{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2013:ROS6GYO74OI4LNYS5PBWXSY7PD","short_pith_number":"pith:ROS6GYO7","schema_version":"1.0","canonical_sha256":"8ba5e361dfe391c5b712ebc36bcb1f78e9a03322282adfe931c6737b5d0893be","source":{"kind":"arxiv","id":"1303.0707","version":2},"attestation_state":"computed","paper":{"title":"On the Achievable Error Region of Physical Layer Authentication Techniques over Rayleigh Fading Channels","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","math.IT"],"primary_cat":"cs.IT","authors_text":"Augusto Ferrante, Chiara Masiero, Michele Pavon, Nicola Laurenti, Stefano Tomasin","submitted_at":"2013-03-04T14:26:17Z","abstract_excerpt":"For a physical layer message authentication procedure based on the comparison of channel estimates obtained from the received messages, we focus on an outer bound on the type I/II error probability region. Channel estimates are modelled as multivariate Gaussian vectors, and we assume that the attacker has only some side information on the channel estimate, which he does not know directly. We derive the attacking strategy that provides the tightest bound on the error region, given the statistics of the side information. This turns out to be a zero mean, circularly symmetric Gaussian density who"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1303.0707","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.IT","submitted_at":"2013-03-04T14:26:17Z","cross_cats_sorted":["cs.CR","math.IT"],"title_canon_sha256":"9028b625bec5fdbefa71da3cf6a74ca7463f60e60dc10069ad354919cf47554c","abstract_canon_sha256":"3014acac8e671c41f269b20c2614821c5c29b09fc1f26953c387b6cf08c303f1"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T01:03:24.565610Z","signature_b64":"HUJYf1K3wByUnNcSqvSUjvXtLpJU0Kb0E7PLmFNs8vPbmSr3mTAf+lIT8ro1NsNcYqhS7j6y7YR15KZzDF2KDw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"8ba5e361dfe391c5b712ebc36bcb1f78e9a03322282adfe931c6737b5d0893be","last_reissued_at":"2026-05-18T01:03:24.564981Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T01:03:24.564981Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"On the Achievable Error Region of Physical Layer Authentication Techniques over Rayleigh Fading Channels","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.CR","math.IT"],"primary_cat":"cs.IT","authors_text":"Augusto Ferrante, Chiara Masiero, Michele Pavon, Nicola Laurenti, Stefano Tomasin","submitted_at":"2013-03-04T14:26:17Z","abstract_excerpt":"For a physical layer message authentication procedure based on the comparison of channel estimates obtained from the received messages, we focus on an outer bound on the type I/II error probability region. Channel estimates are modelled as multivariate Gaussian vectors, and we assume that the attacker has only some side information on the channel estimate, which he does not know directly. We derive the attacking strategy that provides the tightest bound on the error region, given the statistics of the side information. This turns out to be a zero mean, circularly symmetric Gaussian density who"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1303.0707","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1303.0707","created_at":"2026-05-18T01:03:24.565066+00:00"},{"alias_kind":"arxiv_version","alias_value":"1303.0707v2","created_at":"2026-05-18T01:03:24.565066+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1303.0707","created_at":"2026-05-18T01:03:24.565066+00:00"},{"alias_kind":"pith_short_12","alias_value":"ROS6GYO74OI4","created_at":"2026-05-18T12:27:59.945178+00:00"},{"alias_kind":"pith_short_16","alias_value":"ROS6GYO74OI4LNYS","created_at":"2026-05-18T12:27:59.945178+00:00"},{"alias_kind":"pith_short_8","alias_value":"ROS6GYO7","created_at":"2026-05-18T12:27:59.945178+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/ROS6GYO74OI4LNYS5PBWXSY7PD","json":"https://pith.science/pith/ROS6GYO74OI4LNYS5PBWXSY7PD.json","graph_json":"https://pith.science/api/pith-number/ROS6GYO74OI4LNYS5PBWXSY7PD/graph.json","events_json":"https://pith.science/api/pith-number/ROS6GYO74OI4LNYS5PBWXSY7PD/events.json","paper":"https://pith.science/paper/ROS6GYO7"},"agent_actions":{"view_html":"https://pith.science/pith/ROS6GYO74OI4LNYS5PBWXSY7PD","download_json":"https://pith.science/pith/ROS6GYO74OI4LNYS5PBWXSY7PD.json","view_paper":"https://pith.science/paper/ROS6GYO7","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1303.0707&json=true","fetch_graph":"https://pith.science/api/pith-number/ROS6GYO74OI4LNYS5PBWXSY7PD/graph.json","fetch_events":"https://pith.science/api/pith-number/ROS6GYO74OI4LNYS5PBWXSY7PD/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/ROS6GYO74OI4LNYS5PBWXSY7PD/action/timestamp_anchor","attest_storage":"https://pith.science/pith/ROS6GYO74OI4LNYS5PBWXSY7PD/action/storage_attestation","attest_author":"https://pith.science/pith/ROS6GYO74OI4LNYS5PBWXSY7PD/action/author_attestation","sign_citation":"https://pith.science/pith/ROS6GYO74OI4LNYS5PBWXSY7PD/action/citation_signature","submit_replication":"https://pith.science/pith/ROS6GYO74OI4LNYS5PBWXSY7PD/action/replication_record"}},"created_at":"2026-05-18T01:03:24.565066+00:00","updated_at":"2026-05-18T01:03:24.565066+00:00"}