Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
A NavCom Signal Authentication Scheme Based on Twice Two-Way Satellite Time Transfer
by
Wang, Feixue
, Liu, Jiyang
, Tang, Xiaomei
, Wang, Sixin
in
Analysis
/ Authentication
/ Biometry
/ Carrier to noise ratios
/ Communication
/ Communications systems
/ Digital signatures
/ Earth orbits
/ Encryption
/ integration of communication and navigation
/ low Earth orbit
/ Low earth orbit satellites
/ Low earth orbits
/ Management systems
/ Methods
/ probability
/ Propagation
/ remote sensing
/ Satellite communications
/ Satellites
/ secure authentication
/ Spoofing
/ Systems and data security software
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
A NavCom Signal Authentication Scheme Based on Twice Two-Way Satellite Time Transfer
by
Wang, Feixue
, Liu, Jiyang
, Tang, Xiaomei
, Wang, Sixin
in
Analysis
/ Authentication
/ Biometry
/ Carrier to noise ratios
/ Communication
/ Communications systems
/ Digital signatures
/ Earth orbits
/ Encryption
/ integration of communication and navigation
/ low Earth orbit
/ Low earth orbit satellites
/ Low earth orbits
/ Management systems
/ Methods
/ probability
/ Propagation
/ remote sensing
/ Satellite communications
/ Satellites
/ secure authentication
/ Spoofing
/ Systems and data security software
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
A NavCom Signal Authentication Scheme Based on Twice Two-Way Satellite Time Transfer
by
Wang, Feixue
, Liu, Jiyang
, Tang, Xiaomei
, Wang, Sixin
in
Analysis
/ Authentication
/ Biometry
/ Carrier to noise ratios
/ Communication
/ Communications systems
/ Digital signatures
/ Earth orbits
/ Encryption
/ integration of communication and navigation
/ low Earth orbit
/ Low earth orbit satellites
/ Low earth orbits
/ Management systems
/ Methods
/ probability
/ Propagation
/ remote sensing
/ Satellite communications
/ Satellites
/ secure authentication
/ Spoofing
/ Systems and data security software
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
A NavCom Signal Authentication Scheme Based on Twice Two-Way Satellite Time Transfer
Journal Article
A NavCom Signal Authentication Scheme Based on Twice Two-Way Satellite Time Transfer
2024
Request Book From Autostore
and Choose the Collection Method
Overview
Low Earth Orbit (LEO) satellite communication systems typically achieve identity authentication through the encryption and decryption of two-way information, which requires complex key management systems. In contrast, the integration of navigation and communication (NavCom) signals provides novel opportunities for physical observation and authentication solutions due to its measurement functions. This paper introduces a novel signal authentication scheme based on twice two-way satellite time transfer (TWSTT) for LEO satellite systems. It leverages the non-mutated nature of the clock difference to ascertain the legitimacy of the signal by measuring the clock difference of signals at different instances. Unlike traditional authentication methods, this approach directly exploits the temporal and spatial characteristics of the signal, negating the necessity for intricate authorization key systems. Additionally, it adeptly tackles the challenges posed by spoofing interference. The performance analysis indicates that this scheme can achieve a high detection probability for the repeater spoofing signal in the low carrier-to-noise ratio conditions.
Publisher
MDPI AG
Subject
This website uses cookies to ensure you get the best experience on our website.