Skip to main content

Table 1 Implementation complexity

From: Binary phase hopping based spreading code authentication technique

Method number

Code sequence generator

Percentage increased (%)

Correlator

Percentage increased (%)

Non-authentication

Authentication

Non-authentication

Authentication

1

1

2

100

6

7

16.7

2

1

2

100

6

7

16.7

3

2

3

50

12

14

16.7