{"id":"https://openalex.org/W2543443670","doi":"https://doi.org/10.1109/itw.2016.7606793","title":"Jamming-resistant frequency hopping system with secret key generation from channel observations","display_name":"Jamming-resistant frequency hopping system with secret key generation from channel observations","publication_year":2016,"publication_date":"2016-09-01","ids":{"openalex":"https://openalex.org/W2543443670","doi":"https://doi.org/10.1109/itw.2016.7606793","mag":"2543443670"},"language":"en","primary_location":{"id":"doi:10.1109/itw.2016.7606793","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2016.7606793","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058768656","display_name":"Chia\u2010Yu Liu","orcid":"https://orcid.org/0000-0002-2837-3461"},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Chia-Yu Liu","raw_affiliation_strings":["Institute of Communications Engineering, National Tsing Hua University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Institute of Communications Engineering, National Tsing Hua University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I25846049"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009791512","display_name":"Y.-W. Peter Hong","orcid":"https://orcid.org/0000-0001-7043-8276"},"institutions":[{"id":"https://openalex.org/I25846049","display_name":"National Tsing Hua University","ror":"https://ror.org/00zdnkx70","country_code":"TW","type":"education","lineage":["https://openalex.org/I25846049"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Y.-W. Peter Hong","raw_affiliation_strings":["Institute of Communications Engineering, National Tsing Hua University, Hsinchu, Taiwan"],"affiliations":[{"raw_affiliation_string":"Institute of Communications Engineering, National Tsing Hua University, Hsinchu, Taiwan","institution_ids":["https://openalex.org/I25846049"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089487198","display_name":"Pin-Hsun Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I78650965","display_name":"TU Dresden","ror":"https://ror.org/042aqky30","country_code":"DE","type":"education","lineage":["https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Pin-Hsun Lin","raw_affiliation_strings":["Faculty of Electrical and Computer Engineering, Technische Universitat Dresden, Dresden, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical and Computer Engineering, Technische Universitat Dresden, Dresden, Germany","institution_ids":["https://openalex.org/I78650965"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029956964","display_name":"Eduard A. Jorswieck","orcid":"https://orcid.org/0000-0001-7893-8435"},"institutions":[{"id":"https://openalex.org/I78650965","display_name":"TU Dresden","ror":"https://ror.org/042aqky30","country_code":"DE","type":"education","lineage":["https://openalex.org/I78650965"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Eduard A. Jorswieck","raw_affiliation_strings":["Faculty of Electrical and Computer Engineering, Technische Universitat Dresden, Dresden, Germany"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical and Computer Engineering, Technische Universitat Dresden, Dresden, Germany","institution_ids":["https://openalex.org/I78650965"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5058768656"],"corresponding_institution_ids":["https://openalex.org/I25846049"],"apc_list":null,"apc_paid":null,"fwci":0.5623,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.71734236,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"5","issue":null,"first_page":"46","last_page":"50"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.7795047760009766},{"id":"https://openalex.org/keywords/frequency-hopping-spread-spectrum","display_name":"Frequency-hopping spread spectrum","score":0.7217767238616943},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7217506766319275},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.6665347218513489},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.60942542552948},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5680786371231079},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5536424517631531},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5145558714866638},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5067370533943176},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4984555244445801},{"id":"https://openalex.org/keywords/alice-and-bob","display_name":"Alice and Bob","score":0.4941540062427521},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.4843060076236725},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.32721972465515137},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24748605489730835},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08322495222091675}],"concepts":[{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.7795047760009766},{"id":"https://openalex.org/C122962297","wikidata":"https://www.wikidata.org/wiki/Q1136013","display_name":"Frequency-hopping