{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:19:45Z","timestamp":1761401985671,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,4,18]],"date-time":"2019-04-18T00:00:00Z","timestamp":1555545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1413-5","type":"journal-article","created":{"date-parts":[[2019,4,18]],"date-time":"2019-04-18T09:05:49Z","timestamp":1555578349000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Authentication of satellite navigation signals by wiretap coding and artificial noise"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3456-1557","authenticated-orcid":false,"given":"Francesco","family":"Formaggio","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Tomasin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,18]]},"reference":[{"issue":"3-4","key":"1413_CR1","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.ijcip.2012.09.003","volume":"5","author":"D. P. Shepard","year":"2012","unstructured":"D. P. Shepard, T. E. Humphreys, A. A. Fansler, Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. Int. J. Crit. Infrastruct. Prot.5(3-4), 146\u2013153 (2012).","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"1413_CR2","volume-title":"Radionavigation Laboratory Conference Proceedings","author":"K. D. Wesson","year":"2011","unstructured":"K. D. Wesson, D. P. Shepard, J. A. Bhatti, Humphreys T.E., in Radionavigation Laboratory Conference Proceedings. An evaluation of the vestigial signal defense for civil GPS anti-spoofing (University of TexasAustin, 2011)."},{"issue":"4","key":"1413_CR3","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1002\/navi.19","volume":"59","author":"D. M. Akos","year":"2012","unstructured":"D. M. Akos, Who\u2019s afraid of the spoofer? GPS\/GNSS spoofing detection via automatic gain control (agc). Navig. J. Inst. Navig. 59(4), 281\u2013290 (2012).","journal-title":"Navig. J. Inst. Navig"},{"key":"1413_CR4","first-page":"1","volume-title":"Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC) 2010 5th ESA Workshop on","author":"A. Cavaleri","year":"2010","unstructured":"A. Cavaleri, B. Motella, M. Pini, Fantino M., in Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC) 2010 5th ESA Workshop on. Detection of spoofed GPS signals at code and carrier tracking level (IEEENoordwijk, 2010), pp. 1\u20136."},{"key":"1413_CR5","first-page":"21","volume-title":"Proc. ION GNSS, vol 2010","author":"M. Cuntz","year":"2010","unstructured":"M. Cuntz, A. Konovaltsev, M. Heckler, A. Hornbostel, L. Kurz, G. Kappen, Noll T., in Proc. ION GNSS, vol 2010. Lessons learnt: The development of a robust multi-antenna GNSS receiver (Oregon Convention CenterPortland, 2010), pp. 21\u201324."},{"key":"1413_CR6","first-page":"1","volume-title":"Localization and GNSS (ICL-GNSS), 2015 International Conference on","author":"E. Axell","year":"2015","unstructured":"E. Axell, M. Alexandersson, Lindgren T., in Localization and GNSS (ICL-GNSS), 2015 International Conference on. Results on GNSS meaconing detection with multiple cots receivers (IEEEGothenburg, 2015), pp. 1\u20136."},{"key":"1413_CR7","doi-asserted-by":"publisher","first-page":"3192","DOI":"10.1109\/ICASSP.2015.7178560","volume-title":"Acoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on","author":"E. Axell","year":"2015","unstructured":"E. Axell, E. G. Larsson, Persson D., in Acoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on. GNSS spoofing detection using multiple mobile cots receivers (IEEEBrisbane, 2015), pp. 3192\u20133196."},{"key":"1413_CR8","unstructured":"P. Levin, D. S. De Lorenzo, P. K. Enge, S. C. Lo, Authenticating a signal based on an unknown component thereof, June 28 2011. US Patent 7,969,354."},{"issue":"4","key":"1413_CR9","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1002\/navi.44","volume":"60","author":"B. W. O\u2019Hanlon","year":"2013","unstructured":"B. W. O\u2019Hanlon, M. L. Psiaki, J. A. Bhatti, D. P. Shepard, T. E. Humphreys, Real-time GPS spoofing detection via correlation of encrypted signals. Navigation. 60(4), 267\u2013278 (2013).","journal-title":"Navigation"},{"key":"1413_CR10","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1109\/PLANS.2014.6851385","volume-title":"Position, Location and Navigation Symposium-PLANS 2014, 2014 IEEE\/ION","author":"A. J. Kerns","year":"2014","unstructured":"A. J. Kerns, K. D. Wesson, Humphreys T.E., in Position, Location and Navigation Symposium-PLANS 2014, 2014 IEEE\/ION. A blueprint for civil GPS navigation message authentication (IEEEMonterey, 2014), pp. 262\u2013269."},{"key":"1413_CR11","first-page":"1543","volume-title":"Proceedings of the 16th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GPS\/GNSS 2003)","author":"L. Scott","year":"2001","unstructured":"L. Scott, in Proceedings of the 16th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GPS\/GNSS 2003). Anti-spoofing & authenticated signal architectures for civil navigation systems (Oregon Convention CenterPortland, 2001), pp. 1543\u20131552."},{"key":"1413_CR12","unstructured":"J. T. Curran, C. O\u2019Driscoll, Message authentication as an anti-spoofing mechanism (2017). Technical report, Working Paper. researchgate.net."},{"key":"1413_CR13","unstructured":"G. Caparra, S. Ceccato, N. Laurenti, J. Cramer, in Proc. of the 30th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2017), Portland, OR. Feasibility and limitations of self-spoofing attacks on GNSS signals with message authentication, (2017), pp. 3968\u20133984."