{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T16:50:21Z","timestamp":1769532621383,"version":"3.49.0"},"reference-count":120,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T00:00:00Z","timestamp":1769472000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T00:00:00Z","timestamp":1769472000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62276273"],"award-info":[{"award-number":["62276273"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Due to its high data transmission rates, low power consumption, and excellent scalability, software-defined radio (SDR) has increasingly been applied in various fields, such as emergency communications and the internet of things. The successful deployment of SDR depends on the design and implementation of its security mechanisms. However, security threats may compromise fundamental functions through application management, data configuration, or transmission. This paper presents SDR\u2019s basic architecture and security structure, analyzes its security requirements and threats, and elaborates on a series of SDR security detection and protection techniques, proposing several future development directions and challenges.<\/jats:p>","DOI":"10.1186\/s42400-025-00433-x","type":"journal-article","created":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T03:02:30Z","timestamp":1769482950000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security issues in software-defined radio: a review"],"prefix":"10.1186","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-3752-4774","authenticated-orcid":false,"given":"Tong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xueguang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,27]]},"reference":[{"key":"433_CR1","doi-asserted-by":"publisher","first-page":"59","DOI":"10.31026\/j.eng.2021.06.05","volume":"27","author":"RH Ahmed","year":"2021","unstructured":"Ahmed RH, Hamza EK (2021) Designing a secure software-defined radio transceiver using the logistic map. J Eng 27:59\u201372. https:\/\/doi.org\/10.31026\/j.eng.2021.06.05","journal-title":"J Eng"},{"key":"433_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.21742\/ijria.2017.5.2.04","volume":"5","author":"S Ahn","year":"2017","unstructured":"Ahn S (2017) Data quality assurance for the simulation data analysis in the EDISON-SDR. Int J Reliab Inf Assur 5:19\u201324. https:\/\/doi.org\/10.21742\/ijria.2017.5.2.04","journal-title":"Int J Reliab Inf Assur"},{"key":"433_CR3","doi-asserted-by":"publisher","unstructured":"Alhazbi S, Sciancalepore S, Oligeri G (2023) BloodHound: early detection and identification of jamming at the PHY-layer. In: 2023 IEEE 20th consumer communications and networking conference (CCNC), IEEE, pp 1033\u20131041. https:\/\/doi.org\/10.1109\/CCNC51644.2023.10059878","DOI":"10.1109\/CCNC51644.2023.10059878"},{"key":"433_CR4","doi-asserted-by":"publisher","unstructured":"Alkhadra R, Abuzaid J, AlShammari M, Mohammad N (2021) Solar winds hack: in-depth analysis and countermeasures. In: 2021 12th international conference on computing communication and networking technologies (ICCCNT), IEEE, pp 1\u20137. https:\/\/doi.org\/10.1109\/ICCCNT51525.2021.9579611","DOI":"10.1109\/ICCCNT51525.2021.9579611"},{"key":"433_CR5","doi-asserted-by":"publisher","first-page":"55233","DOI":"10.1109\/ACCESS.2023.3281731","volume":"11","author":"A Altaweel","year":"2023","unstructured":"Altaweel A, Mukkath H, Kamel I (2023) GPS spoofing attacks in FANETs: a systematic literature review. IEEE Access 11:55233\u201355280. https:\/\/doi.org\/10.1109\/ACCESS.2023.3281731","journal-title":"IEEE Access"},{"key":"433_CR6","doi-asserted-by":"publisher","unstructured":"Arslan H, Celebi H (2007) Software defined radio architectures for cognitive radios. In: Cognitive radio, software defined radio, and adaptive wireless systems. Springer, Netherlands, pp 109\u2013144. https:\/\/doi.org\/10.1007\/978-1-4020-5542-3_4","DOI":"10.1007\/978-1-4020-5542-3_4"},{"key":"433_CR7","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MCOMSTD.2018.1700054","volume":"2","author":"CEC Bastidas","year":"2018","unstructured":"Bastidas CEC, Stine JA, Rennier A, Sherman M, Lackpour A, Kokar M, Schrage R (2018) IEEE 1900.5.2: standard method for modeling spectrum consumption: introduction and use cases. IEEE Commun Standards Magazine 2:49\u201355. https:\/\/doi.org\/10.1109\/MCOMSTD.2018.1700054","journal-title":"IEEE Commun Standards Magazine"},{"key":"433_CR8","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.280","author":"H Benimam","year":"2023","unstructured":"Benimam H, Sadoudi S, Teguig D (2023) Software defined radio implementation of a secure waveform for real-time data transmission using universal software radio peripheral. Secur Priv. https:\/\/doi.org\/10.1002\/spy2.280","journal-title":"Secur Priv"},{"key":"433_CR9","doi-asserted-by":"publisher","first-page":"523","DOI":"10.1007\/s12243-024-01044-2","volume":"79","author":"GMG Bezerra","year":"2024","unstructured":"Bezerra GMG, de Oliveira NR, Ferreira TN, Mattos DMF (2024) A comprehensive evaluation of software-defined radio performance in virtualized environments for radio access networks. Ann Telecommun 79:523\u2013535. https:\/\/doi.org\/10.1007\/s12243-024-01044-2","journal-title":"Ann Telecommun"},{"key":"433_CR10","doi-asserted-by":"publisher","unstructured":"Bhamidipati S, Bitragunta S, Bhatia A (2024) Fuzzy logic and AI-powered, SDR relay for secure and efficient cooperative radio communication. In: 2024 International conference on information networking (ICOIN), IEEE, pp 767\u2013772. https:\/\/doi.org\/10.1109\/ICOIN59985.2024.10572189","DOI":"10.1109\/ICOIN59985.2024.10572189"},{"key":"433_CR11","doi-asserted-by":"publisher","first-page":"863","DOI":"10.37391\/ijeer.120317","volume":"12","author":"S Bhat","year":"2024","unstructured":"Bhat S, Kavasseri A (2024) Multi-source data integration for navigation in GPS-denied autonomous driving environments. Int J Electr Electron Res 12:863\u2013869. https:\/\/doi.org\/10.37391\/ijeer.120317","journal-title":"Int J Electr Electron Res"},{"key":"433_CR12","unstructured":"Bisping R, Zurich E, Willbold J, Strohmeier M, Lenders V (2024) Wireless signal injection attacks on VSAT satellite modems. In: Proceedings of the 33rd USENIX security symposium, pp 6075\u20136091. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/bisping"},{"key":"433_CR13","doi-asserted-by":"publisher","unstructured":"Boyens JM (2024) Cybersecurity supply chain risk management practices for systems and organizations. https:\/\/doi.org\/10.6028\/NIST.SP.800-161r1-upd1","DOI":"10.6028\/NIST.SP.800-161r1-upd1"},{"key":"433_CR14","doi-asserted-by":"publisher","unstructured":"Brawerman A, Blough D, Bing B (2004) Securing the download of radio configuration files for software defined radio devices. In: Proceedings of the second international workshop on mobility management and wireless access protocols, ACM, New York, pp 98\u2013105. https:\/\/doi.org\/10.1145\/1023783.1023802","DOI":"10.1145\/1023783.1023802"},{"key":"433_CR15","doi-asserted-by":"publisher","unstructured":"Brown TX, Sethi A (2007) Potential cognitive radio denial-of-service vulnerailities and protection countermeasures: a multi-dimensional analysis and assessment. In: 2007 2nd international conference on cognitive radio oriented wireless networks and communications, IEEE, pp 456\u2013464. https:\/\/doi.org\/10.1109\/CROWNCOM.2007.4549841","DOI":"10.1109\/CROWNCOM.2007.4549841"},{"key":"433_CR16","doi-asserted-by":"publisher","unstructured":"Camurati G, Francillon A (2022) Noise-SDR: arbitrary modulation of electromagnetic noise from unprivileged software and its impact on emission security. In: 2022 IEEE symposium on security and privacy (SP), IEEE, pp 1193\u20131210. https:\/\/doi.org\/10.1109\/SP46214.2022.9833767","DOI":"10.1109\/SP46214.2022.9833767"},{"key":"433_CR17","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s13389-023-00339-9","volume":"14","author":"C Carlet","year":"2024","unstructured":"Carlet C, Daif A, Guilley S, Tavernier C (2024) A masking method based on orthonormal spaces, protecting several bytes against both SCA and FIA with a reduced cost. J Cryptogr Eng 14:223\u2013240. https:\/\/doi.org\/10.1007\/s13389-023-00339-9","journal-title":"J Cryptogr Eng"},{"key":"433_CR18","doi-asserted-by":"publisher","first-page":"54210","DOI":"10.1109\/ACCESS.2023.3282169","volume":"11","author":"R Caviglia","year":"2023","unstructured":"Caviglia R, Gaggero G, Portomauro G, Patrone F, Marchese M (2023) An SDR-based cybersecurity verification framework for smart agricultural machines. IEEE Access 11:54210\u201354220. https:\/\/doi.org\/10.1109\/ACCESS.2023.3282169","journal-title":"IEEE Access"},{"key":"433_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3515051","author":"O Ceviz","year":"2024","unstructured":"Ceviz O, Sen S, Sadioglu P (2024) A survey of security in UAVs and FANETs: issues, threats, analysis of attacks, and solutions. IEEE Commun Surveys Tutor. https:\/\/doi.org\/10.1109\/COMST.2024.3515051","journal-title":"IEEE Commun Surveys Tutor"},{"key":"433_CR20","doi-asserted-by":"publisher","first-page":"850","DOI":"10.3390\/s24030850","volume":"24","author":"X Chang","year":"2024","unstructured":"Chang X, Peng L, Zhang S (2024) Allocation of eavesdropping attacks for multi-system remote state estimation. Sensors 24:850. https:\/\/doi.org\/10.3390\/s24030850","journal-title":"Sensors"},{"key":"433_CR21","doi-asserted-by":"publisher","unstructured":"Chiper FL, Martian A, Muscalu DI, Vladeanu C, Marghescu I (2022) Aerial drone defense system based on software defined radio platforms. In: 2022 14th international conference on communications (COMM), IEEE, pp 1\u20134. https:\/\/doi.org\/10.1109\/COMM54429.2022.9817314","DOI":"10.1109\/COMM54429.2022.9817314"},{"key":"433_CR22","doi-asserted-by":"publisher","unstructured":"Cichonski J, Franklin JM, Bartock M (2017) Guide to LTE security, Gaithersburg, MD. https:\/\/doi.org\/10.6028\/NIST.SP.800-187","DOI":"10.6028\/NIST.SP.800-187"},{"key":"433_CR23","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TDSC.2018.2882825","volume":"18","author":"W Connell","year":"2021","unstructured":"Connell W, Menasce DA, Albanese M (2021) Performance modeling of moving target defenses with reconfiguration limits. IEEE Trans Dependable Secure Comput 18:205\u2013219. https:\/\/doi.org\/10.1109\/TDSC.2018.2882825","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"433_CR24","doi-asserted-by":"publisher","first-page":"91101","DOI":"10.1109\/ACCESS.2024.3420091","volume":"12","author":"M Dansarie","year":"2024","unstructured":"Dansarie M (2024) Security issues in special-purpose digital radio communication systems: a systematic review. IEEE Access 12:91101\u201391126. https:\/\/doi.org\/10.1109\/ACCESS.2024.3420091","journal-title":"IEEE Access"},{"key":"433_CR25","doi-asserted-by":"publisher","unstructured":"Das D, Boro D (2023) Electromagnetic signal analysis: a vulnerability to edge computing driven IoT devices. In: 2023 4th international conference on computing and communication systems (I3CS), IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/I3CS58314.2023.10127273","DOI":"10.1109\/I3CS58314.2023.10127273"},{"key":"433_CR26","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s11235-023-01018-0","volume":"83","author":"LOH de Carvalho Macedo","year":"2023","unstructured":"de Carvalho Macedo LOH, Campista MEM (2023) Attacks to mobile networks using SS7 vulnerabilities: a real traffic analysis. Telecommun Syst 83:253\u2013265. https:\/\/doi.org\/10.1007\/s11235-023-01018-0","journal-title":"Telecommun Syst"},{"key":"433_CR27","doi-asserted-by":"publisher","first-page":"4122","DOI":"10.1016\/j.jksuci.2021.04.003","volume":"34","author":"JJ de Rugeles Uribe","year":"2022","unstructured":"de Rugeles Uribe JJ, Guillen EP, Cardoso LS (2022) A technical review of wireless security for the internet of things: software defined radio perspective. J King Saud Univ Comput Inf Sci 34:4122\u20134134. https:\/\/doi.org\/10.1016\/j.jksuci.2021.04.003","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"433_CR28","doi-asserted-by":"publisher","unstructured":"Deshmukh