{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:39:11Z","timestamp":1776076751749,"version":"3.50.1"},"reference-count":189,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T00:00:00Z","timestamp":1669593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T00:00:00Z","timestamp":1669593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["5012"],"award-info":[{"award-number":["5012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network function or architecture. However, this approach cannot clearly divide the relation between threats and secure communication measures for a highly integrated network. Furthermore, it will lead to overlapping in segregation of secure duties. This paper presents a comprehensive review of threats and corresponding solutions in SIN from the perspective of network security attributes. In order to make the analysis applicable to more scenarios, the following three most essential attributes, confidentiality, integrity and availability, are selected as the threatened objectives. At the same time, for cross-reference with the analysis based on network function or architecture, this paper relates network layers to network security attributes through secure communication mechanisms. Specifically, the confidentiality includes confidential information-exchange and Authentication and Key Agreement (AKA), the integrity includes information identification and information restoration, and the availability includes link establishment, routing mechanism, and mobility management. According to above framework, this paper provides a cross-layer perspective for analyzing threat and enhancing the security and stability of SIN. Finally, this paper concludes with a summary of challenges and future work in SIN.<\/jats:p>","DOI":"10.1007\/s40747-022-00899-z","type":"journal-article","created":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T09:07:29Z","timestamp":1669626449000},"page":"3429-3468","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["Threat analysis for space information network based on network security attributes: a review"],"prefix":"10.1007","volume":"9","author":[{"given":"Xuesong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Ye","family":"Du","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Junyan","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Runfang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Tianshuai","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,28]]},"reference":[{"issue":"3","key":"899_CR1","doi-asserted-by":"crossref","first-page":"5485","DOI":"10.1109\/JIOT.2019.2902907","volume":"6","author":"K Xue","year":"2019","unstructured":"Xue K, Meng W, Li S et al (2019) A secure and efficient access and handover authentication protocol for internet of things in space information networks. IEEE Internet Things J 6(3):5485\u20135499","journal-title":"IEEE Internet Things J"},{"key":"899_CR2","doi-asserted-by":"crossref","unstructured":"Kassing S, Bhattacherjee D, \u00c1guas AB et al (2020) Exploring the \u201cinternet from space\u201d with hypatia. In: IMC \u201920: ACM Internet Measurement Conference. Virtual Event, USA, October 27\u201329, 2020. ACM, USA, pp 214\u2013229","DOI":"10.1145\/3419394.3423635"},{"issue":"3","key":"899_CR3","doi-asserted-by":"crossref","first-page":"1839","DOI":"10.1109\/COMST.2020.2990499","volume":"22","author":"N Saeed","year":"2020","unstructured":"Saeed N, Elzanaty A, Almorad H et al (2020) Cubesat communications: recent advances and future challenges. IEEE Commun Surv Tutor 22(3):1839\u20131862","journal-title":"IEEE Commun Surv Tutor"},{"key":"899_CR4","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1145\/3422604.3425926","volume-title":"HotNets \u201920: The 19th ACM Workshop on Hot Topics in Networks, Virtual Event, USA, November 4\u20136, 2020","author":"D Vasisht","year":"2020","unstructured":"Vasisht D, Chandra R (2020) A distributed and hybrid ground station network for low earth orbit satellites. In: Zhao B, Zheng H, Madhyastha HV, Padmanabhan VN (eds) HotNets \u201920: The 19th ACM Workshop on Hot Topics in Networks, Virtual Event, USA, November 4\u20136, 2020. ACM, USA, pp 190\u2013196"},{"issue":"3","key":"899_CR5","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/s13437-018-0151-6","volume":"17","author":"M Fournier","year":"2018","unstructured":"Fournier M, Casey Hilliard R, Rezaee S et al (2018) Past, present, and future of the satellite-based automatic identification system: areas of applications (2004\u20132016). WMU J Marit Aff 17(3):311\u2013345","journal-title":"WMU J Marit Aff"},{"issue":"4","key":"899_CR6","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1504\/IJEM.2012.051647","volume":"8","author":"S Kose","year":"2012","unstructured":"Kose S, Koytak E, Hascicek YS (2012) An overview on the use of satellite communications for disaster management and emergency response. Int J Emerg Manage 8(4):350\u2013382","journal-title":"Int J Emerg Manage"},{"issue":"4","key":"899_CR7","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1007\/s11036-017-0955-1","volume":"23","author":"K Sohraby","year":"2018","unstructured":"Sohraby K, Minoli D, Occhiogrosso B et al (2018) A review of wireless and satellite-based m2m\/iot services in support of smart grids. Mob Netw Appl 23(4):881\u2013895","journal-title":"Mob Netw Appl"},{"issue":"6","key":"899_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-019-2928-9","volume":"64","author":"C Wang","year":"2021","unstructured":"Wang C, Zhang Z, Wu J et al (2021) An overview of protected satellite communications in intelligent age. Sci China Inf Sci 64(6):1\u201318","journal-title":"Sci China Inf Sci"},{"issue":"2","key":"899_CR9","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1109\/SURV.2012.062612.00134","volume":"15","author":"J Mukherjee","year":"2012","unstructured":"Mukherjee J, Ramamurthy B (2012) Communication technologies and architectures for space network and interplanetary internet. IEEE Commun Surv Tutor 15(2):881\u2013897","journal-title":"IEEE Commun Surv Tutor"},{"key":"899_CR10","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1145\/3422604.3425937","volume-title":"HotNets \u201920: The 19th ACM Workshop on Hot Topics in Networks, Virtual Event, USA, November 4\u20136, 2020","author":"D Bhattacherjee","year":"2020","unstructured":"Bhattacherjee D, Kassing S, Licciardello M et al (2020) In-orbit computing: an outlandish thought experiment? In: Zhao B, Zheng H, Madhyastha HV, Padmanabhan VN (eds) HotNets \u201920: The 19th ACM Workshop on Hot Topics in Networks, Virtual Event, USA, November 4\u20136, 2020. ACM, USA, pp 197\u2013204"},{"issue":"3","key":"899_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/BF03391565","volume":"1","author":"Q Yu","year":"2016","unstructured":"Yu Q, Wang J, Bai L (2016) Architecture and critical technologies of space information networks. J Commun Inform Netw 1(3):1\u20139","journal-title":"J Commun Inform Netw"},{"issue":"9","key":"899_CR12","doi-asserted-by":"crossref","first-page":"1907","DOI":"10.1109\/JSAC.2018.2864423","volume":"36","author":"X Cao","year":"2018","unstructured":"Cao X, Yang P, Alzenad M et al (2018) Airborne communication networks: a survey. IEEE J Sel Areas Commun 36(9):1907\u20131926","journal-title":"IEEE J Sel Areas Commun"},{"issue":"4","key":"899_CR13","first-page":"1","volume":"61","author":"P Wan","year":"2018","unstructured":"Wan P, Zhan Y, Pan X (2018) Solar system interplanetary communication networks: architectures, technologies and developments. Sci China Inf Sci 61(4):1\u201326","journal-title":"Sci China Inf Sci"},{"issue":"3","key":"899_CR14","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/BF03391570","volume":"1","author":"L Gou","year":"2016","unstructured":"Gou L, Zhang G, Zhang W et al (2016) Cluster-based architecture and network model for interplanetary internet. J Commun Inform Netw 1(3):51\u201366","journal-title":"J Commun Inform Netw"},{"key":"899_CR15","doi-asserted-by":"crossref","first-page":"27677","DOI":"10.1109\/ACCESS.2019.2902134","volume":"7","author":"Z Qu","year":"2019","unstructured":"Qu Z, Zhang G, Hong T et al (2019) Architecture and network model of time-space uninterrupted space information network. IEEE Access 7:27677\u201327688","journal-title":"IEEE