{"id":"https://openalex.org/W4319342037","doi":"https://doi.org/10.1109/access.2023.3243063","title":"Secret Key Generation Between Ambient Backscatter Devices","display_name":"Secret Key Generation Between Ambient Backscatter Devices","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4319342037","doi":"https://doi.org/10.1109/access.2023.3243063"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3243063","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3243063","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10040105.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10040105.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041386963","display_name":"Jari Lietz\u00e9n","orcid":"https://orcid.org/0000-0002-7908-4547"},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Jari Lietzen","raw_affiliation_strings":["Department of Communications and Networking, Aalto University, Espoo, Finland"],"raw_orcid":"https://orcid.org/0000-0002-7908-4547","affiliations":[{"raw_affiliation_string":"Department of Communications and Networking, Aalto University, Espoo, Finland","institution_ids":["https://openalex.org/I9927081"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006597250","display_name":"Olav Tirkkonen","orcid":"https://orcid.org/0000-0002-2611-1636"},"institutions":[{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Olav Tirkkonen","raw_affiliation_strings":["Department of Communications and Networking, Aalto University, Espoo, Finland"],"raw_orcid":"https://orcid.org/0000-0002-2611-1636","affiliations":[{"raw_affiliation_string":"Department of Communications and Networking, Aalto University, Espoo, Finland","institution_ids":["https://openalex.org/I9927081"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5041386963"],"corresponding_institution_ids":["https://openalex.org/I9927081"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.2555,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.50168083,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"11","issue":null,"first_page":"13456","last_page":"13468"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9513999819755554,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7877233028411865},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7770252227783203},{"id":"https://openalex.org/keywords/backscatter","display_name":"Backscatter (email)","score":0.7476382851600647},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.699906587600708},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6867427229881287},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.5760068297386169},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3845739960670471},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3722337484359741},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.359463632106781},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.27412813901901245},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2544402480125427}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7877233028411865},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7770252227783203},{"id":"https://openalex.org/C30354325","wikidata":"https://www.wikidata.org/wiki/Q204667","display_name":"Backscatter (email)","level":3,"score":0.7476382851600647},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.699906587600708},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6867427229881287},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.5760068297386169},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3845739960670471},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3722337484359741},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.359463632106781},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.27412813901901245},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2544402480125427}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/access.2023.3243063","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3243063","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10040105.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:aaltodoc.aalto.fi:123456789/121486","is_oa":true,"landing_page_url":"https://aaltodoc.aalto.fi/handle/123456789/121486","pdf_url":"https://aaltodoc.aalto.fi/bitstreams/39082f66-adb7-49d9-8615-4aa130a373fd/download","source":{"id":"https://openalex.org/S4306401663","display_name":"Aaltodoc (Aalto University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9927081","host_organization_name":"Aalto University","host_organization_lineage":["https://openalex.org/I9927081"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/doctoralThesis"},{"id":"pmh:oai:aaltodoc.aalto.fi:123456789/120006","is_oa":true,"landing_page_url":"https://research.aalto.fi/en/publications/a11c24d0-cb4a-4957-bdd0-2fdd825b2256","pdf_url":null,"source":{"id":"https://openalex.org/S4306401662","display_name":"Aaltodoc (Aalto University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9927081","host_organization_name":"Aalto University","host_organization_lineage":["https://openalex.org/I9927081"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"publishedVersion"},{"id":"pmh:oai:doaj.org/article:ad6cf14023dc49acae19204a16cdfd8d","is_oa":true,"landing_page_url":"https://doaj.org/article/ad6cf14023dc49acae19204a16cdfd8d","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 13456-13468 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3243063","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3243063","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10040105.