S, Sharma V (2022) An SDR-based anti-drone system with detection, tracking, jamming, and spoofing capabilities. In: 2022 IEEE microwaves, antennas, and propagation conference (MAPCON). IEEE, pp 388\u2013393. https:\/\/doi.org\/10.1109\/MAPCON56011.2022.10046968","DOI":"10.1109\/MAPCON56011.2022.10046968"},{"key":"433_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3711836","volume":"24","author":"D Dobkin","year":"2025","unstructured":"Dobkin D, Cever N, Levi I (2025) RAD-FS: remote timing and power SCA security in DVFS-augmented ultra-low-power embedded systems. ACM Trans Embed Comput Syst 24:1\u201327. https:\/\/doi.org\/10.1145\/3711836","journal-title":"ACM Trans Embed Comput Syst"},{"key":"433_CR30","doi-asserted-by":"publisher","first-page":"118718","DOI":"10.1109\/ACCESS.2024.3447884","volume":"12","author":"M Engelhardt","year":"2024","unstructured":"Engelhardt M, Giehl S, Schubert M, Ihlow A, Schneider C, Ebert A, Landmann M, del Galdo G, Andrich C (2024) Accelerating innovation in 6G research: real-time capable SDR system architecture for rapid prototyping. IEEE Access 12:118718\u2013118732. https:\/\/doi.org\/10.1109\/ACCESS.2024.3447884","journal-title":"IEEE Access"},{"key":"433_CR31","doi-asserted-by":"publisher","unstructured":"Erel-Ozcevik M, Tekce F (2021) SDN\/NFV based secure SCMA design in SDR. In: 2021 17th international conference on network and service management (CNSM), IEEE, pp 319\u2013325. https:\/\/doi.org\/10.23919\/CNSM52442.2021.9615517","DOI":"10.23919\/CNSM52442.2021.9615517"},{"key":"433_CR32","doi-asserted-by":"publisher","first-page":"255","DOI":"10.55676\/asi.v3i1.51","volume":"3","author":"A Felski","year":"2023","unstructured":"Felski A, Kowalik T (2023) Software defined radio and open software as a critical threat for unmanned objects. Aviation Security Issues 3:255\u2013264. https:\/\/doi.org\/10.55676\/asi.v3i1.51","journal-title":"Aviation Security Issues"},{"key":"433_CR33","doi-asserted-by":"publisher","DOI":"10.3390\/rs14010221","volume":"14","author":"W Feng","year":"2022","unstructured":"Feng W, Friedt J-M, Wan P (2022) SDR-implemented passive bistatic SAR system using Sentinel-1 signal and its experiment results. Remote Sens 14:221. https:\/\/doi.org\/10.3390\/rs14010221","journal-title":"Remote Sens"},{"key":"433_CR34","doi-asserted-by":"publisher","first-page":"1487","DOI":"10.3390\/s22041487","volume":"22","author":"R Ferreira","year":"2022","unstructured":"Ferreira R, Gaspar J, Sebasti\u00e3o P, Souto N (2022) A software defined radio based anti-UAV mobile system with jamming and spoofing capabilities. Sensors 22:1487. https:\/\/doi.org\/10.3390\/s22041487","journal-title":"Sensors"},{"key":"433_CR35","doi-asserted-by":"publisher","first-page":"138759","DOI":"10.1109\/ACCESS.2023.3340133","volume":"11","author":"P Flak","year":"2023","unstructured":"Flak P, Czyba R (2023) Rf drone detection system based on a distributed sensor grid with remote hardware-accelerated signal processing. IEEE Access 11:138759\u2013138772. https:\/\/doi.org\/10.1109\/ACCESS.2023.3340133","journal-title":"IEEE Access"},{"key":"433_CR36","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1590\/S0104-40362009000400006","volume":"17","author":"ALP Freitas","year":"2009","unstructured":"Freitas ALP, Rodrigues SG, Costa HG (2009) Emprego de uma abordagem multicrit\u00e9rio para classifica\u00e7\u00e3o do desempenho de institui\u00e7\u00f5es de ensino superior. Ensaio Avalia\u00e7\u00e3o e Pol\u00edticas P\u00fablicas Em Educa\u00e7\u00e3o 17:655\u2013674. https:\/\/doi.org\/10.1590\/S0104-40362009000400006","journal-title":"Ensaio Avalia\u00e7\u00e3o e Pol\u00edticas P\u00fablicas Em Educa\u00e7\u00e3o"},{"key":"433_CR37","doi-asserted-by":"publisher","unstructured":"Gallo R, Kawakami H, Dahab R (2010) On device identity establishment and verification, pp 130\u2013145. https:\/\/doi.org\/10.1007\/978-3-642-16441-5_9","DOI":"10.1007\/978-3-642-16441-5_9"},{"key":"433_CR38","doi-asserted-by":"publisher","unstructured":"Gavras I, Alexandropoulos GC (2024) Joint near-field target tracking and communications with full duplex holographic MIMO. In: ICASSP 2024\u20142024 IEEE international conference on acoustics, speech and signal processing (ICASSP), IEEE, pp 13301\u201313305. https:\/\/doi.org\/10.1109\/ICASSP48485.2024.10446188","DOI":"10.1109\/ICASSP48485.2024.10446188"},{"key":"433_CR39","doi-asserted-by":"publisher","unstructured":"Goeckel D (2008) Adaptive coded modulation for transmission over fading channels. In: Adaptive signal processing in wireless communications. CRC Press, pp 71\u201394. https:\/\/doi.org\/10.1201\/9781420046021.ch3","DOI":"10.1201\/9781420046021.ch3"},{"key":"433_CR40","doi-asserted-by":"publisher","unstructured":"Gonzalez CRA, Reed JH (2009) Power fingerprinting in SDR&CR integrity assessment. In: MILCOM 2009\u20142009 IEEE military communications conference, IEEE, pp 1\u20137. https:\/\/doi.org\/10.1109\/MILCOM.2009.5379826","DOI":"10.1109\/MILCOM.2009.5379826"},{"key":"433_CR41","doi-asserted-by":"publisher","unstructured":"Gonzalez CRA, Reed JH (2010) Detecting unauthorized software execution in SDR using power fingerprinting. In: 2010\u2014MILCOM 2010 military communications conference, IEEE, pp 2211\u20132216. https:\/\/doi.org\/10.1109\/MILCOM.2010.5680393","DOI":"10.1109\/MILCOM.2010.5680393"},{"key":"433_CR42","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.04608","author":"AW Green","year":"2020","unstructured":"Green AW, Woszczynski AB, Dodson K, Easton P (2020) Responding to cybersecurity challenges: securing vulnerable US emergency alert systems. Commun Assoc Inf Syst. https:\/\/doi.org\/10.17705\/1CAIS.04608","journal-title":"Commun Assoc Inf Syst"},{"key":"433_CR43","doi-asserted-by":"publisher","first-page":"11265","DOI":"10.1109\/TMC.2024.3393430","volume":"23","author":"J Groen","year":"2024","unstructured":"Groen J, D\u2019Oro S, Demir U, Bonati L, Villa D, Polese M, Melodia T, Chowdhury K (2024) Securing O-RAN open interfaces. IEEE Trans Mob Comput 