Access"},{"key":"899_CR16","doi-asserted-by":"crossref","unstructured":"Fraire JA, C\u00e9spedes S, Accettura N (2019) Direct-to-satellite iot-a survey of the state of the art and future research perspectives. In: International Conference on Ad-Hoc Networks and Wireless. Springer, New York, pp 241\u2013258","DOI":"10.1007\/978-3-030-31831-4_17"},{"key":"899_CR17","doi-asserted-by":"crossref","first-page":"1505","DOI":"10.1109\/OJCOMS.2021.3093110","volume":"2","author":"N Saeed","year":"2021","unstructured":"Saeed N, Almorad H, Dahrouj H et al (2021) Point-to-point communication in integrated satellite-aerial 6g networks: state-of-the-art and future challenges. IEEE Open J Commun Soc 2:1505\u20131525","journal-title":"IEEE Open J Commun Soc"},{"issue":"4","key":"899_CR18","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/JSAC.2020.3018824","volume":"39","author":"Z Jia","year":"2020","unstructured":"Jia Z, Sheng M, Li J et al (2020) Joint hap access and leo satellite backhaul in 6g: matching game-based approaches. IEEE J Sel Areas Commun 39(4):1147\u20131159","journal-title":"IEEE J Sel Areas Commun"},{"key":"899_CR19","doi-asserted-by":"crossref","unstructured":"Sinha K, Sinha BP (2021) Challenged networks to challenged computing: an untapped potential for future space exploration. In: 2021 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE), IEEE, pp 14\u201319","DOI":"10.1109\/WiSEE50203.2021.9613830"},{"issue":"8","key":"899_CR20","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54(8):1355\u20131387","journal-title":"Bell Syst Tech J"},{"issue":"11","key":"899_CR21","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.3390\/e22111261","volume":"22","author":"A Sanenga","year":"2020","unstructured":"Sanenga A, Mapunda GA, Jacob TML et al (2020) An overview of key technologies in physical layer security. Entropy 22(11):1261","journal-title":"Entropy"},{"key":"899_CR22","doi-asserted-by":"crossref","first-page":"165444","DOI":"10.1109\/ACCESS.2020.3022294","volume":"8","author":"Z Wu","year":"2020","unstructured":"Wu Z, Zhang Y, Yang Y et al (2020) Spoofing and anti-spoofing technologies of global navigation satellite system: A survey. IEEE Access 8:165444\u2013165496","journal-title":"IEEE Access"},{"issue":"8","key":"899_CR23","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.3390\/s19081947","volume":"19","author":"T Ferrer","year":"2019","unstructured":"Ferrer T, C\u00e9spedes S, Becerra A (2019) Review and evaluation of mac protocols for satellite iot systems using nanosatellites. Sensors 19(8):1947","journal-title":"Sensors"},{"key":"899_CR24","volume":"145","author":"Y Yan","year":"2019","unstructured":"Yan Y, Han G, Xu H (2019) A survey on secure routing protocols for satellite network. J Netw Comput Appl 145:102415","journal-title":"J Netw Comput Appl"},{"key":"899_CR25","doi-asserted-by":"crossref","unstructured":"Darwish T, Kurt G, Yanikomeroglu H et al (2021) Location management in ip-based future leo satellite networks: a review. arXiv:2101.08336","DOI":"10.1109\/OJCOMS.2022.3185097"},{"issue":"2","key":"899_CR26","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/SURV.2009.090203","volume":"11","author":"R Wang","year":"2009","unstructured":"Wang R, Taleb T, Jamalipour A et al (2009) Protocols for reliable data transport in space internet. IEEE Commun Surv Tutor 11(2):21\u201332","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"899_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-021-01638-z","volume":"11","author":"M Zhuo","year":"2021","unstructured":"Zhuo M, Liu L, Zhou S et al (2021) Survey on security issues of routing and anomaly detection for space information networks. Sci Rep 11(1):1\u201318","journal-title":"Sci Rep"},{"issue":"3","key":"899_CR28","doi-asserted-by":"crossref","first-page":"213","DOI":"10.23919\/ICN.2021.0015","volume":"2","author":"F Fourati","year":"2021","unstructured":"Fourati F, Alouini M-S (2021) Artificial intelligence for satellite communication: a review. Intell Converg Netw 2(3):213\u2013243","journal-title":"Intell Converg Netw"},{"issue":"8","key":"899_CR29","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MCOM.2015.7180512","volume":"53","author":"C Jiang","year":"2015","unstructured":"Jiang C, Wang X, Wang J et al (2015) Security in space information networks. IEEE Commun Mag 53(8):82\u201388","journal-title":"IEEE Commun Mag"},{"key":"899_CR30","unstructured":"CCSDS: The application of security to ccsds protocols. Informational report, CCSDS (2019)"},{"issue":"6","key":"899_CR31","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MWC.2005.1561945","volume":"12","author":"A Roy-Chowdhury","year":"2005","unstructured":"Roy-Chowdhury A, Baras JS, Hadjitheodosiou M et al (2005) Security issues in hybrid networks with a satellite component. IEEE Wirel Commun 12(6):50\u201361","journal-title":"IEEE Wirel Commun"},{"key":"899_CR32","doi-asserted-by":"crossref","unstructured":"Pavur J, Moser D, Lenders V, et al. (2019) Secrets in the sky: on privacy and infrastructure security in dvb-s satellite broadband. In: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, ACM, Miami, Florida, USA, pp 277\u2013284","DOI":"10.1145\/3317549.3323418"},{"key":"899_CR33","doi-asserted-by":"crossref","unstructured":"Jeon S, Choi JP (2019) Cfb-aes-turbo: joint encryption and channel coding for secure satellite data transmission. In: ICC 2019-2019 IEEE International Conference on Communications (ICC), IEEE, pp 1\u20137","DOI":"10.1109\/ICC.2019.8762018"},{"key":"899_CR34","unstructured":"Z\u2019aba MR, Jamil N, Rohmad MS, et al. (2019) The cilipadi family of lightweight authenticated encryption. A Submission to the NIST Lightweight Cryptography Standardization Process"},{"key":"899_CR35","doi-asserted-by":"crossref","unstructured":"Dusart P, Letourneux G, Vivolo O (2003) Differential fault analysis on aes. In: International Conference on Applied Cryptography and Network Security. Springer, New York, pp 293\u2013306","DOI":"10.1007\/978-3-540-45203-4_23"},{"key":"899_CR36","doi-asserted-by":"crossref","unstructured":"Shor PW (1994) Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, IEEE, pp 124\u2013134","DOI":"10.1109\/SFCS.1994.365700"},{"issue":"2","key":"899_CR37","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","volume":"79","author":"LK Grover","year":"1997","unstructured":"Grover LK (1997) Quantum mechanics helps in searching for a needle in a haystack. Phys Rev Lett 79(2):325","journal-title":"Phys Rev Lett"},{"issue":"3","key":"899_CR38","doi-asserted-by":"crossref","first-page":"301","DOI":"10.23919\/JCIN.2021.9549124","volume":"6","author":"J Guo","year":"2021","unstructured":"Guo J, Du Y, Wu X et al (2021) An anti-quantum authentication protocol for space information networks based on ring learning with errors. J Commun Inform Netw 6(3):301\u2013311","journal-title":"J Commun Inform Netw"},{"key":"899_CR39","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.jcss.2021.12.004","volume":"126","author":"N Andola","year":"2022","unstructured":"Andola N, Prakash S, Yadav VK et al (2022) A secure searchable encryption scheme for cloud using hash-based indexing. J Comput Syst Sci 126:119\u2013137","journal-title":"J Comput Syst Sci"},{"issue":"4","key":"899_CR40","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1109\/TDSC.2007.70214","volume":"4","author":"M Haleem","year":"2007","unstructured":"Haleem M, Mathur C, Chandramouli R et al (2007) Opportunistic encryption: a trade-off between security and throughput in wireless networks. IEEE Trans Dependable Secure Comput 4(4):313\u2013324","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"899_CR41","doi-asserted-by":"crossref","unstructured":"Fritzmann T, P\u00f6ppelmann T, Sepulveda J (2018) Analysis of error-correcting codes for lattice-based key exchange. In: International Conference on Selected Areas in Cryptography. Springer, New York, pp 369\u2013390","DOI":"10.1007\/978-3-030-10970-7_17"},{"issue":"9","key":"899_CR42","first-page":"2622","volume":"84","author":"C-L Lin","year":"2001","unstructured":"Lin C-L, Sun H-M, Hwang T (2001) Attacks and solutions on strong-password authentication. IEICE Trans Commun 84(9):2622\u20132627","journal-title":"IEICE Trans Commun"},{"key":"899_CR43","doi-asserted-by":"crossref","unstructured":"Kim