{"id":"https://openalex.org/W1610738453","doi":"https://doi.org/10.1109/iwcmc.2015.7289068","title":"Comparative simulation for physical layer key generation methods","display_name":"Comparative simulation for physical layer key generation methods","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W1610738453","doi":"https://doi.org/10.1109/iwcmc.2015.7289068","mag":"1610738453"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc.2015.7289068","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2015.7289068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112278056","display_name":"Amal Saad","orcid":null},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Amal Saad","raw_affiliation_strings":["Computer Science and Engineering Dept., Qatar University, Doha, Qatar","Computer Science and Engineering Dept., Qatar University, Doha, Qatar 2713"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Dept., Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]},{"raw_affiliation_string":"Computer Science and Engineering Dept., Qatar University, Doha, Qatar 2713","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021329808","display_name":"Amr Mohamed","orcid":"https://orcid.org/0000-0002-1583-7503"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Amr Mohamed","raw_affiliation_strings":["Computer Science and Engineering Dept., Qatar University, Doha, Qatar","Computer Science and Engineering Dept., Qatar University, Doha, Qatar 2713"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Dept., Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]},{"raw_affiliation_string":"Computer Science and Engineering Dept., Qatar University, Doha, Qatar 2713","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089660851","display_name":"Tarek Elfouly","orcid":"https://orcid.org/0000-0002-1688-6163"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Tarek M. Elfouly","raw_affiliation_strings":["Computer Science and Engineering Dept., Qatar University, Doha, Qatar","Computer Science and Engineering Dept., Qatar University, Doha, Qatar 2713"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Dept., Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]},{"raw_affiliation_string":"Computer Science and Engineering Dept., Qatar University, Doha, Qatar 2713","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024641789","display_name":"Tamer Khattab","orcid":"https://orcid.org/0000-0003-2347-9555"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Tamer Khattab","raw_affiliation_strings":["Computer Science and Engineering Dept., Qatar University, Doha, Qatar","Electrical Engineering Dept., Qatar University, Doha, Qatar 2713"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Dept., Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]},{"raw_affiliation_string":"Electrical Engineering Dept., Qatar University, Doha, Qatar 2713","institution_ids":["https://openalex.org/I60342839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I60342839","display_name":"Qatar University","ror":"https://ror.org/00yhnba62","country_code":"QA","type":"education","lineage":["https://openalex.org/I60342839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Computer Science and Engineering Dept., Qatar University, Doha, Qatar","Computer Science and Engineering Dept., Qatar University, Doha, Qatar 2713"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Dept., Qatar University, Doha, Qatar","institution_ids":["https://openalex.org/I60342839"]},{"raw_affiliation_string":"Computer Science and Engineering Dept., Qatar University, Doha, Qatar 2713","institution_ids":["https://openalex.org/I60342839"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5112278056"],"corresponding_institution_ids":["https://openalex.org/I60342839"],"apc_list":null,"apc_paid":null,"fwci":0.5919,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.71187895,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"120","last_page":"125"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.8229681253433228},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.8022563457489014},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.766982913017273},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.712140679359436},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.550600528717041},{"id":"https://openalex.org/keywords/random-number-generation","display_name":"Random number generation","score":0.5287529826164246},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5144832134246826},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.48735079169273376},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4721508026123047},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4553814232349396},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3673042058944702},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.31366896629333496},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12221163511276245},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11594539880752563},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.09827420115470886},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07170262932777405}],"concepts":[{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.8229681253433228},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.8022563457489014},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.766982913017273},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