23:11265\u201311277. https:\/\/doi.org\/10.1109\/TMC.2024.3393430","journal-title":"IEEE Trans Mob Comput"},{"key":"433_CR44","doi-asserted-by":"publisher","first-page":"15792","DOI":"10.1109\/TVT.2024.3408289","volume":"73","author":"D Guo","year":"2024","unstructured":"Guo D, Ding H, Tang L, Zhang X, Liang Y-C (2024) Wireless surveillance in a MIMO system with spoofing relay and UAV-enabled eavesdropper. IEEE Trans Veh Technol 73:15792\u201315797. https:\/\/doi.org\/10.1109\/TVT.2024.3408289","journal-title":"IEEE Trans Veh Technol"},{"key":"433_CR45","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1109\/OJVT.2023.3295208","volume":"4","author":"S Hafeez","year":"2023","unstructured":"Hafeez S, Khan AR, Al-Quraan MM, Mohjazi L, Zoha A, Imran MA, Sun Y (2023) Blockchain-assisted UAV communication systems: a comprehensive survey. IEEE Open J Veh Technol 4:558\u2013580. https:\/\/doi.org\/10.1109\/OJVT.2023.3295208","journal-title":"IEEE Open J Veh Technol"},{"key":"433_CR46","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.comcom.2023.06.026","volume":"209","author":"T Havinga","year":"2023","unstructured":"Havinga T, Jiao X, Aslam M, Liu W, Moerman I (2023) Improved TDD operation on software-defined radio platforms towards future wireless standards. Comput Commun 209:178\u2013187. https:\/\/doi.org\/10.1016\/j.comcom.2023.06.026","journal-title":"Comput Commun"},{"key":"433_CR47","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/j.comcom.2023.08.018","volume":"210","author":"J Hu","year":"2023","unstructured":"Hu J, Zhao Z, McManus M, Moorthy SK, Cui Y, Mastronarde N, Bentley ES, Medley M, Guan Z (2023) NeXT: architecture, prototyping and measurement of a software-defined testing framework for integrated RF network simulation, experimentation and optimization. Comput Commun 210:342\u2013355. https:\/\/doi.org\/10.1016\/j.comcom.2023.08.018","journal-title":"Comput Commun"},{"key":"433_CR48","doi-asserted-by":"publisher","unstructured":"Hu W, Wei Z, Leeson M, Xu T (2022) Eavesdropping against bidirectional physical layer secret key generation in fiber communications. In: 2022 IEEE photonics conference (IPC), IEEE, pp 1\u20132. https:\/\/doi.org\/10.1109\/IPC53466.2022.9975754","DOI":"10.1109\/IPC53466.2022.9975754"},{"key":"433_CR49","unstructured":"Itu-t (2020) Security guidelines and requirements for IMT-2020 edge computing services ITUPublications International Telecommunication Union. http:\/\/handle.itu.int\/11.1002\/1000\/11830-en"},{"key":"433_CR50","doi-asserted-by":"publisher","first-page":"56333","DOI":"10.1109\/ACCESS.2020.2981878","volume":"8","author":"WM Jang","year":"2020","unstructured":"Jang WM (2020) Simultaneous power harvesting and cyclostationary spectrum sensing in cognitive radios. IEEE Access 8:56333\u201356345. https:\/\/doi.org\/10.1109\/ACCESS.2020.2981878","journal-title":"IEEE Access"},{"key":"433_CR51","doi-asserted-by":"publisher","first-page":"72","DOI":"10.3390\/jsan13060072","volume":"13","author":"IA Jayaraj","year":"2024","unstructured":"Jayaraj IA, Shanmugam B, Azam S, Thennadil S (2024) Detecting and localizing wireless spoofing attacks on the internet of medical things. J Sens Actuator Netw 13:72. https:\/\/doi.org\/10.3390\/jsan13060072","journal-title":"J Sens Actuator Netw"},{"key":"433_CR52","doi-asserted-by":"publisher","unstructured":"Jin S, Xu M, Cai Y (2024) Energy efficient obfuscation of side-channel leakage for preventing side-channel attacks. In: Proceedings of the 39th ACM\/SIGAPP symposium on applied computing. ACM, New York, pp 1405\u20131414. https:\/\/doi.org\/10.1145\/3605098.3635997","DOI":"10.1145\/3605098.3635997"},{"key":"433_CR53","doi-asserted-by":"publisher","first-page":"32","DOI":"10.56094\/jss.v54i3.62","volume":"54","author":"N Johnson","year":"2018","unstructured":"Johnson N, Kelly T (2018) An assurance framework for independent co-assurance of safety and security. J Syst Saf 54:32\u201338. https:\/\/doi.org\/10.56094\/jss.v54i3.62","journal-title":"J Syst Saf"},{"key":"433_CR54","doi-asserted-by":"publisher","DOI":"10.1155\/WCN.2005.275","volume":"2005","author":"FK Jondral","year":"2005","unstructured":"Jondral FK (2005) Software-defined radio\u2014basics and evolution to cognitive radio. EURASIP J Wirel Commun Netw 2005:652784. https:\/\/doi.org\/10.1155\/WCN.2005.275","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"433_CR55","doi-asserted-by":"publisher","unstructured":"Jun-Jun W, Ming-Wei F, Peng-Fei Y, Xin-Fang Z (2009) A Secure software download framework based on mobile trusted computing. In: 2009 Second international workshop on computer science and engineering, IEEE, pp 171\u2013176. https:\/\/doi.org\/10.1109\/WCSE.2009.789","DOI":"10.1109\/WCSE.2009.789"},{"key":"433_CR56","doi-asserted-by":"publisher","unstructured":"Katzef M, Cullen AX, Alpcan T, Leckie C, Kopacz (2021) Privacy-preserving collaborative SDR networks for anomaly detection. In: ICC 2021\u2014IEEE international conference on communications, IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICC42927.2021.9500807","DOI":"10.1109\/ICC42927.2021.9500807"},{"key":"433_CR57","doi-asserted-by":"publisher","unstructured":"Kavand N, Darjani A, Chhabra G, Kumar A (2024) RFET-based dynamic differential logic cells against power side-channel attacks. In: 2024 IEEE computer society annual symposium on VLSI (ISVLSI), IEEE, pp 136\u2013142. https:\/\/doi.org\/10.1109\/ISVLSI61997.2024.00035","DOI":"10.1109\/ISVLSI61997.2024.00035"},{"key":"433_CR58","doi-asserted-by":"publisher","unstructured":"Keshabhoina TR, Vasconcelos MM (2023) Data-driven classification of low-power communication signals by an unauthenticated agent using a software-defined radio. In: 2023 57th asilomar conference on signals, systems, and computers, IEEE, pp 639\u2013645. https:\/\/doi.org\/10.1109\/IEEECONF59524.2023.10476920","DOI":"10.1109\/IEEECONF59524.2023.10476920"},{"key":"433_CR59","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.ifacol.2023.03.066","volume":"55","author":"MS Kumar","year":"2022","unstructured":"Kumar MS, Kasbekar GS, Maity A (2022) Identification of GPS spoofing as a drone