SY, Kim H, Lee DH (2015) An efficient id-based mutual authentication secure against privileged-insider attack. In: 2015 5th International Conference on IT Convergence and Security (ICITCS), IEEE, pp 1\u20134","DOI":"10.1109\/ICITCS.2015.7292941"},{"issue":"2","key":"899_CR44","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1109\/TDSC.2017.2764083","volume":"17","author":"M Wazid","year":"2017","unstructured":"Wazid M, Das AK, Odelu V et al (2017) Secure remote user authenticated key establishment protocol for smart home environment. IEEE Trans Dependable Secure Comput 17(2):391\u2013406","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"1","key":"899_CR45","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1145\/1044552.1044560","volume":"39","author":"Y-F Chang","year":"2005","unstructured":"Chang Y-F, Chang C-C (2005) An efficient authentication protocol for mobile satellite communication systems. ACM SIGOPS Oper Syst Rev 39(1):70\u201384","journal-title":"ACM SIGOPS Oper Syst Rev"},{"issue":"2","key":"899_CR46","doi-asserted-by":"crossref","first-page":"898","DOI":"10.1007\/s12083-020-01050-w","volume":"14","author":"J Guo","year":"2021","unstructured":"Guo J, Du Y (2021) A secure three-factor anonymous roaming authentication protocol using ECC for space information networks. Peer-to-Peer Netw Appl 14(2):898\u2013916","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"3","key":"899_CR47","doi-asserted-by":"crossref","first-page":"1977","DOI":"10.1007\/s11277-012-0918-6","volume":"71","author":"J-L Tsai","year":"2013","unstructured":"Tsai J-L, Lo N-W, Wu T-C (2013) A new password-based multi-server authentication scheme robust to password guessing attacks. Wireless Pers Commun 71(3):1977\u20131988","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"899_CR48","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.compeleceng.2008.05.003","volume":"35","author":"T-H Chen","year":"2009","unstructured":"Chen T-H, Lee W-B, Chen H-B (2009) A self-verification authentication mechanism for mobile satellite communication systems. Comput Electr Eng 35(1):41\u201348","journal-title":"Comput Electr Eng"},{"key":"899_CR49","doi-asserted-by":"crossref","unstructured":"Cruickshank H (1996) A security system for satellite networks. In: Fifth International Conference on Satellite Systems for Mobile Communications and Navigation, IET, pp 187\u2013190","DOI":"10.1049\/cp:19960437"},{"issue":"3","key":"899_CR50","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1002\/sat.1279","volume":"37","author":"M Qi","year":"2019","unstructured":"Qi M, Chen J, Chen Y (2019) A secure authentication with key agreement scheme using ECC for satellite communication systems. Int J Satell Commun Network 37(3):234\u2013244","journal-title":"Int J Satell Commun Network"},{"issue":"5","key":"899_CR51","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1109\/TIE.2006.881998","volume":"53","author":"C-C Lee","year":"2006","unstructured":"Lee C-C, Hwang M-S, Liao I-E (2006) Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Trans Industr Electron 53(5):1683\u20131687","journal-title":"IEEE Trans Industr Electron"},{"issue":"1","key":"899_CR52","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1002\/sat.1309","volume":"38","author":"S Xu","year":"2020","unstructured":"Xu S, Liu X, Ma M et al (2020) An improved mutual authentication protocol based on perfect forward secrecy for satellite communications. Int J Satell Commun Netw 38(1):62\u201373","journal-title":"Int J Satell Commun Netw"},{"issue":"4","key":"899_CR53","doi-asserted-by":"crossref","first-page":"2791","DOI":"10.1109\/JIOT.2019.2962553","volume":"7","author":"R Ma","year":"2019","unstructured":"Ma R, Cao J, Feng D et al (2019) Laa: lattice-based access authentication scheme for IOT in space information networks. IEEE Internet Things J 7(4):2791\u20132805","journal-title":"IEEE Internet Things J"},{"key":"899_CR54","doi-asserted-by":"crossref","unstructured":"Liu K, Wu W, Tang K, et al. (2017) Single receiver against repeater deception jamming technology research. In: China Satellite Navigation Conference, Springer, New York, pp 23\u201335","DOI":"10.1007\/978-981-10-4591-2_3"},{"key":"899_CR55","doi-asserted-by":"crossref","unstructured":"Yuan M, Lv Z, Chen H, et al (2017) An implementation of navigation message authentication with reserved bits for civil bds anti-spoofing. In: China Satellite Navigation Conference, Springer, New York, pp 69\u201380","DOI":"10.1007\/978-981-10-4591-2_6"},{"key":"899_CR56","doi-asserted-by":"crossref","unstructured":"Karlof C, Sastry N, Wagner D (2004) Tinysec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp 162\u2013175","DOI":"10.1145\/1031495.1031515"},{"issue":"6","key":"899_CR57","doi-asserted-by":"crossref","first-page":"1955","DOI":"10.1007\/s11036-019-01338-z","volume":"24","author":"J Liu","year":"2019","unstructured":"Liu J, Yang Z, Wu Z et al (2019) Control code multiple encryption algorithm on satellite-to-ground communication. Mob Netw Appl 24(6):1955\u20131974","journal-title":"Mob Netw Appl"},{"issue":"3","key":"899_CR58","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/LWC.2020.3035811","volume":"10","author":"Q-Y Fu","year":"2020","unstructured":"Fu Q-Y, Feng Y-H, Wang H-M et al (2020) Initial satellite access authentication based on doppler frequency shift. IEEE Wirel Commun Lett 10(3):498\u2013502","journal-title":"IEEE Wirel Commun Lett"},{"key":"899_CR59","unstructured":"Pirzada SJH, Xu T, Jianwei L (2020) Lightweight encryption algorithm implementation for internet of thing application. In: 2020 International Conference on Cyber Warfare and Security (ICCWS), IEEE, pp 1\u20136"},{"key":"899_CR60","unstructured":"B\u00f6ck H, Zauner A, Devlin S, et al (2016) Nonce-disrespecting adversaries: practical forgery attacks on GCM in TLS. In: 10th USENIX Workshop on Offensive Technologies (WOOT 16). USENIX Association, Austin, TX, USA"},{"key":"899_CR61","doi-asserted-by":"crossref","unstructured":"Junzhi L, Wanqing L, Qixiang F, et al (2019) Research progress of gnss spoofing and spoofing detection technology. In: 2019 IEEE 19th International Conference on Communication Technology (ICCT), IEEE, pp 1360\u20131369","DOI":"10.1109\/ICCT46805.2019.8947107"},{"issue":"4","key":"899_CR62","doi-asserted-by":"crossref","first-page":"922","DOI":"10.3390\/s19040922","volume":"19","author":"W Wang","year":"2019","unstructured":"Wang W, Li N, Wu R et al (2019) Detection of induced gnss spoofing using s-curve-bias. Sensors 19(4):922","journal-title":"Sensors"},{"key":"899_CR63","doi-asserted-by":"crossref","unstructured":"Zhang Y, Wang L, Wang W, et al (2014) Spoofing jamming suppression techniques for gps based on doa estimating. In: China Satellite Navigation Conference (CSNC) 2014 Proceedings: Volume I, Springer, New York, pp 683\u2013693","DOI":"10.1007\/978-3-642-54737-9_59"},{"key":"899_CR64","doi-asserted-by":"crossref","unstructured":"Purwar A, Joshi D, Chaubey VK (2016) Gps signal jamming and anti-jamming strategy-a theoretical analysis. In: 2016 IEEE Annual India Conference (INDICON), IEEE, pp 1\u20136","DOI":"10.1109\/INDICON.2016.7838933"},{"key":"899_CR65","doi-asserted-by":"crossref","unstructured":"Zhang R, Wu R, Jia Q (2018) A new technique for improving the anti-jamming performance of vector tracking loop. In: China Satellite Navigation Conference, Springer, pp 3\u201313","DOI":"10.1007\/978-981-13-0014-1_1"},{"issue":"2","key":"899_CR66","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1109\/COMST.2022.3159185","volume":"24","author":"H Pirayesh","year":"2022","unstructured":"Pirayesh H, Zeng H (2022) Jamming attacks and anti-jamming strategies in wireless networks: a comprehensive survey. IEEE Commun Surv Tutor 24(2):767\u2013809. https:\/\/doi.org\/10.1109\/COMST.2022.3159185","journal-title":"IEEE Commun Surv Tutor"},{"issue":"4","key":"899_CR67","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/SURV.2009.090404","volume":"11","author":"A Mpitziopoulos","year":"2009","unstructured":"Mpitziopoulos A, Gavalas D, Konstantopoulos C et al (2009) A survey on jamming attacks and countermeasures in wsns. IEEE Commun Surv Tutor 11(4):42\u201356","journal-title":"IEEE Commun Surv Tutor"},{"key":"899_CR68","doi-asserted-by":"crossref","unstructured":"Elezi