{"id":"https://openalex.org/W2025116715","doi":"https://doi.org/10.1109/glocomw.2014.7063613","title":"Secure key generation from OFDM subcarriers' channel responses","display_name":"Secure key generation from OFDM subcarriers' channel responses","publication_year":2014,"publication_date":"2014-12-01","ids":{"openalex":"https://openalex.org/W2025116715","doi":"https://doi.org/10.1109/glocomw.2014.7063613","mag":"2025116715"},"language":"en","primary_location":{"id":"doi:10.1109/glocomw.2014.7063613","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocomw.2014.7063613","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100717357","display_name":"Junqing Zhang","orcid":"https://orcid.org/0000-0002-3502-2926"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Junqing Zhang","raw_affiliation_strings":["ECIT, Queen's University Belfast, Belfast, UK","ECIT, Queen's University Belfast, Belfast, BT3 9DT, UK"],"affiliations":[{"raw_affiliation_string":"ECIT, Queen's University Belfast, Belfast, UK","institution_ids":["https://openalex.org/I126231945"]},{"raw_affiliation_string":"ECIT, Queen's University Belfast, Belfast, BT3 9DT, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081759293","display_name":"Alan Marshall","orcid":"https://orcid.org/0000-0002-8058-5242"},"institutions":[{"id":"https://openalex.org/I146655781","display_name":"University of Liverpool","ror":"https://ror.org/04xs57h96","country_code":"GB","type":"education","lineage":["https://openalex.org/I146655781"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Alan Marshall","raw_affiliation_strings":["Department of Electrical Engineering and Electronics, University of Liverpool, Liverpool, UK","[Department of Electrical Engineering and Electronics, University of Liverpool, Liverpool L69 3GJ, UK]"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Electronics, University of Liverpool, Liverpool, UK","institution_ids":["https://openalex.org/I146655781"]},{"raw_affiliation_string":"[Department of Electrical Engineering and Electronics, University of Liverpool, Liverpool L69 3GJ, UK]","institution_ids":["https://openalex.org/I146655781"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043910265","display_name":"Roger Woods","orcid":"https://orcid.org/0000-0001-6201-4270"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Roger Woods","raw_affiliation_strings":["ECIT, Queen's University Belfast, Belfast, UK","ECIT, Queen's University Belfast, Belfast, BT3 9DT, UK"],"affiliations":[{"raw_affiliation_string":"ECIT, Queen's University Belfast, Belfast, UK","institution_ids":["https://openalex.org/I126231945"]},{"raw_affiliation_string":"ECIT, Queen's University Belfast, Belfast, BT3 9DT, UK","institution_ids":["https://openalex.org/I126231945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049089848","display_name":"Trung Q. Duong","orcid":"https://orcid.org/0000-0002-4703-4836"},"institutions":[{"id":"https://openalex.org/I126231945","display_name":"Queen's University Belfast","ror":"https://ror.org/00hswnk62","country_code":"GB","type":"education","lineage":["https://openalex.org/I126231945"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Trung Q. Duong","raw_affiliation_strings":["ECIT, Queen's University Belfast, Belfast, UK","ECIT, Queen's University Belfast, Belfast, BT3 9DT, UK"],"affiliations":[{"raw_affiliation_string":"ECIT, Queen's University Belfast, Belfast, UK","institution_ids":["https://openalex.org/I126231945"]},{"raw_affiliation_string":"ECIT, Queen's University Belfast, Belfast, BT3 9DT, UK","institution_ids":["https://openalex.org/I126231945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100717357"],"corresponding_institution_ids":["https://openalex.org/I126231945"],"apc_list":null,"apc_paid":null,"fwci":1.4867,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.84513032,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1302","last_page":"1307"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6527707576751709},{"id":"https://openalex.org/keywords/subcarrier","display_name":"Subcarrier","score":0.6502846479415894},{"id":"https://openalex.org/keywords/orthogonal-frequency-division-multiplexing","display_name":"Orthogonal frequency-division multiplexing","score":0.6300907135009766},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.6283194422721863},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5309077501296997},{"id":"https://openalex.org/keywords/coherence-time","display_name":"Coherence time","score":0.49956297874450684},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4855644404888153},{"id":"https://openalex.org/keywords/multipath-propagation","display_name":"Multipath propagation","score":0.46977299451828003},{"id":"https://openalex.org/keywords/electronic-engineering","display_name":"Electronic engineering","score":0.44366705417633057},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.441927969455719},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.4250744581222534},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.419874906539917},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3111386001110077},{"id":"https://openalex.org/keywords/coherence","display_name":"Coherence (philosophical gambling strategy)","score":0.29656392335891724},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2905586361885071},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2610619068145752},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.20691829919815063},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.18098440766334534},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.1602306067943573},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13102176785469055}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6527707576751709},{"id":"https://openalex.org/C198329298","wikidata":"https://www.wikidata.org/wiki/Q586358","display_name":"Subcarrier","level":4,"score":0.6502846479415894},{"id":"https://openalex.org/C40409654","wikidata":"https://www.wikidata.org/wiki/Q375889","display_name":"Orthogonal frequency-division multiplexing","level":3,"score":0.6300907135009766},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.6283194422721863},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5309077501296997},{"id":"https://openalex.org/C47091857","wikidata":"https://www.wikidata.org/wiki/Q4118612","display_name":"Coherence