cyber-vulnerability and evaluation of efficacy of asynchronous GPS spoofing. IFAC-PapersOnLine 55:394\u2013399. https:\/\/doi.org\/10.1016\/j.ifacol.2023.03.066","journal-title":"IFAC-PapersOnLine"},{"key":"433_CR60","doi-asserted-by":"publisher","first-page":"844","DOI":"10.46586\/tches.v2024.i2.844-869","volume":"2024","author":"S Kundu","year":"2024","unstructured":"Kundu S, Chowdhury S, Saha S, Karmakar A, Mukhopadhyay D, Verbauwhede I (2024) Carry your fault: a fault propagation attack on side-channel protected LWE-based KEM. IACR Trans Cryptogr Hardw Embed Syst 2024:844\u2013869. https:\/\/doi.org\/10.46586\/tches.v2024.i2.844-869","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"433_CR61","doi-asserted-by":"publisher","first-page":"138986","DOI":"10.1109\/ACCESS.2023.3341028","volume":"11","author":"J Lee","year":"2023","unstructured":"Lee J, Schmidt E, Gatsis N, Akopian D (2023) Detection and mitigation of spoofing attacks against time synchronization and positioning. IEEE Access 11:138986\u2013139003. https:\/\/doi.org\/10.1109\/ACCESS.2023.3341028","journal-title":"IEEE Access"},{"key":"433_CR62","doi-asserted-by":"publisher","first-page":"16859","DOI":"10.1109\/ACCESS.2022.3150020","volume":"10","author":"Y Li","year":"2022","unstructured":"Li Y, Pawlak J, Price J, Al Shamaileh K, Niyaz Q, Paheding S, Devabhaktuni V (2022) Jamming detection and classification in OFDM-based UAVs via feature- and spectrogram-tailored machine learning. IEEE Access 10:16859\u201316870. https:\/\/doi.org\/10.1109\/ACCESS.2022.3150020","journal-title":"IEEE Access"},{"key":"433_CR63","doi-asserted-by":"publisher","unstructured":"Li A, Zheng Y (2022) Research and implementation of wireless TDOA positioning station synchronization based on RTL-SDR. In: 2022 IEEE 6th information technology and mechatronics engineering conference (ITOEC), IEEE, pp 1087\u20131090. https:\/\/doi.org\/10.1109\/ITOEC53115.2022.9734446","DOI":"10.1109\/ITOEC53115.2022.9734446"},{"key":"433_CR64","doi-asserted-by":"publisher","unstructured":"Li K, Yu X, Zhang H, Wu L, Du X, Ratazzi P, Guizani M (2018) Security mechanisms to defend against new attacks on software-defined radio. In: 2018 international conference on computing, networking and communications (ICNC), IEEE, pp 537\u2013541. https:\/\/doi.org\/10.1109\/ICCNC.2018.8390381","DOI":"10.1109\/ICCNC.2018.8390381"},{"key":"433_CR65","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MSP.2016.13","volume":"14","author":"M Lichtman","year":"2016","unstructured":"Lichtman M, Poston JD, Amuru S, Shahriar C, Clancy TC, Buehrer RM, Reed JH (2016) A communications jamming taxonomy. IEEE Secur Priv 14:47\u201354. https:\/\/doi.org\/10.1109\/MSP.2016.13","journal-title":"IEEE Secur Priv"},{"key":"433_CR66","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1109\/TVLSI.2024.3433429","volume":"33","author":"X Liu","year":"2025","unstructured":"Liu X, Ampadu P (2025) A fast transient response distributed power supply with dynamic output switching for power side-channel attack mitigation. IEEE Trans Very Large Scale Integr VLSI Syst 33:261\u2013274. https:\/\/doi.org\/10.1109\/TVLSI.2024.3433429","journal-title":"IEEE Trans Very Large Scale Integr VLSI Syst"},{"key":"433_CR67","doi-asserted-by":"publisher","unstructured":"Long Y, Jiang Q, Yan C, Alam T, Ji X, Xu W, Fu K (2024) Eye: characterizing electromagnetic side-channel eavesdropping on embedded cameras. In: Proceedings 2024 network and distributed system security symposium. Internet Society, Reston. https:\/\/doi.org\/10.14722\/ndss.2024.24552","DOI":"10.14722\/ndss.2024.24552"},{"key":"433_CR68","doi-asserted-by":"publisher","unstructured":"Ludwig M, Bette AC, Lippmann B, Sigl G (2023) Counterfeit detection by semiconductor process technology inspection. In: 2023 IEEE European test symposium (ETS), IEEE, pp 1\u20134. https:\/\/doi.org\/10.1109\/ETS56758.2023.10174131","DOI":"10.1109\/ETS56758.2023.10174131"},{"key":"433_CR69","doi-asserted-by":"publisher","first-page":"38301","DOI":"10.1109\/JIOT.2024.3446675","volume":"11","author":"P Luo","year":"2024","unstructured":"Luo P, Wang B, Tian J, Yang Y (2024a) ADS-Bpois: poisoning attacks against deep-learning-based air traffic ADS-B unsupervised anomaly detection models. IEEE Internet Things J 11:38301\u201338311. https:\/\/doi.org\/10.1109\/JIOT.2024.3446675","journal-title":"IEEE Internet Things J"},{"key":"433_CR70","doi-asserted-by":"publisher","unstructured":"Luo J, Cao H, Jiang H, Yang Y, Chen Z (2024) MIMOCrypt: multi-user privacy-preserving Wi-Fi sensing via MIMO encryption. In: 2024 IEEE symposium on security and privacy (SP), IEEE, pp 2812\u20132830. https:\/\/doi.org\/10.1109\/SP54263.2024.00025","DOI":"10.1109\/SP54263.2024.00025"},{"key":"433_CR71","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1109\/JPROC.2015.2399173","volume":"103","author":"RG Machado","year":"2015","unstructured":"Machado RG, Wyglinski AM (2015) Software-defined radio: bridging the analog-digital divide. Proc IEEE 103:409\u2013423. https:\/\/doi.org\/10.1109\/JPROC.2015.2399173","journal-title":"Proc IEEE"},{"key":"433_CR72","doi-asserted-by":"publisher","unstructured":"Madeira J, Guerreiro J, Dinis R (2022) A software defined radio implementation of physical layer security using MIMO-SVD. In: 2022 international young engineers forum (YEF-ECE), IEEE, pp 75\u201379. https:\/\/doi.org\/10.1109\/YEF-ECE55092.2022.9850114","DOI":"10.1109\/YEF-ECE55092.2022.9850114"},{"key":"433_CR73","doi-asserted-by":"publisher","DOI":"10.32782\/pma2663-5240-2024.41.11","author":"AO Mahomedov","year":"2024","unstructured":"Mahomedov AO (2024) Strategic management of the transformation of critical infrastructure objects: organizational and management challenges and opportunities. Publ Manag Adm Ukr. https:\/\/doi.org\/10.32782\/pma2663-5240-2024.41.11","journal-title":"Publ Manag Adm Ukr"},{"key":"433_CR74","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/OJVT.2024.3477937","volume":"5","author":"ET Michailidis","year":"2024","unstructured":"Michailidis ET, Maliatsos K, Vouyioukas D (2024) Software-defined