E, \u00c7ankaya G, Boyac\u0131 A, et al (2019) The effect of electronic jammers on gps signals. In: 2019 16th International Multi-Conference on Systems, Signals & Devices (SSD), IEEE, pp 652\u2013656","DOI":"10.1109\/SSD.2019.8893239"},{"key":"899_CR69","doi-asserted-by":"crossref","unstructured":"Bolla P, Nurmi J, Won J-R, et al (2018) Joint tracking of multiple frequency signals from the same gnss satellite. In: 2018 8th International Conference on Localization and GNSS (ICL-GNSS), IEEE, pp 1\u20136","DOI":"10.1109\/ICL-GNSS.2018.8440906"},{"key":"899_CR70","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1109\/LAWP.2007.902049","volume":"6","author":"AD Panagopoulos","year":"2007","unstructured":"Panagopoulos AD, Anastasopoulos MP, Cottis PG (2007) Error performance of satellite links interfered by two adjacent satellites. IEEE Antennas Wirel Propag Lett 6:364\u2013367","journal-title":"IEEE Antennas Wirel Propag Lett"},{"issue":"6","key":"899_CR71","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MWC.2005.1561945","volume":"12","author":"A Roy-Chowdhury","year":"2005","unstructured":"Roy-Chowdhury A, Baras JS, Hadjitheodosiou M et al (2005) Security issues in hybrid networks with a satellite component. IEEE Wirel Commun 12(6):50\u201361","journal-title":"IEEE Wirel Commun"},{"key":"899_CR72","doi-asserted-by":"crossref","unstructured":"Peters EG, Day K, Benson CR (2020) A real-time doppler compensating physical\/data link layer protocol for satellite communications. In: 2020 IEEE Aerospace Conference, IEEE, pp 1\u201311","DOI":"10.1109\/AERO47225.2020.9172538"},{"key":"899_CR73","doi-asserted-by":"crossref","unstructured":"Tian X, Tian Z, Pham K, et al (2012) Jamming\/anti-jamming game with a cognitive jammer in space communication. In: Sensors and Systems for Space Applications V, vol. 8385, SPIE, pp 194\u2013203","DOI":"10.1117\/12.918798"},{"key":"899_CR74","unstructured":"Koide S, Misono S, Shimada N, et al (2005) Decision support system for rocket launch using semantic web services. In: Workshop on Activities on Semantic Web Technologies in Japan in the 14 International World Wide Web Conference"},{"issue":"8","key":"899_CR75","doi-asserted-by":"crossref","first-page":"1092","DOI":"10.1080\/17517575.2019.1669828","volume":"15","author":"M Li","year":"2021","unstructured":"Li M, Wang L, Zhang Y (2021) A framework for rocket and satellite launch information management systems based on blockchain technology. Enterp Inform Syst 15(8):1092\u20131106","journal-title":"Enterp Inform Syst"},{"issue":"3","key":"899_CR76","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1109\/TEMC.2012.2234753","volume":"55","author":"R Hoad","year":"2013","unstructured":"Hoad R, Radasky WA (2013) Progress in high-altitude electromagnetic pulse (hemp) standardization. IEEE Trans Electromagn Compat 55(3):532\u2013538","journal-title":"IEEE Trans Electromagn Compat"},{"issue":"3","key":"899_CR77","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/35.751497","volume":"37","author":"H Peyravi","year":"1999","unstructured":"Peyravi H (1999) Medium access control protocols performance in satellite communications. IEEE Commun Mag 37(3):62\u201371","journal-title":"IEEE Commun Mag"},{"key":"899_CR78","doi-asserted-by":"crossref","unstructured":"Wang X, Liy H, Yao W, et al (2020) Content delivery for high-speed railway via integrated terrestrial-satellite networks. In: 2020 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, pp 1\u20136","DOI":"10.1109\/WCNC45663.2020.9120643"},{"issue":"4","key":"899_CR79","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MAES.2017.160118","volume":"32","author":"L Shi","year":"2017","unstructured":"Shi L, Jiao J, Sabbagh A et al (2017) Integration of reed-solomon codes to licklider transmission protocol (ltp) for space dtn. IEEE Aerosp Electron Syst Mag 32(4):48\u201355","journal-title":"IEEE Aerosp Electron Syst Mag"},{"key":"899_CR80","doi-asserted-by":"crossref","unstructured":"Mai T, Yao H, Jing Y, et al (2019) Self-learning congestion control of mptcp in satellites communications. In: 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), IEEE, pp 775\u2013780","DOI":"10.1109\/IWCMC.2019.8766465"},{"issue":"4","key":"899_CR81","doi-asserted-by":"crossref","first-page":"81","DOI":"10.14257\/ijfgcn.2015.8.4.08","volume":"8","author":"A Singla","year":"2015","unstructured":"Singla A, Sachdeva R (2015) Review on security issues and attacks in wireless sensor networks. Int J Future Gener Commun Netw 8(4):81\u201388","journal-title":"Int J Future Gener Commun Netw"},{"key":"899_CR82","first-page":"1","volume":"3135","author":"J Border","year":"2001","unstructured":"Border J, Kojo M, Griner J, Montenegro G, Shelby Z (2001) Performance enhancing proxies intended to mitigate link-related degradations. RFC 3135:1\u201345","journal-title":"RFC"},{"key":"899_CR83","doi-asserted-by":"crossref","unstructured":"Zhao Q, Tian X, Chen G, et al (2019) Understanding the effects of tcp tunneling on approaching high performance haipe-encrypted satellite communication systems. In: MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), IEEE, pp 1\u20136","DOI":"10.1109\/MILCOM47813.2019.9020763"},{"key":"899_CR84","first-page":"1","volume":"5050","author":"KL Scott","year":"2007","unstructured":"Scott KL, Burleigh SC (2007) Bundle protocol specification. RFC 5050:1\u201350","journal-title":"RFC"},{"key":"899_CR85","first-page":"1","volume":"5326","author":"M Ramadas","year":"2008","unstructured":"Ramadas M, Burleigh SC, Farrell S (2008) Licklider transmission protocol\u2014specification. RFC 5326:1\u201354","journal-title":"RFC"},{"issue":"6","key":"899_CR86","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/MCOM.2003.1204759","volume":"41","author":"S Burleigh","year":"2003","unstructured":"Burleigh S, Hooke A, Torgerson L et al (2003) Delay-tolerant networking: an approach to interplanetary internet. IEEE Commun Mag 41(6):128\u2013136","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"899_CR87","doi-asserted-by":"crossref","first-page":"3399","DOI":"10.1109\/JIOT.2018.2883736","volume":"6","author":"Q Luo","year":"2018","unstructured":"Luo Q, Wang J, Liu S (2018) Aeromrp: a multipath reliable transport protocol for aeronautical ad hoc networks. IEEE Internet Things J 6(2):3399\u20133410","journal-title":"IEEE Internet Things J"},{"key":"899_CR88","doi-asserted-by":"crossref","unstructured":"Feng M, Xu H (2019) Msnet-blockchain: a new framework for securing mobile satellite communication network. In: 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), IEEE, pp 1\u20139","DOI":"10.1109\/SAHCN.2019.8824889"},{"key":"899_CR89","doi-asserted-by":"crossref","unstructured":"Wang S, Zhao Y, Xie H (2020) Improving survivability of leo satellite network with guaranteed based approaches. In: 2020 IEEE Symposium on Computers and Communications (ISCC), IEEE, pp 1\u20136","DOI":"10.1109\/ISCC50000.2020.9219727"},{"key":"899_CR90","doi-asserted-by":"crossref","first-page":"107850","DOI":"10.1016\/j.ress.2021.107850","volume":"215","author":"S Geng","year":"2021","unstructured":"Geng S, Liu S, Fang Z (2021) Resilient communication model for satellite networks using clustering technique. Reliab Eng Syst Safety 215:107850","journal-title":"Reliab Eng Syst Safety"},{"issue":"1","key":"899_CR91","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s11276-020-02452-7","volume":"27","author":"Y Nie","year":"2021","unstructured":"Nie Y, Fang Z, Gao S (2021) Q-gert survivability assessment of leo satellite constellation. Wirel Netw 27(1):249\u2013268","journal-title":"Wirel Netw"},{"key":"899_CR92","doi-asserted-by":"crossref","unstructured":"Su K, Zhou J (2010) Evolutionary global attitude planning for satellite signature suppression shield. In: 2010 Sixth International Conference on Natural Computation, IEEE, vol 5, pp 2343\u20132347","DOI":"10.1109\/ICNC.2010.5584531"},{"key":"899_CR93","doi-asserted-by":"crossref","unstructured":"Fraire JA, Henn S, Dovis F, et al (2020) Sparse satellite constellation design for lora-based direct-to-satellite internet of things. In: GLOBECOM 2020-2020 IEEE Global Communications Conference, IEEE, pp 1\u20136","DOI":"10.1109\/GLOBECOM42002.2020.9348042"},{"key":"899_CR94","doi-asserted-by":"publisher","unstructured":"Hess J (2020) Fractionated spacecraft survivability following a catastrophic explosion. In: AIAA SciTech 2020 Forum. https:\/\/doi.org\/10.2514\/6.2020-0730","DOI":"10.2514\/6.2020-0730"},{"key":"899_CR95","unstructured":"Hanlon E (2018) Survivability analysis of a small satellite constellation. In: 34th space symposium. https:\/\/www.spacefoundation.org\/wp-content\/uploads\/2019\/07\/Hanlon-Edward_Survivability-Analysis-of-a-Small-Satellite-Constellation_1.pdf"},{"issue":"2\u20133","key":"899_CR96","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C Karlof","year":"2003","unstructured":"Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2\u20133):293\u2013315","journal-title":"Ad Hoc Netw"},{"key":"899_CR97","unstructured":"Raffo D (2005) Security schemes for the OLSR protocol for ad hoc networks (sch\u00e9mas de s\u00e9curit\u00e9 pour le protocole OLSR pour les r\u00e9seaux ad hoc). PhD thesis, Pierre and Marie Curie University, Paris, France"},{"issue":"3","key":"899_CR98","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1049\/iet-net.2013.0056","volume":"3","author":"U Ghosh","year":"2014","unstructured":"Ghosh U, Datta R (2014) Sdrp: secure and dynamic routing protocol for mobile ad-hoc networks. IET Netw 3(3):235\u2013243","journal-title":"IET Netw"},{"key":"899_CR99","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.actaastro.2019.05.051","volume":"162","author":"Q Chen","year":"2019","unstructured":"Chen Q, Chen X, Yang L et al (2019) A distributed congestion avoidance routing algorithm in mega-constellation network with multi-gateway. Acta Astronaut 162:376\u2013387","journal-title":"Acta Astronaut"},{"key":"899_CR100","doi-asserted-by":"crossref","first-page":"133641","DOI":"10.1109\/ACCESS.2019.2941217","volume":"7","author":"Y Wu","year":"2019","unstructured":"Wu Y, Hu G, Jin F et al (2019) A satellite handover strategy based on the potential game in leo satellite networks. IEEE Access 7:133641\u2013133652","journal-title":"IEEE Access"},{"issue":"2","key":"899_CR101","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1109\/JSAC.2003.819977","volume":"22","author":"H Tsunoda","year":"2004","unstructured":"Tsunoda H, Ohta K, Kato N et al (2004) Supporting ip\/leo satellite networks by handover-independent ip mobility management. IEEE J Sel Areas Commun 22(2):300\u2013307","journal-title":"IEEE J Sel Areas Commun"},{"key":"899_CR102","doi-asserted-by":"crossref","first-page":"14952","DOI":"10.1109\/ACCESS.2017.2726114","volume":"5","author":"T Li","year":"2017","unstructured":"Li T, Zhou H, Luo H et al (2017) Sat-flow: multi-strategy flow table management for software defined satellite networks. IEEE Access 5:14952\u201314965","journal-title":"IEEE Access"},{"key":"899_CR103","doi-asserted-by":"crossref","unstructured":"Onen M, Molva R (2004) Denial of service prevention in satellite networks. In: 2004 IEEE International Conference on Communications (IEEE Cat. No. 04CH37577), IEEE, vol 7, pp 4387\u20134391","DOI":"10.1109\/ICC.2004.1313376"},{"issue":"3","key":"899_CR104","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1002\/sat.1174","volume":"35","author":"Z Wu","year":"2017","unstructured":"Wu Z, Hu G, Jin F et al (2017) A novel routing design in the ip-based geo\/leo hybrid satellite networks. Int J Satell Commun Netw 35(3):179\u2013199","journal-title":"Int J Satell Commun Netw"},{"key":"899_CR105","doi-asserted-by":"crossref","unstructured":"Han W, Wang B, Feng Z et al (2016) Distributed mobility management in ip\/leo satellite networks. In: 2016 3rd International Conference on Systems and Informatics (ICSAI), IEEE, pp 691\u2013695","DOI":"10.1109\/ICSAI.2016.7811041"},{"key":"899_CR106","doi-asserted-by":"crossref","unstructured":"Liu M, Wang H, Zhou H et al (2021) A mobility management method for space-earth integration network based on identity mapping system. In: 2021 World Conference on Computing and Communication Technologies (WCCCT), IEEE, pp 52\u201357","DOI":"10.1109\/WCCCT52091.2021.00017"},{"key":"899_CR107","doi-asserted-by":"crossref","unstructured":"Su G, You P, Yong S (2017) Comparative handover performance analysis of mipv6 and fmipv6 in leo satellite networks. In: 2017 International Conference on Network and Information Systems for Computers (ICNISC), IEEE, pp 30\u201336","DOI":"10.1109\/ICNISC.2017.00015"},{"key":"899_CR108","doi-asserted-by":"crossref","unstructured":"Palattella MR, Soua R, Khelil A et al (2019) Fog computing as the key for seamless connectivity handover in future vehicular networks. In: Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing, ACM, Limassol, Cyprus, pp 1996\u20132000","DOI":"10.1145\/3297280.3297475"},{"issue":"1","key":"899_CR109","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MNET.2018.1800177","volume":"33","author":"J Shen","year":"2019","unstructured":"Shen J, Wang C, Ji S et al (2019) Secure emergent data protection scheme for a space-terrestrial integrated network. IEEE Netw 33(1):44\u201350","journal-title":"IEEE Netw"},{"issue":"4","key":"899_CR110","doi-asserted-by":"crossref","first-page":"912","DOI":"10.1109\/TIFS.2017.2774439","volume":"13","author":"J Shen","year":"2017","unstructured":"Shen J, Zhou T, Chen X et al (2017) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):912\u2013925","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"7","key":"899_CR111","doi-asserted-by":"crossref","first-page":"2077","DOI":"10.1016\/j.asr.2021.01.018","volume":"67","author":"M Naim","year":"2021","unstructured":"Naim M, Pacha AA, Serief C (2021) A novel satellite image encryption algorithm based on hyperchaotic systems and josephus problem. Adv Space Res 67(7):2077\u20132103","journal-title":"Adv Space Res"},{"key":"899_CR112","doi-asserted-by":"crossref","unstructured":"Thakkar S, Shivdikar K, Warty C (2017) Video steganography using encrypted payload for satellite communication. In: 2017 IEEE Aerospace Conference, IEEE, pp 1\u201311","DOI":"10.1109\/AERO.2017.7943978"},{"issue":"8","key":"899_CR113","doi-asserted-by":"crossref","first-page":"3831","DOI":"10.1109\/TVT.2010.2059057","volume":"59","author":"X Zhou","year":"2010","unstructured":"Zhou X, McKay MR (2010) Secure transmission with artificial noise over fading channels: achievable rate and optimal power allocation. IEEE Trans Veh Technol 59(8):3831\u20133842","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"899_CR114","doi-asserted-by":"crossref","first-page":"852","DOI":"10.1109\/TWC.2011.120911.111460","volume":"11","author":"G Zheng","year":"2011","unstructured":"Zheng G, Arapoglou P-D, Ottersten B (2011) Physical layer security in multibeam satellite systems. IEEE Trans Wirel Commun 11(2):852\u2013863","journal-title":"IEEE Trans Wirel Commun"},{"issue":"3","key":"899_CR115","doi-asserted-by":"crossref","first-page":"1568","DOI":"10.1109\/TAES.2019.2905306","volume":"55","author":"W Lu","year":"2019","unstructured":"Lu W, An K, Liang T (2019) Robust beamforming design for sum secrecy rate maximization in multibeam satellite systems. IEEE Trans Aerosp Electron Syst 55(3):1568\u20131572","journal-title":"IEEE Trans Aerosp Electron Syst"},{"key":"899_CR116","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2020.101843","volume":"112","author":"R Geng","year":"2021","unstructured":"Geng R, Ye N, Liu J et al (2021) Towards channel state information based coding to enhance security in satellite communication. J Syst Architect 112:101843","journal-title":"J Syst Architect"},{"key":"899_CR117","doi-asserted-by":"crossref","first-page":"27061","DOI":"10.1109\/ACCESS.2017.2767638","volume":"5","author":"Z Luo","year":"2017","unstructured":"Luo Z, Wang H, Zhou K et al (2017) Combined constellation rotation with weighted frft for secure transmission in polarization modulation based dual-polarized satellite communications. IEEE access 5:27061\u201327073","journal-title":"IEEE access"},{"key":"899_CR118","doi-asserted-by":"crossref","unstructured":"Liu Y, Gui Y, Yuan S, et al (2020) Terrestrial-satellite secure communication with non-confidential user assistance and hybrid-power. In: 2020 International Symposium on Networks, Computers and Communications (ISNCC), IEEE, pp 1\u20136","DOI":"10.1109\/ISNCC49221.2020.9297205"},{"key":"899_CR119","doi-asserted-by":"crossref","first-page":"2641","DOI":"10.1109\/ACCESS.2017.2667882","volume":"5","author":"J