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3146041931","display_name":"Quantum-Classical Coding and Communications","funder_award_id":"334539","funder_id":"https://openalex.org/F4320321108","funder_display_name":"Academy of Finland"},{"id":"https://openalex.org/G8564975027","display_name":null,"funder_award_id":"334539","funder_id":"https://openalex.org/F4320321108","funder_display_name":"Academy of Finland"}],"funders":[{"id":"https://openalex.org/F4320321108","display_name":"Academy of Finland","ror":"https://ror.org/05k73zm37"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4319342037.pdf","grobid_xml":"https://content.openalex.org/works/W4319342037.grobid-xml"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W60616127","https://openalex.org/W1970334960","https://openalex.org/W1987380770","https://openalex.org/W2000172548","https://openalex.org/W2007562433","https://openalex.org/W2019258915","https://openalex.org/W2025212043","https://openalex.org/W2038902920","https://openalex.org/W2040824660","https://openalex.org/W2041235917","https://openalex.org/W2042460777","https://openalex.org/W2054496355","https://openalex.org/W2087248844","https://openalex.org/W2091729149","https://openalex.org/W2092211970","https://openalex.org/W2101371787","https://openalex.org/W2102187818","https://openalex.org/W2106833918","https://openalex.org/W2108173439","https://openalex.org/W2108777864","https://openalex.org/W2110358873","https://openalex.org/W2131110609","https://openalex.org/W2142095519","https://openalex.org/W2161081468","https://openalex.org/W2171595831","https://openalex.org/W2476563174","https://openalex.org/W2568956448","https://openalex.org/W2770587725","https://openalex.org/W2775135700","https://openalex.org/W2794806662","https://openalex.org/W2893939120","https://openalex.org/W2898104747","https://openalex.org/W2936286493","https://openalex.org/W2969468102","https://openalex.org/W2970769336","https://openalex.org/W2982697940","https://openalex.org/W3081147527","https://openalex.org/W3107556423","https://openalex.org/W3141610964","https://openalex.org/W3156928296","https://openalex.org/W3176038515","https://openalex.org/W4242781462","https://openalex.org/W4289655216"],"related_works":["https://openalex.org/W2502435347","https://openalex.org/W3125305833","https://openalex.org/W2560394302","https://openalex.org/W2013817888","https://openalex.org/W2363759744","https://openalex.org/W2348393504","https://openalex.org/W2000260307","https://openalex.org/W2380713189","https://openalex.org/W269309995","https://openalex.org/W3094714434"],"abstract_inverted_index":{"We":[0,49,76],"analyze":[1,50],"secret":[2,153],"key":[3,47,92,154,171],"generation":[4,155],"between":[5,12,38,90,106],"ambient":[6,14,108],"backscatter":[7,18,112],"devices":[8,19,28,113],"where":[9,157],"the":[10,17,36,43,51,68,72,79,84,95,99,104,107,111,126,163,170,193,201],"channel":[11,37,105,117],"an":[13,132],"transmitter":[15,109],"and":[16,59,87,94,110,187],"is":[20,140,148,159,184,189],"used":[21],"as":[22],"a":[23,137,143,180,190,197],"source":[24],"of":[25,45,98,200],"randomness.":[26],"The":[27],"do":[29],"not":[30,141],"need":[31],"to":[32,63,131,161,173],"estimate":[33,83],"or":[34],"measure":[35],"themselves,":[39],"which":[40],"greatly":[41],"simplifies":[42],"gathering":[44],"raw":[46],"material.":[48],"eavesdropper\u2019s":[52,85,96],"mutual":[53],"information":[54,66,168],"based":[55,182],"on":[56],"fundamental":[57],"principles":[58],"apply":[60],"privacy":[61],"amplification":[62],"remove":[64],"any":[65,167],"that":[67,121,179,192],"eavesdropper":[69,133,164,194],"overheard":[70],"during":[71],"error":[73,174],"correction":[74],"phase.":[75],"show":[77,120,178],"how":[78],"legitimate":[80,129],"users":[81,130],"can":[82],"knowledge":[86,97],"trade":[88],"off":[89],"achievable":[91],"rate":[93],"final":[100,202],"key.":[101,203],"When":[102],"modeling":[103],"using":[114],"state-of-the-art":[115],"3GPP":[116],"models":[118],"we":[119],"even":[122],"in":[123,149],"non-line-of-sight":[124],"channels":[125],"distance":[127,158,181],"from":[128,165],"being":[134],"larger":[135],"than":[136],"few":[138],"wavelengths":[139],"alone":[142],"sufficient":[144],"security":[145],"guarantee.":[146],"This":[147],"contrast":[150],"with":[151],"previous":[152],"methods":[156],"assumed":[160],"prevent":[162],"having":[166],"about":[169],"prior":[172],"correction.":[175],"Our":[176],"simulations":[177],"approach":[183],"too":[185],"optimistic":[186],"there":[188],"possibility":[191],"still":[195],"knows":[196],"substantial":[198],"part":[199]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