spread spectrum","level":2,"score":0.7217767238616943},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7217506766319275},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.6665347218513489},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.60942542552948},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5680786371231079},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5536424517631531},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5145558714866638},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5067370533943176},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4984555244445801},{"id":"https://openalex.org/C127964579","wikidata":"https://www.wikidata.org/wiki/Q649676","display_name":"Alice and Bob","level":3,"score":0.4941540062427521},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.4843060076236725},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.32721972465515137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24748605489730835},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08322495222091675},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C2778222013","wikidata":"https://www.wikidata.org/wiki/Q1136926","display_name":"Alice (programming language)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/itw.2016.7606793","is_oa":false,"landing_page_url":"https://doi.org/10.1109/itw.2016.7606793","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Information Theory Workshop (ITW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1973956822","https://openalex.org/W1980201978","https://openalex.org/W1995600116","https://openalex.org/W2069855711","https://openalex.org/W2106833918","https://openalex.org/W2108777864","https://openalex.org/W2124280970","https://openalex.org/W2131110609","https://openalex.org/W2131580663","https://openalex.org/W2139202155","https://openalex.org/W2143854845","https://openalex.org/W2149808502","https://openalex.org/W2154793448","https://openalex.org/W2156239388","https://openalex.org/W2162926971","https://openalex.org/W2163754837","https://openalex.org/W3123083844"],"related_works":["https://openalex.org/W4362501885","https://openalex.org/W2072557226","https://openalex.org/W2364658003","https://openalex.org/W2996695026","https://openalex.org/W2356164603","https://openalex.org/W3186736830","https://openalex.org/W2766780944","https://openalex.org/W2380214240","https://openalex.org/W2352307089","https://openalex.org/W2392336977"],"abstract_inverted_index":{"This":[0],"work":[1],"proposes":[2],"a":[3,21,93],"jamming-resistant":[4],"frequency":[5],"hopping":[6],"(FH)":[7],"system":[8],"that":[9,51,168,187,216],"utilizes":[10],"local":[11,68],"channel":[12,72,161],"observations":[13,69],"for":[14,158,169,202],"secret":[15,40,85],"key":[16,119],"generation":[17,120],"(SKG).":[18],"FH":[19,54,109,129,180],"is":[20,56],"spread":[22],"spectrum":[23],"technique":[24],"used":[25,57,105],"in":[26,100,111,131,163,171],"both":[27,59],"military":[28],"and":[29,47,65,160,167,182,204,213],"consumer":[30],"wireless":[31],"applications":[32],"to":[33,49,81,106,126,137,228],"avoid":[34],"jamming":[35],"attacks,":[36],"but":[37],"requires":[38],"pre-shared":[39],"keys":[41],"among":[42],"communicating":[43],"terminals,":[44],"say":[45],"Alice":[46,64],"Bob,":[48],"ensure":[50],"the":[52,71,76,83,95,108,112,118,128,132,139,147,155,164,172,177,183,188,196,207,218,222,230,233],"same":[53],"sequence":[55,96,110,130],"at":[58,192],"sides.":[60],"In":[61,115],"our":[62],"scheme,":[63],"Bob":[66],"utilize":[67],"of":[70,78,97,179,185,232],"between":[73,154,211,221],"them":[74],"as":[75],"source":[77],"common":[79],"randomness":[80],"generate":[82],"shared":[84],"key.":[86],"By":[87],"gathering":[88],"multiple":[89],"time":[90],"slots":[91],"into":[92],"frame,":[94],"channels":[98,181,186],"observed":[99],"each":[101],"frame":[102,134],"can":[103,190],"be":[104,123],"determine":[107,206],"next":[113,133],"frame.":[114],"this":[116],"case,":[117],"rate":[121,220],"must":[122],"high":[124],"enough":[125],"identify":[127],"and,":[135],"thus,":[136],"sustain":[138],"operation":[140],"over":[141],"time.":[142],"However,":[143],"by":[144],"further":[145],"considering":[146],"data":[148,173,214],"transmission,":[149],"an":[150],"interesting":[151],"tradeoff":[152],"exists":[153],"power":[156,200,209],"allocated":[157],"SKG":[159],"estimation":[162],"training":[165],"phase":[166],"communication":[170],"transmission":[174],"phase.":[175],"Given":[176],"number":[178,184],"adversary":[189],"jam":[191],"once,":[193],"we":[194],"derive":[195],"minimum":[197],"pilot":[198,212],"signal":[199],"required":[201],"sustainability":[203],"also":[205],"optimal":[208],"allocation":[210],"signals":[215],"maximizes":[217],"ergodic":[219],"two":[223],"users.":[224],"Simulations":[225],"are":[226],"provided":[227],"demonstrate":[229],"effectiveness":[231],"proposed":[234],"scheme.":[235]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