Ouyang","year":"2017","unstructured":"Ouyang J, Lin M, Zou Y et al (2017) Secrecy energy efficiency maximization in cognitive radio networks. IEEE Access 5:2641\u20132650","journal-title":"IEEE Access"},{"issue":"2","key":"899_CR120","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1109\/LWC.2020.3026700","volume":"10","author":"Z Lin","year":"2020","unstructured":"Lin Z, Lin M, Champagne B et al (2020) Secure and energy efficient transmission for rsma-based cognitive satellite-terrestrial networks. IEEE Wirel Commun Lett 10(2):251\u2013255","journal-title":"IEEE Wirel Commun Lett"},{"key":"899_CR121","doi-asserted-by":"crossref","first-page":"46278","DOI":"10.1109\/ACCESS.2020.2978314","volume":"8","author":"I Altaf","year":"2020","unstructured":"Altaf I, Saleem MA, Mahmood K et al (2020) A lightweight key agreement and authentication scheme for satellite-communication systems. IEEE Access 8:46278\u201346287","journal-title":"IEEE Access"},{"key":"899_CR122","doi-asserted-by":"crossref","unstructured":"Jedermann E, Strohmeier M, Sch\u00e4fer M et al (2021) Orbit-based authentication using tdoa signatures in satellite networks. In: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp 175\u2013180","DOI":"10.1145\/3448300.3469132"},{"issue":"3","key":"899_CR123","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1080\/00051144.2020.1757966","volume":"61","author":"C Huang","year":"2020","unstructured":"Huang C, Zhang Z, Li M et al (2020) A mutual authentication and key update protocol in satellite communication network. Automatika 61(3):334\u2013344","journal-title":"Automatika"},{"issue":"1\u20135167832","key":"899_CR124","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1155\/2020\/5167832","volume":"5167832","author":"J Guo","year":"2020","unstructured":"Guo J, Du Y (2020) A novel rlwe-based anonymous mutual authentication protocol for space information network. Secur Commun Netw 5167832(1\u20135167832):12. https:\/\/doi.org\/10.1155\/2020\/5167832","journal-title":"Secur Commun Netw"},{"key":"899_CR125","doi-asserted-by":"crossref","unstructured":"Meng W, Xue K, Xu J, et al (2018) Low-latency authentication against satellite compromising for space information network. In: 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), IEEE, pp 237\u2013244","DOI":"10.1109\/MASS.2018.00045"},{"issue":"15","key":"899_CR126","doi-asserted-by":"crossref","first-page":"4508","DOI":"10.1002\/dac.4508","volume":"33","author":"Y Chen","year":"2020","unstructured":"Chen Y, Chen J (2020) Robust three-factor authentication protocol for satellite communication systems. Int J Commun Syst 33(15):4508","journal-title":"Int J Commun Syst"},{"key":"899_CR127","doi-asserted-by":"publisher","unstructured":"Andola N, Prakash S, Gahlot R et al (2022) An enhanced smart card and dynamic ID based remote multi-server user authentication scheme. Cluster Comput 25(5):3699\u20133717. https:\/\/doi.org\/10.1007\/s10586-022-03585-4","DOI":"10.1007\/s10586-022-03585-4"},{"issue":"8","key":"899_CR128","doi-asserted-by":"crossref","first-page":"7764","DOI":"10.1109\/TVT.2021.3091775","volume":"70","author":"X Liu","year":"2021","unstructured":"Liu X, Yang A, Huang C et al (2021) Decentralized anonymous authentication with fair billing for space-ground integrated networks. IEEE Trans Veh Technol 70(8):7764\u20137777","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"899_CR129","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/s11277-021-08214-8","volume":"119","author":"N Andola","year":"2021","unstructured":"Andola N, Yadav VK, Venkatesan S et al (2021) Spychain: a lightweight blockchain for authentication and anonymous authorization in iod. Wirel Pers Commun 119(1):343\u2013362","journal-title":"Wirel Pers Commun"},{"key":"899_CR130","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.actaastro.2018.05.003","volume":"149","author":"O von Maurich","year":"2018","unstructured":"von Maurich O, Golkar A (2018) Data authentication, integrity and confidentiality mechanisms for federated satellite systems. Acta Astronaut 149:61\u201376","journal-title":"Acta Astronaut"},{"key":"899_CR131","doi-asserted-by":"crossref","unstructured":"Wang W, Xu H, Alazab M et al (2021) Blockchain-based reliable and efficient certificateless signature for iiot devices. IEEE Trans Indus Inform","DOI":"10.1109\/TII.2021.3084753"},{"key":"899_CR132","unstructured":"CCSDS (2019) CCSDS cryptographic algorithms. Informational report, CCSDS"},{"key":"899_CR133","first-page":"2002","volume":"5","author":"P Adrian","year":"2002","unstructured":"Adrian P, Ran C, Tygar J et al (2002) The tesla broadcast authentication protocol. RSA CryptoBytes 5:2002","journal-title":"RSA CryptoBytes"},{"issue":"1","key":"899_CR134","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1002\/navi.125","volume":"63","author":"I Fern\u00e1ndez-Hern\u00e1ndez","year":"2016","unstructured":"Fern\u00e1ndez-Hern\u00e1ndez I, Rijmen V, Seco-Granados G et al (2016) A navigation message authentication proposal for the galileo open service. J Inst Navig 63(1):85\u2013102","journal-title":"J Inst Navig"},{"issue":"4","key":"899_CR135","doi-asserted-by":"crossref","first-page":"1743","DOI":"10.1007\/s11277-020-07289-z","volume":"113","author":"K Ghorbani","year":"2020","unstructured":"Ghorbani K, Orouji N, Mosavi MR (2020) Navigation message authentication based on one-way hash chain to mitigate spoofing attacks for gps l1. Wirel Pers Commun 113(4):1743\u20131754","journal-title":"Wirel Pers Commun"},{"key":"899_CR136","doi-asserted-by":"crossref","first-page":"23759","DOI":"10.1109\/ACCESS.2020.2970203","volume":"8","author":"Z Wu","year":"2020","unstructured":"Wu Z, Zhang Y, Liu R (2020) Bd-ii nma &ssi: an scheme of anti-spoofing and open beidou ii d2 navigation message authentication. IEEE Access 8:23759\u201323775","journal-title":"IEEE Access"},{"key":"899_CR137","unstructured":"Chiramdasu R, Srivastava G, Bhattacharya S et al (2021) A machine learning driven threat intelligence system for malicious URL detection. In: Reinhardt D, M\u00fcller T (eds) ARES 2021: The 16th International Conference on Availability, Reliability and Security, ACM, Vienna, Austria, August 17\u201320, 2021, pp 154\u201311547"},{"issue":"1","key":"899_CR138","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s43020-020-00033-9","volume":"2","author":"S Wang","year":"2021","unstructured":"Wang S, Liu H, Tang Z et al (2021) Binary phase hopping based spreading code authentication technique. Satell Navig 2(1):1\u20139","journal-title":"Satell Navig"},{"key":"899_CR139","doi-asserted-by":"crossref","unstructured":"Liu M, Jin L, Shang B (2021) Lstm-based jamming detection for satellite communication with alpha-stable noise. In: 2021 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), IEEE, pp 1\u20135","DOI":"10.1109\/WCNCW49093.2021.9420017"},{"issue":"11","key":"899_CR140","doi-asserted-by":"crossref","first-page":"10932","DOI":"10.1109\/JIOT.2020.2991585","volume":"7","author":"C Han","year":"2020","unstructured":"Han C, Liu A, Wang H et al (2020) Dynamic anti-jamming coalition for satellite-enabled army iot: a distributed game approach. IEEE Internet Things J 7(11):10932\u201310944","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"899_CR141","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1002\/sat.1294","volume":"37","author":"H Yang","year":"2019","unstructured":"Yang H, Zhang H, Zhang J et al (2019) An anti-repeater-jamming approach based on blind source separation for the downlink of satellite communication systems. Int J Satell Commun Network 37(6):527\u2013535","journal-title":"Int J Satell Commun Network"},{"issue":"7","key":"899_CR142","doi-asserted-by":"crossref","first-page":"4734","DOI":"10.1002\/dac.4734","volume":"34","author":"KJ Silva Lorraine","year":"2021","unstructured":"Silva Lorraine KJ, Ramarakula M (2021) Hybrid anti-jamming algorithm for indian regional navigation satellite system receivers using variational mode decomposition and wavelet packet transform. Int J Commun Syst 34(7):4734","journal-title":"Int J Commun Syst"},{"issue":"1","key":"899_CR143","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/90.365441","volume":"3","author":"C Ward","year":"1995","unstructured":"Ward C, Choi CH, Hain