MILCOM 2013 - 2013 IEEE Military Communications Conference 2013
DOI: 10.1109/milcom.2013.88
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Watermarking of Direct Sequence Spread Spectrum Signals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
4
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 15 publications
(27 reference statements)
1
4
0
Order By: Relevance
“…Our key idea is that backscatter tags, upon transmission, could intentionally flip one or more chips to enable the receiver to identify the transmitter, without altering the original data. This is similar to recent efforts in using the 802.15.4 chip sequence as steganographic channel [9,12,24] or watermarking [11] but with a focus on authentication for ultra-low-power backscatter devices. Similar mechanisms could be implemented in other parts of the packets as we discuss in Section 6.…”
Section: Introductionsupporting
confidence: 67%
See 1 more Smart Citation
“…Our key idea is that backscatter tags, upon transmission, could intentionally flip one or more chips to enable the receiver to identify the transmitter, without altering the original data. This is similar to recent efforts in using the 802.15.4 chip sequence as steganographic channel [9,12,24] or watermarking [11] but with a focus on authentication for ultra-low-power backscatter devices. Similar mechanisms could be implemented in other parts of the packets as we discuss in Section 6.…”
Section: Introductionsupporting
confidence: 67%
“…They demonstrate the possibility of creating a covert channel with the same data rate as 802.15.4, with a low impact on the bit error rate and only a slight decrease in receiver sensitivity. Li et al study the same issues for watermarking in 802.15.4 and also implement a prototype system to gain experimental results [11]. Nain et al extend the channel with acknowledgements to make it reliable [13].…”
Section: Related Workmentioning
confidence: 99%
“…On average, the extra SNR required for each additional flipped chip is 1.99 dB, which is similar to the theoretical result. Please refer to [38] for more details.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Thus, the legitimate transceiver communication can be protected against jamming and spoofing attacks. The drawbacks of DSSS scheme against jammers are investigated in [4]. This drawback is defined in such a way that when PN sequence of jammer is matched with the transmitter's PN sequence, the legitimate receiver can be jammed.…”
Section: Introductionmentioning
confidence: 99%