{"id":"https://openalex.org/W2154793448","doi":"https://doi.org/10.1109/icc.2009.5199440","title":"Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits","display_name":"Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits","publication_year":2009,"publication_date":"2009-06-01","ids":{"openalex":"https://openalex.org/W2154793448","doi":"https://doi.org/10.1109/icc.2009.5199440","mag":"2154793448"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2009.5199440","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2009.5199440","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020384519","display_name":"Jon W. Wallace","orcid":"https://orcid.org/0000-0003-0414-8734"},"institutions":[{"id":"https://openalex.org/I193619901","display_name":"Constructor University","ror":"https://ror.org/02yrs2n53","country_code":"DE","type":"education","lineage":["https://openalex.org/I193619901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"J. Wallace","raw_affiliation_strings":["School of Engineering and Science, Jacobs University Bremen, Bremen, Germany"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Science, Jacobs University Bremen, Bremen, Germany","institution_ids":["https://openalex.org/I193619901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5020384519"],"corresponding_institution_ids":["https://openalex.org/I193619901"],"apc_list":null,"apc_paid":null,"fwci":4.2674,"has_fulltext":false,"cited_by_count":81,"citation_normalized_percentile":{"value":0.94401158,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7651528716087341},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.750144898891449},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6357163786888123},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6019477844238281},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.5481753945350647},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.5380333065986633},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.537287712097168},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5369199514389038},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.46172159910202026},{"id":"https://openalex.org/keywords/secure-channel","display_name":"Secure channel","score":0.4464617371559143},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.41524291038513184},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.348539263010025},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20669662952423096},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2005676031112671},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.15758466720581055}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7651528716087341},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.750144898891449},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6357163786888123},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6019477844238281},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.5481753945350647},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.5380333065986633},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.537287712097168},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5369199514389038},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.46172159910202026},{"id":"https://openalex.org/C180073179","wikidata":"https://www.wikidata.org/wiki/Q3304359","display_name":"Secure channel","level":3,"score":0.4464617371559143},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.41524291038513184},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.348539263010025},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20669662952423096},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2005676031112671},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.15758466720581055}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icc.2009.5199440","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2009.5199440","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Communications","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.497.6911","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.497.6911","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.faculty.jacobs-university.de/jwallace/xwallace/pubs/wallace/2009/icc09_keygen.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1969671874","https://openalex.org/W2131580663","https://openalex.org/W2138009247","https://openalex.org/W2142795465","https://openalex.org/W2144387589","https://openalex.org/W2145577744","https://openalex.org/W2156214717"],"related_works":["https://openalex.org/W4360996312","https://openalex.org/W1919042217","https://openalex.org/W3205185567","https://openalex.org/W2951637176","https://openalex.org/W2995273700","https://openalex.org/W3080982036","https://openalex.org/W2150528942","https://openalex.org/W2529506699","https://openalex.org/W1747611275","https://openalex.org/W2154793448"],"abstract_inverted_index":{"There":[0],"is":[1,37,80,103],"growing":[2],"interest":[3],"in":[4,31,75],"wireless":[5],"security":[6],"methods":[7,53],"that":[8,44],"provide":[9],"strong":[10],"or":[11,34],"even":[12],"perfect":[13],"secrecy":[14,46],"by":[15,116],"taking":[16],"advantage":[17],"of":[18,20,59,106,136,146,153],"features":[19],"the":[21,57,60,100,107,110,132,144,154],"physical":[22],"propagation":[23],"channel.":[24,98],"In":[25,129],"advantage-based":[26],"methods,":[27],"high":[28],"channel":[29,73,102,168,171],"quality":[30,58],"an":[32],"average":[33],"opportunistic":[35],"sense":[36],"exploited":[38],"between":[39],"two":[40,86],"legitimate":[41,108,157],"nodes,":[42],"such":[43,52],"nonzero":[45],"capacity":[47],"can":[48,112],"be":[49,114],"achieved.":[50],"Since":[51,99],"require":[54],"bounds":[55],"on":[56,71,93,143],"eavesdropper":[61,101,155],"channel,":[62,109],"they":[63],"are":[64,121,126,140,165],"somewhat":[65],"impractical.":[66],"Secret":[67],"key":[68,90,111,137,162],"generation":[69,138,163],"based":[70,92,142],"tracking":[72],"evolution":[74],"time":[76],"division":[77],"duplex":[78],"systems":[79],"a":[81,94],"more":[82],"attractive":[83],"option,":[84],"where":[85],"nodes":[87],"generate":[88],"secret":[89],"bits":[91],"mutually":[95],"known":[96],"random":[97],"typically":[104],"independent":[105],"only":[113],"broken":[115],"brute":[117],"force":[118],"attacks,":[119],"which":[120],"difficult":[122],"when":[123],"new":[124],"keys":[125],"continuously":[127],"generated.":[128],"this":[130],"paper,":[131],"information":[133],"theoretic":[134],"limits":[135],"schemes":[139,164],"investigated,":[141],"level":[145],"estimation":[147],"error,":[148],"temporal":[149],"correlation,":[150],"and":[151,156,170],"dependence":[152],"channels.":[158],"Three":[159],"practical":[160],"candidate":[161],"also":[166],"considered:":[167],"quantization":[169,172],"with":[173],"guardband.":[174]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":10},{"year":2013,"cited_by_count":9},{"year":2012,"cited_by_count":4}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