TF (1995) A data link control protocol for leo satellite networks providing a reliable datagram service. IEEE\/ACM Trans Netw 3(1):91\u2013103","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"3","key":"899_CR144","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1007\/s11071-018-4250-x","volume":"93","author":"J Liu","year":"2018","unstructured":"Liu J, Tong X, Liu Y et al (2018) A joint encryption and error correction scheme based on chaos and ldpc. Nonlinear Dyn 93(3):1149\u20131163","journal-title":"Nonlinear Dyn"},{"key":"899_CR145","doi-asserted-by":"crossref","unstructured":"Mohammad AF, Almeida P, Soliman Y, Sadhu A, Kata K, Straub J (2019) Secure satellite database transmission. In: 2019 IEEE Aerospace Conference, IEEE, pp 1\u20136","DOI":"10.1109\/AERO.2019.8741992"},{"key":"899_CR146","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.comnet.2018.10.019","volume":"148","author":"RB Louren\u00e7o","year":"2019","unstructured":"Louren\u00e7o RB, Figueiredo GB, Tornatore M, Mukherjee B (2019) Data evacuation from data centers in disaster-affected regions through software-defined satellite networks. Comput Netw 148:88\u2013100","journal-title":"Comput Netw"},{"key":"899_CR147","doi-asserted-by":"crossref","unstructured":"Ray PP, Nguyen K (2020) A review on blockchain for medical delivery drones in 5g-iot era: progress and challenges. In: 2020 IEEE\/CIC International Conference on Communications in China (ICCC Workshops), IEEE, pp 29\u201334","DOI":"10.1109\/ICCCWorkshops49972.2020.9209931"},{"key":"899_CR148","doi-asserted-by":"crossref","unstructured":"Li C, Zhu L, Luglio M et al (2021) Research on satellite network security mechanism based on blockchain technology. In: 2020 IEEE\/CIC International Conference on Communications in China (ICCC Workshops), IEEE, Dubai, United Arab Emirates, pp 1\u20136","DOI":"10.1109\/ISNCC52172.2021.9615876"},{"issue":"19","key":"899_CR149","doi-asserted-by":"crossref","first-page":"5616","DOI":"10.3390\/s20195616","volume":"20","author":"X Ling","year":"2020","unstructured":"Ling X, Gao Z, Le Y et al (2020) Satellite-aided consensus protocol for scalable blockchains. Sensors 20(19):5616","journal-title":"Sensors"},{"key":"899_CR150","doi-asserted-by":"crossref","unstructured":"Clark L, Tung YC, Clark M et al (2020) A blockchain-based reputation system for small satellite relay networks. In: 2020 IEEE Aerospace Conference, IEEE, pp 1\u20138","DOI":"10.1109\/AERO47225.2020.9172516"},{"issue":"Supp 1","key":"899_CR151","first-page":"25","volume":"4","author":"JA Tran","year":"2019","unstructured":"Tran JA, Ramachandran GS, Shah PM et al (2019) Swarmdag: a partition tolerant distributed ledger protocol for swarm robotics. Ledger 4(Supp 1):25\u201331","journal-title":"Ledger"},{"issue":"9","key":"899_CR152","doi-asserted-by":"crossref","first-page":"11","DOI":"10.23919\/JCC.2021.09.002","volume":"18","author":"Y Li","year":"2021","unstructured":"Li Y, Luo Z, Zhou W et al (2021) Benefits analysis of beam hopping in satellite mobile system with unevenly distributed traffic. China Commun 18(9):11\u201323","journal-title":"China Commun"},{"key":"899_CR153","doi-asserted-by":"publisher","DOI":"10.3389\/frspt.2021.755546","author":"Z Liu","year":"2021","unstructured":"Liu Z, Zhu T, Zhang C et al (2021) Coherent contention resolution diversity slotted aloha: an improved multiple access method for satellite iot system. Front Space Technol. https:\/\/doi.org\/10.3389\/frspt.2021.755546","journal-title":"Front Space Technol"},{"key":"899_CR154","doi-asserted-by":"crossref","unstructured":"Chen J, Liu S, Zhang Y (2021) Inter-satellite token ring ad hoc network technology for micro-nano satellite cluster collaboration. In: 2021 3rd International Conference on Advances in Computer Technology, Information Science and Communication (CTISC), IEEE, pp 125\u2013131","DOI":"10.1109\/CTISC52352.2021.00031"},{"issue":"1","key":"899_CR155","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1504\/IJWET.2020.107690","volume":"15","author":"S Guan","year":"2020","unstructured":"Guan S, Jiang Y, Guan Q (2020) Improvement of tcp vegas algorithm based on forward direction delay. Int J Web Eng Technol 15(1):81\u201395","journal-title":"Int J Web Eng Technol"},{"key":"899_CR156","doi-asserted-by":"crossref","unstructured":"Roseti C, Luglio M, Provenzano S et al (2008) A cross-layer architecture for satellite network security: Cl-ipsec. In: 2008 4th Advanced Satellite Mobile Systems, IEEE, pp 82\u201387","DOI":"10.1109\/ASMS.2008.22"},{"key":"899_CR157","doi-asserted-by":"crossref","unstructured":"Gulzar WA, Khan ZA, Nawaz R (2012) Implementation of ipsec on performance enhancing proxies for long distance wireless and satellite networks. In: 2012 15th International Multitopic Conference (INMIC), IEEE, pp 395\u2013402","DOI":"10.1109\/INMIC.2012.6511497"},{"key":"899_CR158","doi-asserted-by":"crossref","unstructured":"Pavur J, Strohmeier M, Lenders V et al (2021) QPEP: an actionable approach to secure and performant broadband from geostationary orbit. In: 28th annual network and distributed system security symposium, NDSS 2021, virtually, February 21\u201325, 2021. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/qpep-an-actionable-approach-to-secure-and-performant-broadband-from-geostationary-orbit\/","DOI":"10.14722\/ndss.2021.24074"},{"key":"899_CR159","doi-asserted-by":"crossref","unstructured":"Kim Y, Jo JY, Harkanson R et al (2018) Tcp-gen framework to achieve high performance for haipe-encrypted tcp traffic in a satellite communication environment. In: 2018 IEEE International Conference on Communications (ICC), IEEE, pp 1\u20137","DOI":"10.1109\/ICC.2018.8422914"},{"key":"899_CR160","doi-asserted-by":"crossref","unstructured":"Lee D, Kang J, Dahouda MK et al (2020) Dtn-smtp: a novel mail transfer protocol with minimized interactions for space internet. In: International Conference on Computational Science and Its Applications. Springer, New York, pp 322\u2013331","DOI":"10.1007\/978-3-030-58799-4_24"},{"issue":"4","key":"899_CR161","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1007\/s42405-020-00303-5","volume":"21","author":"CH Koo","year":"2020","unstructured":"Koo CH, Kim H (2020) Cfdp pdu tunneling service over dtn between heterogeneous deep space communication assets. Int J Aeronaut Space Sci 21(4):1147\u20131160","journal-title":"Int J Aeronaut Space Sci"},{"issue":"7","key":"899_CR162","doi-asserted-by":"publisher","first-page":"9692","DOI":"10.1109\/TITS.2021.3106018","volume":"23","author":"L Zong","year":"2021","unstructured":"Zong L, Wang H, Bai Y et al (2021) Cross-regional transmission control for satellite network-assisted vehicular ad hoc networks. Trans Intell Transp Syst 23(7):9692\u20139701. https:\/\/doi.org\/10.1109\/TITS.2021.3106018","journal-title":"Trans Intell Transp Syst"},{"key":"899_CR163","doi-asserted-by":"crossref","unstructured":"Sterbenz JP, Krishnan R, Hain RR et al (2002) Survivable mobile wireless networks: issues, challenges, and research directions. In: Proceedings of the 1st ACM Workshop on Wireless Security, pp 31\u201340","DOI":"10.1145\/570681.570685"},{"issue":"6","key":"899_CR164","doi-asserted-by":"crossref","first-page":"4855","DOI":"10.1109\/JIOT.2020.3030263","volume":"8","author":"C-Q Dai","year":"2020","unstructured":"Dai C-Q, Zhang M, Li C et al (2020) Qoe-aware intelligent satellite constellation design in satellite internet of things. IEEE Internet Things J 8(6):4855\u20134867","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"899_CR165","doi-asserted-by":"crossref","first-page":"1449","DOI":"10.2514\/1.A34387","volume":"56","author":"P Jakob","year":"2019","unstructured":"Jakob P, Shimizu S, Yoshikawa S et al (2019) Optimal satellite constellation spare strategy using multi-echelon inventory control. J Spacecr Rocket 56(5):1449\u20131461","journal-title":"J Spacecr Rocket"},{"key":"899_CR166","doi-asserted-by":"crossref","unstructured":"Deng R, Di B, Zhang H et al (2020) Ultra-dense leo satellite constellation design for global coverage in terrestrial-satellite networks. In: GLOBECOM 2020-2020 IEEE Global Communications Conference, IEEE, pp 1\u20136","DOI":"10.1109\/GLOBECOM42002.2020.9322362"},{"key":"899_CR167","doi-asserted-by":"crossref","first-page":"30918","DOI":"10.1109\/ACCESS.2020.2964881","volume":"8","author":"Z