time","level":3,"score":0.49956297874450684},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4855644404888153},{"id":"https://openalex.org/C161218011","wikidata":"https://www.wikidata.org/wiki/Q11827794","display_name":"Multipath propagation","level":3,"score":0.46977299451828003},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.44366705417633057},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.441927969455719},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.4250744581222534},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.419874906539917},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3111386001110077},{"id":"https://openalex.org/C2781181686","wikidata":"https://www.wikidata.org/wiki/Q4226068","display_name":"Coherence (philosophical gambling strategy)","level":2,"score":0.29656392335891724},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2905586361885071},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2610619068145752},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.20691829919815063},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.18098440766334534},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.1602306067943573},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13102176785469055}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/glocomw.2014.7063613","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocomw.2014.7063613","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.qub.ac.uk/portal:publications/ed063c83-7a4c-4345-bac0-c3d179ed7111","is_oa":false,"landing_page_url":"https://pure.qub.ac.uk/en/publications/ed063c83-7a4c-4345-bac0-c3d179ed7111","pdf_url":null,"source":{"id":"https://openalex.org/S4306402319","display_name":"Research Portal (Queen's University Belfast)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126231945","host_organization_name":"Queen's University Belfast","host_organization_lineage":["https://openalex.org/I126231945"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Zhang , J , Marshall , A , Woods , R &amp; Duong , T Q 2014 , Secure key generation from OFDM subcarriers' channel responses . in 2014 IEEE Globecom Workshops, GC Wkshps 2014 . , 7063613 , Institute of Electrical and Electronics Engineers Inc. , pp. 1302-1307 , IEEE Global Communications Conference 2014 , Austin , Texas , United States , 08/12/2014 . https://doi.org/10.1109/GLOCOMW.2014.7063613","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.41999998688697815}],"awards":[],"funders":[{"id":"https://openalex.org/F4320310133","display_name":"Rice University","ror":"https://ror.org/008zs3103"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1517403092","https://openalex.org/W1593002741","https://openalex.org/W1973956822","https://openalex.org/W2003770618","https://openalex.org/W2011582944","https://openalex.org/W2014092260","https://openalex.org/W2041310642","https://openalex.org/W2054496355","https://openalex.org/W2091729149","https://openalex.org/W2101371787","https://openalex.org/W2102187818","https://openalex.org/W2111744417","https://openalex.org/W2126477936","https://openalex.org/W2127697497","https://openalex.org/W2130917709","https://openalex.org/W2131110609","https://openalex.org/W2145417574","https://openalex.org/W2146813141","https://openalex.org/W2155086857","https://openalex.org/W2308328452","https://openalex.org/W3099399408","https://openalex.org/W3123083844","https://openalex.org/W4297562996","https://openalex.org/W6651183435","https://openalex.org/W6698157777","https://openalex.org/W6825343983"],"related_works":["https://openalex.org/W2172159377","https://openalex.org/W2091769028","https://openalex.org/W2351865055","https://openalex.org/W2020731358","https://openalex.org/W2098618074","https://openalex.org/W2534888834","https://openalex.org/W2289922692","https://openalex.org/W2906312651","https://openalex.org/W4280526795","https://openalex.org/W906573642"],"abstract_inverted_index":{"The":[0,150],"ability":[1],"to":[2,31,109],"exchange":[3],"keys":[4],"between":[5],"users":[6],"is":[7,27,60,92,154,171],"vital":[8],"in":[9,54,115],"any":[10],"wireless":[11,25],"based":[12,48],"security":[13],"system.":[14],"A":[15],"key":[16,33,38,45,164,168,204],"generation":[17,46],"technique":[18],"which":[19],"exploits":[20],"the":[21,24,50,101,106,116,129,133,143,147,167,185,189,200,203],"randomness":[22,170,201],"of":[23,120,176,202],"channel":[26,52,68,71,90,122,130,140,148,152],"a":[28,43,65,76,94],"promising":[29],"alternative":[30],"existing":[32],"distribution":[34],"techniques,":[35],"e.g.,":[36],"public":[37],"cryptography.":[39],"In":[40],"this":[41],"paper,":[42],"secure":[44],"scheme":[47],"on":[49],"subcarriers'":[51,139],"responses":[53,141],"orthogonal":[55],"frequency-division":[56],"multiplexing":[57],"(OFDM)":[58],"systems":[59],"proposed.":[61],"We":[62,98],"first":[63],"implement":[64],"time-variant":[66],"multipath":[67],"with":[69],"its":[70],"impulse":[72],"response":[73,91,153],"modelled":[74],"as":[75,105,146,194],"wide":[77],"sense":[78],"stationary":[79],"(WSS)":[80],"uncorrelated":[81],"scattering":[82],"random":[83,96],"process":[84],"and":[85,124,161,178,184],"demonstrate":[86],"that":[87,126,188],"each":[88,121],"subcarrier's":[89,151],"also":[93],"WSS":[95],"process.":[97],"then":[99,155],"define":[100],"X%":[102,112,158],"coherence":[103,159,196],"time":[104,107,160,197],"required":[108],"produce":[110],"an":[111],"correlation":[113],"coefficient":[114],"autocorrelation":[117],"function":[118],"(ACF)":[119],"tap,":[123],"find":[125],"when":[127],"all":[128,138],"taps":[131],"have":[132],"same":[134,144],"Doppler":[135],"power":[136],"spectrum,":[137],"has":[142],"ACF":[145],"taps.":[149],"sampled":[156],"every":[157],"quantized":[162],"into":[163],"bits.":[165],"All":[166],"sequences'":[169],"tested":[172],"using":[173],"National":[174],"Institute":[175],"Standards":[177],"Technology":[179],"(NIST)":[180],"statistical":[181],"test":[182],"suite":[183],"results":[186],"indicate":[187],"commonly":[190],"used":[191],"sampling":[192],"interval":[193],"50%":[195],"cannot":[198],"guarantee":[199],"sequence.":[205]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
