR27","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/MNET.2018.1700392","volume":"33","author":"D Chen","year":"2019","unstructured":"Chen, D., Zhang, N., Lu, R., Cheng, N., Zhang, K., & Qin, Z. (2019). Channel precoding based message authentication in wireless networks: Challenges and solutions. IEEE Network, 33(1), 99\u2013105.","journal-title":"IEEE Network"},{"issue":"5","key":"724_CR28","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/TDSC.2018.2846258","volume":"17","author":"D Chen","year":"2020","unstructured":"Chen, D., Zhang, N., Cheng, N., Zhang, K., Qin, Z., & Shen, X. (2020). Physical layer based message authentication with secure channel codes. IEEE Transactions on Dependable and Secure Computing, 17(5), 1079\u20131093.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"724_CR29","doi-asserted-by":"crossref","unstructured":"Iwata, T., et\u00a0al. (2017). ZMAC: A fast tweakable block cipher mode for highly secure message authentication. In Annual international cryptology conference (pp. 34\u201365). Springer.","DOI":"10.1007\/978-3-319-63697-9_2"},{"key":"724_CR30","doi-asserted-by":"crossref","unstructured":"Kuwakado, H., Hirose, S., & Mambo, M. (2018). Parallelizable message preprocessing for merkle-damg\u00e5rd hash functions. In Proceedings of IEEE international symposium on information theory and its applications (ISITA) (pp. 457\u2013461). IEEE.","DOI":"10.23919\/ISITA.2018.8664401"},{"key":"724_CR31","doi-asserted-by":"crossref","unstructured":"Hosoyamada, A., & Yasuda, K. (2018). Building quantum-one-way functions from block ciphers: Davies\u2013Meyer and Merkle\u2013Damg\u00e5rd constructions. In International conference on the theory and application of cryptology and information security (pp. 275\u2013304). Springer.","DOI":"10.1007\/978-3-030-03326-2_10"},{"issue":"2\u20133","key":"724_CR32","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1504\/IJIIDS.2018.092001","volume":"11","author":"Y Chen","year":"2018","unstructured":"Chen, Y., et al. (2018). A publicly verifiable network coding scheme with null-space HMAC. International Journal of Intelligent Information and Database Systems, 11(2\u20133), 117\u2013131.","journal-title":"International Journal of Intelligent Information and Database Systems"},{"issue":"3","key":"724_CR33","doi-asserted-by":"publisher","first-page":"16","DOI":"10.4018\/IJISP.2018070102","volume":"12","author":"B Echandouri","year":"2018","unstructured":"Echandouri, B., Omary, F., Ziani, F., & Sadak, A. (2018). SEC-CMAC a new message authentication code based on the symmetrical evolutionist ciphering algorithm. International Journal of Information Security and Privacy (IJISP), 12(3), 16\u201326.","journal-title":"International Journal of Information Security and Privacy (IJISP)"},{"key":"724_CR34","doi-asserted-by":"crossref","unstructured":"Sung, B., Kim, K., & Shin, K. (2018). An AES-GCM authenticated encryption crypto-core for IOT security. In International conference on electronics, information, and communication (ICEIC) (pp. 1\u20133). IEEE.","DOI":"10.23919\/ELINFOCOM.2018.8330586"},{"key":"724_CR35","doi-asserted-by":"crossref","unstructured":"Kumar, N., & Chaudhary, P. (2018) Password security using bcrypt with AES encryption algorithm. In Smart computing and informatics (pp. 385\u2013392). Springer.","DOI":"10.1007\/978-981-10-5544-7_37"},{"key":"724_CR36","unstructured":"Nairn, D., et\u00a0al. (2019). Authenticating messages sent over a vehicle bus that include message authentication codes. US Patent App. 10\/211,990."