},{"issue":"2","key":"1413_CR14","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/TAES.2013.6494400","volume":"49","author":"T. E. Humphreys","year":"2013","unstructured":"T. E. Humphreys, Detection strategy for cryptographic GNSS anti-spoofing. IEEE Trans. Aerosp. Electron. Syst.49(2), 1073\u20131090 (2013).","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"10","key":"1413_CR15","doi-asserted-by":"publisher","first-page":"1702","DOI":"10.1109\/JPROC.2015.2469602","volume":"103","author":"E. Jorswieck","year":"2015","unstructured":"E. Jorswieck, S. Tomasin, A. Sezgin, Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing. Proc. IEEE.103(10), 1702\u20131724 (2015).","journal-title":"Proc. IEEE."},{"issue":"6","key":"1413_CR16","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/TIFS.2016.2524514","volume":"11","author":"X. Wu","year":"2016","unstructured":"X. Wu, Z. Yang, C. Ling, X. G. Xia, Artificial-noise-aided message authentication codes with information-theoretic security. IEEE Trans. Inf. Forensics Secur.11(6), 1278\u20131290 (2016).","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1413_CR17","doi-asserted-by":"crossref","unstructured":"F. Formaggio, S. Tomasin, G. Caparra, S. Ceccato, N. Laurenti, in Proc. IEEE 2018 26th European Signal Processing Conference (EUSIPCO). Authentication of Galileo GNSS signal by superimposed signature with artificial noise (Rome, 2018), pp. 2573\u20132577.","DOI":"10.23919\/EUSIPCO.2018.8553467"},{"key":"1413_CR18","volume-title":"Cryptography and network security: Principles and practice","author":"W. Stallings","year":"2017","unstructured":"W. Stallings, Cryptography and network security: Principles and practice (Pearson, Upper Saddle River, 2017)."},{"issue":"6","key":"1413_CR19","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.1109\/25.966585","volume":"50","author":"F. P. Fontan","year":"2001","unstructured":"F. P. Fontan, M. V\u00e1zquez-Castro, C. E. Cabado, J. P. Garcia, E. Kubista, Statistical modeling of the LMS channel. IEEE Trans. Veh. Technol.50(6), 1549\u20131567 (2001).","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"1413_CR20","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/T-VT.1985.24048","volume":"34","author":"C. Loo","year":"1985","unstructured":"C. Loo, A statistical model for a land mobile satellite link. IEEE Trans. Veh. Technol.34(3), 122\u2013127 (1985).","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1413_CR21","volume-title":"Random number generation and Monte Carlo methods","author":"J. E. Gentle","year":"2006","unstructured":"J. E. Gentle, Random number generation and Monte Carlo methods (Springer Science & Business Media, New York, 2006)."},{"key":"1413_CR22","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970081","volume-title":"Random number generation and quasi-Monte Carlo methods, vol. 63","author":"H. Niederreiter","year":"1992","unstructured":"H. Niederreiter, Random number generation and quasi-Monte Carlo methods, vol. 63 (Society for Industrial & Applied Mathematics, US, 1992)."},{"key":"1413_CR23","volume-title":"Handbook of Computational Statistics","author":"P. L\u2019Ecuyer","year":"2012","unstructured":"P. L\u2019Ecuyer, Handbook of Computational Statistics (Springer, Berlin, 2012)."},{"issue":"12","key":"1413_CR24","doi-asserted-by":"publisher","first-page":"6578","DOI":"10.1109\/TIT.2015.2494061","volume":"61","author":"T. Erseghe","year":"2015","unstructured":"T. Erseghe, On the evaluation of the Polyanskiy-Poor\u2013Verd\u00fa converse bound for finite block-length coding in AWGN. IEEE Trans. Inf. Theory. 61(12), 6578\u20136590 (2015).","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"12","key":"1413_CR25","doi-asserted-by":"publisher","first-page":"6854","DOI":"10.1109\/TIT.2016.2616900","volume":"62","author":"T. Erseghe","year":"2016","unstructured":"T. Erseghe, Coding in the finite-blocklength regime: Bounds based on Laplace integrals and their asymptotic approximations. IEEE Trans. Inf. Theory. 62(12), 6854\u20136883 (2016).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1413_CR26","doi-asserted-by":"crossref","unstructured":"M. Bloch, J. Barros, Physical-layer security: from information theory to security engineering (Cambridge University Press, 2011).","DOI":"10.1017\/CBO9780511977985"},{"key":"1413_CR27","unstructured":"M. Hayashi, R. Matsumoto, Construction of wiretap codes from ordinary channel codes (2010). arXiv preprint arXiv:1001.1197."},{"issue":"5","key":"1413_CR28","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MSP.2013.2265141","volume":"30","author":"W. K. Harrison","year":"2013","unstructured":"W. K. Harrison, J. Almeida, M. R. Bloch, S. W. McLaughlin, J. Barros, Coding for secrecy: An overview of error-control coding techniques for physical-layer security. IEEE Signal Proc. Mag. 30(5), 41\u201350 (2013).","journal-title":"IEEE Signal Proc. Mag"},{"key":"1413_CR29","unstructured":"I. Galileo, Galileo open service, signal in space interface control document (OS SIS ICD) (2008). European space agency\/European GNSS supervisory authority."},{"key":"1413_CR30","unstructured":"A. Joseph, GNSS solutions: Measuring signal strength (2010). GNSS insidegnss.com."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1413-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1413-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1413-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,16]],"date-time":"2022-09-16T06:22:02Z","timestamp":1663309322000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1413-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,18]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1413"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1413-5","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,4,18]]},"assertion":[{"value":"21 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"98"}}