Fig. 2From: Advances of SBAS authentication technologiesmessage authentication code principleBack to article page