radio deployments in UAV-driven applications: a comprehensive review. IEEE Open J Veh Technol 5:1545\u20131586. https:\/\/doi.org\/10.1109\/OJVT.2024.3477937","journal-title":"IEEE Open J Veh Technol"},{"key":"433_CR75","doi-asserted-by":"publisher","unstructured":"Mitola J (1999) Cognitive radio for flexible mobile multimedia communications. In: 1999 IEEE international workshop on mobile multimedia communications (MoMuC\u201999) (Cat. No.99EX384), IEEE, pp 3\u201310. https:\/\/doi.org\/10.1109\/MOMUC.1999.819467","DOI":"10.1109\/MOMUC.1999.819467"},{"key":"433_CR76","doi-asserted-by":"publisher","unstructured":"Mitola J (2002) Software radios-survey, critical evaluation and future directions. In: [Proceedings] NTC-92: national telesystems conference, IEEE, pp 13\/15\u201313\/23. https:\/\/doi.org\/10.1109\/NTC.1992.267870","DOI":"10.1109\/NTC.1992.267870"},{"key":"433_CR77","doi-asserted-by":"publisher","first-page":"2087","DOI":"10.3390\/s23042087","volume":"23","author":"V Monakhov","year":"2023","unstructured":"Monakhov V, Thambawita V, Halvorsen P, Riegler MA (2023) Gridhtm: grid-based hierarchical temporal memory for anomaly detection in videos. Sensors 23:2087. https:\/\/doi.org\/10.3390\/s23042087","journal-title":"Sensors"},{"key":"433_CR78","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2012\/703642","volume":"2012","author":"DFC Moura","year":"2012","unstructured":"Moura DFC, da Silva FAB, Galdino JF (2012) Case studies of attacks over adaptive modulation based tactical software defined radios. J Comput Netw Commun 2012:1\u20139. https:\/\/doi.org\/10.1155\/2012\/703642","journal-title":"J Comput Netw Commun"},{"key":"433_CR79","doi-asserted-by":"publisher","first-page":"563","DOI":"10.3390\/network3040025","volume":"3","author":"N Niknami","year":"2023","unstructured":"Niknami N, Srinivasan A, St. Germain K, Wu J (2023) Maritime communications\u2014current state and the future potential with SDN and SDR. Network 3:563\u2013584. https:\/\/doi.org\/10.3390\/network3040025","journal-title":"Network"},{"key":"433_CR80","doi-asserted-by":"publisher","first-page":"23063","DOI":"10.1007\/s00521-023-08857-7","volume":"35","author":"AE Omolara","year":"2023","unstructured":"Omolara AE, Alawida M, Abiodun OI (2023) Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey. Neural Comput Appl 35:23063\u201323101. https:\/\/doi.org\/10.1007\/s00521-023-08857-7","journal-title":"Neural Comput Appl"},{"issue":"2024","key":"433_CR81","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/s12243-023-00987-2","volume":"79","author":"I Palam\u00e0","year":"2024","unstructured":"Palam\u00e0 I, Bartoletti S, Bianchi G, Blefari Melazzi N (2024) Experimental assessment of SDR-based 5G positioning: methodologies and insights. Ann Telecommun 79(2024):301\u2013313. https:\/\/doi.org\/10.1007\/s12243-023-00987-2","journal-title":"Ann Telecommun"},{"key":"433_CR82","unstructured":"PLT, TS 103 908 (2011) V1.1.1\u2014PowerLine telecommunications (PLT); BPSK narrow band power line channel for smart metering applications [CEN EN 14908\u20133:2006, modified]. http:\/\/portal.etsi.org\/chaircor\/ETSI_support.asp"},{"key":"433_CR83","doi-asserted-by":"publisher","first-page":"2545","DOI":"10.1007\/s11277-021-08545-6","volume":"120","author":"M Premkumar","year":"2021","unstructured":"Premkumar M, Sundararajan TVP (2021) Defense countermeasures for DoS attacks in WSNs using deep radial basis networks. Wirel Pers Commun 120:2545\u20132560. https:\/\/doi.org\/10.1007\/s11277-021-08545-6","journal-title":"Wirel Pers Commun"},{"key":"433_CR84","doi-asserted-by":"publisher","unstructured":"Pyatin IS, Boiko JM (2022) Synchronization of communication systems based on SDR. In: Proceedings of XVI international conference measurement and control in complex system (MCCS-2022), VNTU, Vinnytsia. https:\/\/doi.org\/10.31649\/mccs2022.05.","DOI":"10.31649\/mccs2022.05"},{"key":"433_CR85","doi-asserted-by":"publisher","first-page":"3512","DOI":"10.1109\/TNSE.2024.3376069","volume":"11","author":"AU Rehman","year":"2024","unstructured":"Rehman AU, Tariq N, Jan MA, Khan F, Song H, Ibrahim M (2024) A blockchain-based hybrid model for IoMT-enabled intelligent healthcare system. IEEE Trans Netw Sci Eng 11:3512\u20133521. https:\/\/doi.org\/10.1109\/TNSE.2024.3376069","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"433_CR86","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1109\/TDSC.2010.1","volume":"7","author":"R Riley","year":"2010","unstructured":"Riley R, Jiang X, Xu D (2010) An architectural approach to preventing code injection attacks. IEEE Trans Dependable Secure Comput 7:351\u2013365. https:\/\/doi.org\/10.1109\/TDSC.2010.1","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"433_CR87","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MSP.2018.2888893","volume":"36","author":"RA Riley","year":"2019","unstructured":"Riley RA, Graham JT, Fuller RM, Baldwin RO, Fisher A (2019) A new way to detect cyberattacks: extracting changes in register values from radio-frequency side channels. IEEE Signal Process Mag 36:49\u201358. https:\/\/doi.org\/10.1109\/MSP.2018.2888893","journal-title":"IEEE Signal Process Mag"},{"key":"433_CR88","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3485272","volume":"55","author":"A Rugo","year":"2023","unstructured":"Rugo A, Ardagna CA, El Ioini N (2023) A security review in the UAVNet era: threats, countermeasures, and gap analysis. ACM Comput Surv 55:1\u201335. https:\/\/doi.org\/10.1145\/3485272","journal-title":"ACM Comput Surv"},{"key":"433_CR89","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103506","volume":"160","author":"R Rukaiya","year":"2024","unstructured":"Rukaiya R, Khan SA, Farooq MU, Matloob I (2024) Communication architecture and operations for SDR-enabled UAVs network in disaster-stressed areas. Ad Hoc Netw 160:103506. https:\/\/doi.org\/10.1016\/j.adhoc.2024.103506","journal-title":"Ad Hoc Netw"},{"key":"433_CR90","doi-asserted-by":"publisher","first-page":"2928","DOI":"10.3390\/app13052928","volume":"13","author":"S Sachintha","year":"2023","unstructured":"Sachintha S, Le-Khac N-A, Scanlon M, Sayakkara AP (2023) Data exfiltration through electromagnetic covert channel of wired industrial control systems. Appl Sci 13:2928. https:\/\/doi.org\/10.3390\/app13052928","journal-title":"Appl Sci"},{"key":"433_CR91","unstructured":"Sathaye H, Schepers D, Ranganathan A, Noubir G (2019) Wireless attacks on aircraft instrument landing systems. In: The proceedings of the 28th USENIX security symposium, pp 357\u2013372. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/sathaye"},{"key":"433_CR92","doi-asserted-by":"publisher","unstructured":"Sathaye H, LaMountain G, Closas P, Ranganathan A (2022) SemperFi: anti-spoofing GPS receiver for UAVs. In: Proceedings 2022 network and distributed system security symposium. Internet Society, Reston. https:\/\/doi.org\/10.14722\/ndss.2022.23071","DOI":"10.14722\/ndss.2022.23071"},{"key":"433_CR93","doi-asserted-by":"publisher","DOI":"10.1109\/OJIM.2024.3502889","author":"F Sekak","year":"2024","unstructured":"Sekak F, Elbahhar F, Haddad M (2024) Implementation of a flexible real-time radar architecture of vital signs based on cyclic temporal moment algorithms using SDR technology. IEEE Open J Instrum Measurement. https:\/\/doi.org\/10.1109\/OJIM.2024.3502889","journal-title":"IEEE Open J Instrum Measurement"},{"key":"433_CR94","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2024.102685","volume":"62","author":"M Shahin","year":"2024","unstructured":"Shahin M, Maghanaki M, Hosseinzadeh A, Chen FF (2024) Advancing network security in industrial IoT: a deep dive into AI-enabled intrusion detection systems. Adv Eng Inform 62:102685. https:\/\/doi.org\/10.1016\/j.aei.2024.102685","journal-title":"Adv Eng Inform"},{"key":"433_CR95","doi-asserted-by":"publisher","first-page":"16953","DOI":"10.1109\/TITS.2024.3417932","volume":"25","author":"Y Shang","year":"2024","unstructured":"Shang Y, Peng Y, Ye R, Lee J (2024) Ris-assisted secure UAV communication scheme against active jamming and passive eavesdropping. IEEE Trans Intell Transp Syst 25:16953\u201316963. https:\/\/doi.org\/10.1109\/TITS.2024.3417932","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"433_CR96","doi-asserted-by":"publisher","unstructured":"Sliwa J, Suchanski M (2022) Security threats and countermeasures in military 5G systems. In: 2022 24th international microwave and radar conference (MIKON), IEEE, pp 1\u20136. https:\/\/doi.org\/10.23919\/MIKON54314.2022.9924818","DOI":"10.23919\/MIKON54314.2022.9924818"},{"key":"433_CR97","doi-asserted-by":"publisher","unstructured":"Smailes J, K\u00f6hler S, Birnbach S, Strohmeier M, Martinovic I (2023) Watch this space: securing satellite communication through resilient transmitter fingerprinting. In: Proceedings of the 2023 ACM SIGSAC conference on computer and communications security, ACM, New York, pp 608\u2013621. https:\/\/doi.org\/10.1145\/3576915.3623135","DOI":"10.1145\/3576915.3623135"},{"key":"433_CR98","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3678570","volume":"8","author":"W Song","year":"2024","unstructured":"Song W, Liu J, Han J (2024) Puppetmouse: practical and contactless mouse manipulation attack via intentional electromagnetic interference injection. Proc ACM Interact Mob Wearable Ubiquitous Technol 8:1\u201330. https:\/\/doi.org\/10.1145\/3678570","journal-title":"Proc ACM Interact Mob Wearable Ubiquitous Technol"},{"key":"433_CR99","doi-asserted-by":"publisher","first-page":"2756","DOI":"10.1002\/ejoc.201200111","volume":"2012","author":"F Tancini","year":"2012","unstructured":"Tancini F, Wu Y, Schweizer WB, Gisselbrecht J, Boudon C, Jarowski PD, Beels MT, Biaggio I, Diederich F (2012) 1,1-dicyano-4-[4-(diethylamino)phenyl]buta-1,3-dienes: structure-property relationships. Eur J Org Chem 2012:2756\u20132765. https:\/\/doi.org\/10.1002\/ejoc.201200111","journal-title":"Eur J Org Chem"},{"key":"433_CR100","doi-asserted-by":"publisher","unstructured":"Tehranipoor M, Nalla Anandakumar N, Farahmandi F (2023) EM side-channel attack on AES. In: Hardware security training, hands-on! Springer International Publishing, Cham, pp 163\u2013181. https:\/\/doi.org\/10.1007\/978-3-031-31034-8_9","DOI":"10.1007\/978-3-031-31034-8_9"},{"key":"433_CR101","unstructured":"Telecommunication PART 15-RADIO FREQUENCY DEVICES Contents (n.d)"},{"key":"433_CR102","doi-asserted-by":"publisher","unstructured":"Tennenhouse DL, Turletti T, Bose VG. (1996). The SpectrumWare testbed for ATM-based software radios. In: Proceedings of ICUPC\u20145th international conference on universal personal communications, IEEE, pp 915\u2013917. https:\/\/doi.org\/10.1109\/ICUPC.1996.562711","DOI":"10.1109\/ICUPC.1996.562711"},{"key":"433_CR103","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2024.3486657","author":"SS Titti","year":"2024","unstructured":"Titti SS, Saurabh H, Das D (2024) TYLOR:TDC-based low-overhead synthesizable power SCA countermeasure on FPGAs. IEEE Des Test. https:\/\/doi.org\/10.1109\/MDAT.2024.3486657","journal-title":"IEEE Des Test"},{"key":"433_CR104","doi-asserted-by":"publisher","unstructured":"Tolba Z, Derdour M (2021) Deep learning for cryptanalysis attack on IoMT wireless communications via smart eavesdropping. In: 2021 international conference on networking and advanced systems (ICNAS), IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICNAS53565.2021.9628924","DOI":"10.1109\/ICNAS53565.2021.9628924"},{"key":"433_CR105","unstructured":"Tu K, Al Ishtiaq A, Md Mukit Rashid S, Dong Y, Wang W, Wu T, Rafiul Hussain S, Md Mukit Rashid Yilu Dong S (2023) Logic gone astray: a security analysis framework for the control plane protocols of 5G basebands. In: Proceedings of the 33rd USENIX security symposium, pp 3063\u20133080. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/tu"},{"key":"433_CR106","doi-asserted-by":"publisher","unstructured":"Vaske A, Geise R, Reineke H (2023) Dynamic propagation channel evaluation with software defined radio architectures. In: 2023 international symposium on electromagnetic compatibility\u2014EMC Europe, IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/EMCEurope57790.2023.10274377","DOI":"10.1109\/EMCEurope57790.2023.10274377"},{"key":"433_CR107","doi-asserted-by":"publisher","first-page":"2814","DOI":"10.1016\/j.asr.2024.03.018","volume":"74","author":"VS Vinoj","year":"2024","unstructured":"Vinoj VS, Lalu V (2024) INS aided spoofing detection of high dynamic GNSS receiver for launch vehicle applications: a loosely coupled approach. Adv Space Res 74:2814\u20132829. https:\/\/doi.org\/10.1016\/j.asr.2024.03.018","journal-title":"Adv Space Res"},{"key":"433_CR108","doi-asserted-by":"publisher","unstructured":"Volgushev D, Fokin G (2022) Software-defined radio network positioning technology design. Receiver development. In: 2022 intelligent technologies and electronic devices in vehicle and road transport complex (TIRVED), IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/TIRVED56496.2022.9965455","DOI":"10.1109\/TIRVED56496.2022.9965455"},{"key":"433_CR109","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3505268","author":"G Wang","year":"2024","unstructured":"Wang G, Shi Z, Yang Y, An Z, Zhang G, Hu P, Cheng X, Cao J (2024) Wireless eavesdropping on wired audio with radio-frequency retroreflector attack. IEEE Trans Mob Comput. https:\/\/doi.org\/10.1109\/TMC.2024.3505268","journal-title":"IEEE Trans Mob Comput"},{"key":"433_CR110","doi-asserted-by":"publisher","unstructured":"Wang R, Ngo K, Dubrova E (2022) Side-Channel analysis of saber KEM using amplitude-modulated EM emanations. In: 2022 25th euromicro conference on digital system design (DSD), IEEE, pp 488\u2013495. https:\/\/doi.org\/10.1109\/DSD57027.2022.00071","DOI":"10.1109\/DSD57027.2022.00071"},{"key":"433_CR111","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13389-021-00279-2","volume":"13","author":"A Wiemers","year":"2023","unstructured":"Wiemers A, Mittmann J (2023) Improving recent side-channel attacks against the DES key schedule. J Cryptogr Eng 13:1\u201317. https:\/\/doi.org\/10.1007\/s13389-021-00279-2","journal-title":"J Cryptogr Eng"},{"key":"433_CR112","doi-asserted-by":"publisher","unstructured":"Wodo W, Stygar D, B\u0142a\u015bkiewicz P (2021) Security issues of electronic and mobile banking. In: Proceedings of the 18th international conference on security and cryptography, SCITEPRESS\u2014Science and Technology Publications, pp 631\u2013638. https:\/\/doi.org\/10.5220\/0010466606310638","DOI":"10.5220\/0010466606310638"},{"key":"433_CR113","doi-asserted-by":"publisher","unstructured":"Wu J (2020) Metric wave transmit and receive techniques. In: Advanced metric wave radar. Springer, Singapore, pp 191\u2013254. https:\/\/doi.org\/10.1007\/978-981-10-7647-3_7","DOI":"10.1007\/978-981-10-7647-3_7"},{"key":"433_CR114","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/4009078","volume":"2022","author":"J Xiao","year":"2022","unstructured":"Xiao J, Liu P, Lin H, Fang H, Xu J, Shan H, Hu H, Huang Y, Lu H (2022) Blockchain and UAV-enabled signal source identification with edge computing and wireless signal-aerial image fusion. Wirel Commun Mob Comput 2022:1\u201313. https:\/\/doi.org\/10.1155\/2022\/4009078","journal-title":"Wirel Commun Mob Comput"},{"key":"433_CR115","doi-asserted-by":"publisher","unstructured":"Xiao S, Jerry Park JM, Ye Y (2009) Tamper resistance for software defined radio software. In: 2009 33rd annual IEEE international computer software and applications conference, IEEE, pp 383\u2013391. https:\/\/doi.org\/10.1109\/COMPSAC.2009.58","DOI":"10.1109\/COMPSAC.2009.58"},{"key":"433_CR116","doi-asserted-by":"publisher","unstructured":"Xu P, Yang J, Chen G (2024) Achievable rates for physical-layer cooperative key generation with correlated eavesdropping channels. In: 2024 IEEE wireless communications and networking conference (WCNC), IEEE, pp 1\u20136. https:\/\/doi.org\/10.1109\/WCNC57260.2024.10571265","DOI":"10.1109\/WCNC57260.2024.10571265"},{"key":"433_CR117","doi-asserted-by":"publisher","unstructured":"Yu L, Hao J, Ma J, Sun Y, Zhao Y, Luo B (2024) A comprehensive analysis of security vulnerabilities and attacks in satellite modems. In: Proceedings of the 2024 on ACM SIGSAC conference on computer and communications security. ACM, New York, pp 3287\u20133301. https:\/\/doi.org\/10.1145\/3658644.3670390","DOI":"10.1145\/3658644.3670390"},{"key":"433_CR118","doi-asserted-by":"publisher","first-page":"2729","DOI":"10.18494\/SAM.2020.2783","volume":"32","author":"X-C Zheng","year":"2020","unstructured":"Zheng X-C, Sun H-M (2020) Hijacking unmanned aerial vehicle by exploiting civil GPS vulnerabilities using software-defined radio. Sens Mater 32:2729. https:\/\/doi.org\/10.18494\/SAM.2020.2783","journal-title":"Sens Mater"},{"key":"433_CR119","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1504\/IJGUC.2022.124400","volume":"13","author":"P Zhong","year":"2022","unstructured":"Zhong P (2022) Exploring the role of edge computing on the legal effect of secure collaborative download protocol. Int J Grid Utility Comput 13:173. https:\/\/doi.org\/10.1504\/IJGUC.2022.124400","journal-title":"Int J Grid Utility Comput"},{"key":"433_CR120","doi-asserted-by":"publisher","unstructured":"Zunaidi MR, Sayakkara A, Scanlon M (2024) Systematic literature review of EM-SCA attacks on encryption. https:\/\/doi.org\/10.36227\/techrxiv.170831690.06196196\/v1","DOI":"10.36227\/techrxiv.170831690.06196196\/v1"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00433-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00433-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00433-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T03:02:37Z","timestamp":1769482957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-025-00433-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,27]]},"references-count":120,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["433"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00433-x","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,27]]},"assertion":[{"value":"7 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing financial interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"19"}}