Fan","year":"2020","unstructured":"Fan Z, Huo M, Xu S et al (2020) Fast cooperative trajectory optimization for close-range satellite formation using bezier shape-based method. IEEE Access 8:30918\u201330927","journal-title":"IEEE Access"},{"issue":"3","key":"899_CR168","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1002\/sat.1287","volume":"37","author":"P Wan","year":"2019","unstructured":"Wan P, Zhan Y (2019) A structured solar system satellite relay constellation network topology design for earth-mars deep space communications. Int J Satell Commun Network 37(3):292\u2013313","journal-title":"Int J Satell Commun Network"},{"key":"899_CR169","doi-asserted-by":"crossref","unstructured":"Dai CQ, Liu Y, Fu S et al (2019) Dynamic handover in satellite-terrestrial integrated networks. In: 2019 IEEE Globecom Workshops (GC Wkshps), IEEE, pp 1\u20136","DOI":"10.1109\/GCWkshps45667.2019.9024370"},{"key":"899_CR170","doi-asserted-by":"crossref","unstructured":"Markovitz O, Segal M (2021) Seam-aware location-based random walk routing algorithms for low orbit satellite constellations. In: 2021 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE, pp 351\u2013356","DOI":"10.1109\/WiMob52687.2021.9606291"},{"key":"899_CR171","doi-asserted-by":"crossref","unstructured":"Ding Y, Zhao Y, Zhang R (2020) A secure routing algorithm based on trust value for micro-nano satellite network. In: 2020 2nd International Conference on Information Technology and Computer Application (ITCA), IEEE, pp 229\u2013235","DOI":"10.1109\/ITCA52113.2020.00056"},{"key":"899_CR172","doi-asserted-by":"crossref","first-page":"122456","DOI":"10.1109\/ACCESS.2020.3007218","volume":"8","author":"K Guo","year":"2020","unstructured":"Guo K, Wang D, Zhi H et al (2020) A trusted resource-based routing algorithm with entropy estimation in integrated space-terrestrial network. IEEE Access 8:122456\u2013122468","journal-title":"IEEE Access"},{"issue":"4","key":"899_CR173","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1109\/COMST.2018.2841996","volume":"20","author":"J Liu","year":"2018","unstructured":"Liu J, Shi Y, Fadlullah ZM et al (2018) Space-air-ground integrated network: a survey. IEEE Commun Surv Tutor 20(4):2714\u20132741","journal-title":"IEEE Commun Surv Tutor"},{"issue":"4","key":"899_CR174","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/MNET.011.2100070","volume":"35","author":"S Ji","year":"2021","unstructured":"Ji S, Sheng M, Zhou D et al (2021) Flexible and distributed mobility management for integrated terrestrial-satellite networks: challenges, architectures, and approaches. IEEE Netw 35(4):73\u201381","journal-title":"IEEE Netw"},{"key":"899_CR175","doi-asserted-by":"crossref","unstructured":"Dai W, Li H, Wu Q et al (2020) Flexible and aggregated mobility management in integrated satellite-terrestrial networks. In: 2020 International Wireless Communications and Mobile Computing (IWCMC), IEEE, pp 982\u2013987","DOI":"10.1109\/IWCMC48107.2020.9148088"},{"issue":"4","key":"899_CR176","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1109\/MNET.001.1900550","volume":"34","author":"J Yang","year":"2020","unstructured":"Yang J, Li D, Jiang X et al (2020) Enhancing the resilience of low earth orbit remote sensing satellite networks. IEEE Netw 34(4):304\u2013311","journal-title":"IEEE Netw"},{"issue":"5","key":"899_CR177","doi-asserted-by":"crossref","first-page":"3443","DOI":"10.1109\/TCOMM.2019.2900316","volume":"67","author":"D Zhou","year":"2019","unstructured":"Zhou D, Sheng M, Luo J et al (2019) Collaborative data scheduling with joint forward and backward induction in small satellite networks. IEEE Trans Commun 67(5):3443-3456","journal-title":"IEEE Trans Commun"},{"key":"899_CR178","doi-asserted-by":"crossref","unstructured":"Zhang S, Liu A, Liang X (2020) A multi-objective satellite handover strategy based on entropy in leo satellite communications. In: 2020 IEEE 6th International Conference on Computer and Communications (ICCC), IEEE, pp 723\u2013728","DOI":"10.1109\/ICCC51575.2020.9344916"},{"key":"899_CR179","doi-asserted-by":"crossref","first-page":"101463","DOI":"10.1016\/j.phycom.2021.101463","volume":"49","author":"J Deng","year":"2021","unstructured":"Deng J, Xia Z, Pan G (2021) A named data networking prediction-based mobility solution in space-air-terrestrial networks. Phys Commun 49:101463","journal-title":"Phys Commun"},{"issue":"4","key":"899_CR180","doi-asserted-by":"crossref","first-page":"2446","DOI":"10.1109\/TCOMM.2020.2967393","volume":"68","author":"P Zhang","year":"2020","unstructured":"Zhang P, Shen Y, Jiang X et al (2020) Physical layer authentication jointly utilizing channel and phase noise in mimo systems. IEEE Trans Commun 68(4):2446\u20132458","journal-title":"IEEE Trans Commun"},{"issue":"2","key":"899_CR181","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1364\/OPN.29.2.000026","volume":"29","author":"I Khan","year":"2018","unstructured":"Khan I, Heim B, Neuzner A et al (2018) Satellite-based qkd. Opt Photonics News 29(2):26\u201333","journal-title":"Opt Photonics News"},{"key":"899_CR182","doi-asserted-by":"crossref","unstructured":"Vu MQ, Dang NT, Pham AT (2019) Hap-aided relaying satellite fso\/qkd systems for secure vehicular networks. In: 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), IEEE, pp 1\u20136","DOI":"10.1109\/VTCSpring.2019.8746381"},{"key":"899_CR183","doi-asserted-by":"crossref","unstructured":"Dwork C, Roth A et al (2014) The algorithmic foundations of differential privacy. Found Trends\u00ae Theoretical Comput Sci 9(3\u20134):211\u2013407","DOI":"10.1561\/0400000042"},{"key":"899_CR184","unstructured":"Kone\u010dn\u1ef3 J, McMahan B, Ramage D (2015) Federated optimization: distributed optimization beyond the datacenter. arXiv:1511.03575"},{"key":"899_CR185","doi-asserted-by":"crossref","unstructured":"Tong W, Dong X, Shen Y et al (2019) A hierarchical sharding protocol for multi-domain iot blockchains. In: ICC 2019-2019 IEEE International Conference on Communications (ICC), IEEE, pp 1\u20136","DOI":"10.1109\/ICC.2019.8761147"},{"key":"899_CR186","doi-asserted-by":"crossref","first-page":"6243505","DOI":"10.1155\/2019\/6243505","volume":"2019","author":"SC Burleigh","year":"2019","unstructured":"Burleigh SC, De Cola T, Morosi S et al (2019) From connectivity to advanced internet services: a comprehensive review of small satellites communications and networks. Wirel Commun Mob Comput 2019:6243505\u20131624350517","journal-title":"Wirel Commun Mob Comput"},{"key":"899_CR187","doi-asserted-by":"crossref","unstructured":"Ibrahim E, Nilsson R, van\u00a0de Beek J (2021) Intelligent reflecting surfaces for MIMO communications in los environments. In: IEEE Wireless Communications and Networking Conference, WCNC 2021, IEEE, Nanjing, China, March 29\u2013April 1, 2021, pp 1\u20136","DOI":"10.1109\/WCNC49053.2021.9417270"},{"key":"899_CR188","doi-asserted-by":"crossref","unstructured":"Xu D, Yu X, Vahid J, et al (2021) Resource allocation for large irs-assisted SWIPT systems with non-linear energy harvesting model. In: IEEE Wireless Communications and Networking Conference, WCNC 2021, IEEE, Nanjing, China, March 29\u2013April 1, 2021, pp 1\u20137","DOI":"10.1109\/WCNC49053.2021.9417357"},{"key":"899_CR189","doi-asserted-by":"crossref","unstructured":"Bedewy AM, Sun Y, Kompella S, et al (2019) Age-optimal sampling and transmission scheduling in multi-source systems. In: Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Mobihoc 2019, ACM, Catania, Italy, July 2\u20135, 2019, pp 121\u2013130","DOI":"10.1145\/3323679.3326510"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00899-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00899-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00899-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T17:07:32Z","timestamp":1686330452000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00899-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,28]]},"references-count":189,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["899"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00899-z","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,28]]},"assertion":[{"value":"2 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}