{"id":"https://openalex.org/W4206940814","doi":"https://doi.org/10.1109/gcwkshps52748.2021.9682116","title":"Secrecy Rate Comparison of Key-based Encrypted Data Transmission and Keyless Secure Transmission","display_name":"Secrecy Rate Comparison of Key-based Encrypted Data Transmission and Keyless Secure Transmission","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W4206940814","doi":"https://doi.org/10.1109/gcwkshps52748.2021.9682116"},"language":"en","primary_location":{"id":"doi:10.1109/gcwkshps52748.2021.9682116","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshps52748.2021.9682116","pdf_url":null,"source":{"id":"https://openalex.org/S4363605397","display_name":"2021 IEEE Globecom Workshops (GC Wkshps)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048533552","display_name":"Ziyao Yu","orcid":"https://orcid.org/0000-0002-9568-6425"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Ziyao Yu","raw_affiliation_strings":["School of Electrical and Information Engineering, University of Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Information Engineering, University of Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021597140","display_name":"Zijie Ji","orcid":"https://orcid.org/0000-0001-5213-3380"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zijie Ji","raw_affiliation_strings":["School of Information and Electronics, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information and Electronics, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064721659","display_name":"Phee Lep Yeoh","orcid":"https://orcid.org/0000-0002-2516-4226"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Phee Lep Yeoh","raw_affiliation_strings":["School of Electrical and Information Engineering, University of Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Information Engineering, University of Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048533552"],"corresponding_institution_ids":["https://openalex.org/I129604602"],"apc_list":null,"apc_paid":null,"fwci":0.4341,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.52485883,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"5","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.8415156602859497},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7825180888175964},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.7705907225608826},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.7305642366409302},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.682909369468689},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.6446123123168945},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.597895622253418},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5711918473243713},{"id":"https://openalex.org/keywords/transmitter-power-output","display_name":"Transmitter power output","score":0.5321290493011475},{"id":"https://openalex.org/keywords/interval","display_name":"Interval (graph theory)","score":0.5000991821289062},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.457454115152359},{"id":"https://openalex.org/keywords/phy","display_name":"PHY","score":0.44443055987358093},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.41017818450927734},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3434997797012329},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.2745629549026489},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2559746503829956},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.207411527633667},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11141565442085266}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.8415156602859497},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7825180888175964},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.7705907225608826},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.7305642366409302},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.682909369468689},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.6446123123168945},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.597895622253418},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5711918473243713},{"id":"https://openalex.org/C65422117","wikidata":"https://www.wikidata.org/wiki/Q358527","display_name":"Transmitter power output","level":4,"score":0.5321290493011475},{"id":"https://openalex.org/C2778067643","wikidata":"https://www.wikidata.org/wiki/Q166507","display_name":"Interval (graph theory)","level":2,"score":0.5000991821289062},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.457454115152359},{"id":"https://openalex.org/C41918916","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"PHY","level":4,"score":0.44443055987358093},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.41017818450927734},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3434997797012329},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.2745629549026489},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2559746503829956},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.207411527633667},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11141565442085266},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/gcwkshps52748.2021.9682116","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshps52748.2021.9682116","pdf_url":null,"source":{"id":"https://openalex.org/S4363605397","display_name":"2021 IEEE Globecom Workshops (GC Wkshps)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1970334960","https://openalex.org/W2093554016","https://openalex.org/W2122988249","https://openalex.org/W2126423090","https://openalex.org/W2293807708","https://openalex.org/W2529677322","https://openalex.org/W2774383462","https://openalex.org/W3007256892","https://openalex.org/W3045385301","https://openalex.org/W3132465714","https://openalex.org/W3168698828","https://openalex.org/W6796527440"],"related_works":["https://openalex.org/W2996753265","https://openalex.org/W4200213821","https://openalex.org/W4320855464","https://openalex.org/W1497739254","https://openalex.org/W3102113127","https://openalex.org/W2558750328","https://openalex.org/W2001401221","https://openalex.org/W3126335992","https://openalex.org/W2504171572","https://openalex.org/W2040789709"],"abstract_inverted_index":{"This":[0],"paper":[1],"compares":[2],"the":[3,35,44,57,66,70,73,81,91,120,125],"secrecy":[4,36,58,116],"rate":[5,37,59,117],"of":[6,12,34,60],"two":[7],"general":[8],"PHY":[9],"security":[10],"approaches":[11],"keyless":[13],"secure":[14],"transmission":[15,21],"(ST)":[16],"and":[17,48,72,84,127],"key-based":[18],"encrypted":[19],"data":[20],"(EDT)":[22],"in":[23,129],"a":[24,114],"multiple-input":[25],"single-output,":[26],"single":[27],"eavesdropper":[28,51,121],"(MISOSE)":[29],"system.":[30],"Specifically,":[31],"closed-form":[32],"approximations":[33],"for":[38,43],"both":[39],"schemes":[40],"are":[41,95],"derived":[42],"same":[45],"coherence":[46,82],"interval":[47,83],"under":[49],"uncertain":[50],"location.":[52],"Our":[53,102],"results":[54,103],"highlight":[55,105],"that":[56],"ST":[61,109],"is":[62,77],"highly":[63],"dependent":[64],"on":[65,90,119],"propagation":[67],"distance":[68],"between":[69],"transmitter":[71,126],"eavesdropper,":[74],"whilst":[75],"EDT":[76,111],"more":[78],"impacted":[79],"by":[80],"transmit":[85],"power.":[86],"Numerical":[87],"simulations":[88],"based":[89,118],"IMT-2020":[92],"channel":[93],"model":[94],"presented":[96],"to":[97,124],"support":[98],"our":[99],"analytical":[100],"results.":[101],"clearly":[104],"different":[106],"regions":[107],"where":[108],"or":[110],"can":[112],"achieve":[113],"higher":[115],"location":[122],"relative":[123],"receiver":[128],"an":[130],"11":[131],"m":[132,135],"\u00d7":[133],"5":[134],"area.":[136]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