.712140679359436},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.550600528717041},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.5287529826164246},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5144832134246826},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.48735079169273376},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4721508026123047},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4553814232349396},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3673042058944702},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.31366896629333496},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12221163511276245},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11594539880752563},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.09827420115470886},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07170262932777405},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iwcmc.2015.7289068","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc.2015.7289068","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Wireless Communications and Mobile Computing Conference (IWCMC)","raw_type":"proceedings-article"},{"id":"pmh:oai:qspace.qu.edu.qa:10576/30127","is_oa":false,"landing_page_url":"http://doi.org/10.1109/IWCMC.2015.7289068","pdf_url":null,"source":{"id":"https://openalex.org/S4306400014","display_name":"Qatar University QSpace (Qatar University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60342839","host_organization_name":"Qatar University","host_organization_lineage":["https://openalex.org/I60342839"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4699999988079071}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332753","display_name":"Qatar National Research Fund","ror":"https://ror.org/01svaqq28"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W252932944","https://openalex.org/W949353694","https://openalex.org/W1585665690","https://openalex.org/W1596390374","https://openalex.org/W1875021344","https://openalex.org/W1916886752","https://openalex.org/W1970334960","https://openalex.org/W1973956822","https://openalex.org/W1980944877","https://openalex.org/W2001466659","https://openalex.org/W2003770618","https://openalex.org/W2007661134","https://openalex.org/W2015105729","https://openalex.org/W2027826360","https://openalex.org/W2043115485","https://openalex.org/W2043769961","https://openalex.org/W2054496355","https://openalex.org/W2070616660","https://openalex.org/W2073136473","https://openalex.org/W2091729149","https://openalex.org/W2106833918","https://openalex.org/W2109394932","https://openalex.org/W2117327438","https://openalex.org/W2119913278","https://openalex.org/W2126477936","https://openalex.org/W2127697497","https://openalex.org/W2128765501","https://openalex.org/W2137072047","https://openalex.org/W2152782421","https://openalex.org/W3038067977","https://openalex.org/W3105659654","https://openalex.org/W3123083844","https://openalex.org/W3148275315","https://openalex.org/W4214950786","https://openalex.org/W6645549312","https://openalex.org/W6651183435"],"related_works":["https://openalex.org/W3134921237","https://openalex.org/W2032644301","https://openalex.org/W2344061241","https://openalex.org/W236957874","https://openalex.org/W2005418990","https://openalex.org/W2109259595","https://openalex.org/W2360514482","https://openalex.org/W4378574941","https://openalex.org/W1989613568","https://openalex.org/W2247946197"],"abstract_inverted_index":{"The":[0,129],"paper":[1],"cogitates":[2],"about":[3],"a":[4,36,65],"comparative":[5],"simulation":[6],"for":[7,71,87],"various":[8,93],"distillation,":[9],"reconciliation,":[10],"and":[11,109,125,131],"privacy":[12,126],"amplification":[13,127],"techniques":[14,53,121,168],"that":[15,153,169],"are":[16,48,137,147,170],"used":[17,40,70,171],"to":[18,41,50,56,91,114],"generate":[19],"secure":[20],"symmetric":[21],"physical":[22],"layer":[23],"keys.":[24],"Elementary":[25],"wireless":[26],"model":[27],"of":[28,35,60,97,118,134,157],"two":[29,99],"mobile":[30],"nodes":[31],"in":[32,54,73,76,122],"the":[33,43,58,61,77,82,98,103,106,116,119,135,140,144,154,158,161,167,173],"presence":[34],"passive":[37],"eavesdropper":[38],"is":[39,112,151],"perform":[42],"comparison":[44,72],"process.":[45],"Important":[46],"modifications":[47],"proposed":[49],"some":[51],"phases'":[52],"order":[55],"increase":[57],"performance":[59,117],"generation":[62,175],"process":[63,110],"as":[64],"whole.":[66],"Different":[67],"metrics":[68],"were":[69],"each":[74],"phase,":[75,79],"distillation":[78],"we":[80],"use":[81],"Bit":[83],"Mismatch":[84],"Rate":[85],"(BMR)":[86],"different":[88],"SNR":[89],"values":[90],"compare":[92],"extracted":[94],"random":[95],"strings":[96],"intended":[100],"nodes.":[101],"On":[102],"other":[104],"hand,":[105],"messaging":[107],"rate":[108,156],"complexity":[111],"exploited":[113],"estimate":[115],"compared":[120],"both":[123],"reconciliation":[124],"phases.":[128,176],"randomness":[130,162],"entropy":[132],"properties":[133],"keys":[136,146,159],"verified":[138],"using":[139],"NIST":[141],"suite,":[142],"all":[143],"generated":[145],"128":[148],"bits,":[149],"it":[150],"shown":[152],"success":[155],"passing":[160],"tests":[163],"depends":[164],"strongly":[165],"on":[166],"through":[172],"three":[174]},"counts_by_year":[{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