},{"key":"724_CR37","doi-asserted-by":"crossref","unstructured":"Gribanova, I., Semenov, A. (2018). Using automatic generation of relaxation constraints to improve the preimage attack on 39-step MD4. In International convention on information and communication technology, electronics and microelectronics (MIPRO) (pp. 1174\u20131179). IEEE.","DOI":"10.23919\/MIPRO.2018.8400213"},{"key":"724_CR38","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.procs.2018.04.211","volume":"131","author":"Y Tian","year":"2018","unstructured":"Tian, Y., Zhang, K., Wang, P., Zhang, Y., & Yang, J. (2018). Add salt MD5 algorithm\u2019s FPGA implementation. Procedia Computer Science, 131, 255\u2013260.","journal-title":"Procedia Computer Science"},{"issue":"4","key":"724_CR39","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1109\/TDSC.2018.2878697","volume":"17","author":"A Visconti","year":"2020","unstructured":"Visconti, A., & Gorla, F. (2020). Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2. IEEE Transactions on Dependable and Secure Computing, 17(4), 775\u2013781.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"724_CR40","unstructured":"Yap, K., et\u00a0al. (2018). Method and apparatus to process SHA-2 secure hashing algorithm, December\u00a04 . US Patent App. 10\/146,544."},{"issue":"7","key":"724_CR41","doi-asserted-by":"publisher","first-page":"1752","DOI":"10.1109\/TIFS.2018.2790938","volume":"13","author":"P Luo","year":"2018","unstructured":"Luo, P., Athanasiou, K., Fei, Y., & Wahl, T. (2018). Algebraic fault analysis of SHA-3 under relaxed fault models. IEEE Transactions on Information Forensics and Security, 13(7), 1752\u20131761.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"724_CR42","unstructured":"Noura, H. (2012). Conception et simulation des g\u00e9n\u00e9rateurs, crypto-syst\u00e8mes et fonctions de hachage bas\u00e9s chaos performants. PhD thesis, universit\u00e9 de Nantes."},{"key":"724_CR43","doi-asserted-by":"crossref","unstructured":"Noura, H., et al. (2018). Efficient and secure physical encryption scheme for low-power wireless M2M devices. In IWCMC security symposium, Limassol, Cyprus","DOI":"10.1109\/IWCMC.2018.8450330"},{"key":"724_CR44","first-page":"1","volume":"2019","author":"R Melki","year":"2019","unstructured":"Melki, R., Noura, H., & Chehab, A. (2019). Lightweight multi-factor mutual authentication protocol for IoT devices. International Journal of Information Security, 2019, 1\u201316.","journal-title":"International Journal of Information Security"},{"key":"724_CR45","doi-asserted-by":"publisher","first-page":"18383","DOI":"10.1007\/s11042-018-5660-y","volume":"77","author":"H Noura","year":"2018","unstructured":"Noura, H., Chehab, A., Sleem, L., Noura, M., Couturier, R., & Mansour, M. M. (2018). One round cipher algorithm for multimedia IoT devices. Multimedia Tools and Applications, 77, 18383\u201318413.","journal-title":"Multimedia Tools and Applications"},{"key":"724_CR46","volume-title":"Handbook of Applied Cryptography","author":"A Menezes","year":"1996","unstructured":"Menezes, A., et al. (1996). Handbook of Applied Cryptography. Boca Raton: CRC Press."},{"key":"724_CR47","doi-asserted-by":"crossref","unstructured":"Rupanagudi, S., et\u00a0al. (2019). A further optimized mix column architecture design for the advanced encryption standard. In Proceedings IEEE international conference on knowledge and smart technology (KST) (pp. 181\u2013185). IEEE.","DOI":"10.1109\/KST.2019.8687545"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-020-00724-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-020-00724-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-020-00724-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T08:50:56Z","timestamp":1633510256000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-020-00724-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,6]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["724"],"URL":"https:\/\/doi.org\/10.1007\/s11235-020-00724-3","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[2020,10,6]]},"assertion":[{"value":"21 September 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2020","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}