{"id":"https://openalex.org/W4411472047","doi":"https://doi.org/10.1109/jiot.2025.3581791","title":"Securing Wireless Communications via Channel Reciprocity and Dynamic Constellation Obfuscation","display_name":"Securing Wireless Communications via Channel Reciprocity and Dynamic Constellation Obfuscation","publication_year":2025,"publication_date":"2025-06-20","ids":{"openalex":"https://openalex.org/W4411472047","doi":"https://doi.org/10.1109/jiot.2025.3581791"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3581791","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3581791","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research-information.bris.ac.uk/en/publications/8f5b5fae-f539-48fc-a8d5-137f5012c788","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yujie Hou","orcid":"https://orcid.org/0009-0002-8434-7265"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yujie Hou","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"raw_orcid":"https://orcid.org/0009-0002-8434-7265","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050424155","display_name":"Hai\u2010Xi Sun","orcid":"https://orcid.org/0000-0003-2719-6456"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haixi Sun","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013730149","display_name":"Guyue Li","orcid":"https://orcid.org/0000-0003-1145-1168"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guyue Li","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0003-1145-1168","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074392353","display_name":"Shuping Dang","orcid":"https://orcid.org/0000-0002-0018-815X"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shuping Dang","raw_affiliation_strings":["School of Electrical, Electronic and Mechanical Engineering, University of Bristol, Bristol, U.K"],"raw_orcid":"https://orcid.org/0000-0002-0018-815X","affiliations":[{"raw_affiliation_string":"School of Electrical, Electronic and Mechanical Engineering, University of Bristol, Bristol, U.K","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075678549","display_name":"Aiqun Hu","orcid":"https://orcid.org/0000-0002-0398-4899"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Aiqun Hu","raw_affiliation_strings":["Purple Mountain Laboratories, Nanjing, China","Purple Mountain Laboratories for Network and Communication Security, Nanjing, China"],"raw_orcid":"https://orcid.org/0000-0002-0398-4899","affiliations":[{"raw_affiliation_string":"Purple Mountain Laboratories, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]},{"raw_affiliation_string":"Purple Mountain Laboratories for Network and Communication Security, Nanjing, China","institution_ids":["https://openalex.org/I4210155350"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1161411,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"18","first_page":"37035","last_page":"37049"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9218999743461609,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9107000231742859,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7827008962631226},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.630048930644989},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5385175347328186},{"id":"https://openalex.org/keywords/constellation","display_name":"Constellation","score":0.49792957305908203},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4877334535121918},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.4463273882865906},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.40146368741989136},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3465665578842163}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7827008962631226},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.630048930644989},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5385175347328186},{"id":"https://openalex.org/C70352696","wikidata":"https://www.wikidata.org/wiki/Q8928","display_name":"Constellation","level":2,"score":0.49792957305908203},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4877334535121918},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.4463273882865906},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.40146368741989136},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3465665578842163},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/jiot.2025.3581791","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3581791","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/8f5b5fae-f539-48fc-a8d5-137f5012c788","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/8f5b5fae-f539-48fc-a8d5-137f5012c788","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Hou, Y, Sun, H, Li, G, Dang, S & Hu, A 2025, 'Securing Wireless Communications via Channel Reciprocity and Dynamic Constellation Obfuscation', IEEE Internet of Things Journal, vol. 12, no. 18, pp. 37035-37049. https://doi.org/10.1109/JIOT.2025.3581791","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire/8f5b5fae-f539-48fc-a8d5-137f5012c788","is_oa":true,"landing_page_url":"https://hdl.handle.net/1983/8f5b5fae-f539-48fc-a8d5-137f5012c788","pdf_url":"https://research-information.bris.ac.uk/files/461490755/Securing_Wireless_Communications_via_Channel_Reciprocity_and_Dynamic_Constellation_Obfuscation_v3_1_3_.pdf","source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hou, Y, Sun, H, Li, G, Dang, S & Hu, A 2025, 'Securing Wireless Communications via Channel Reciprocity and Dynamic Constellation Obfuscation', IEEE Internet of Things Journal, vol. 12, no. 18, pp. 37035-37049. https://doi.org/10.1109/JIOT.2025.3581791","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/8f5b5fae-f539-48fc-a8d5-137f5012c788","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/8f5b5fae-f539-48fc-a8d5-137f5012c788","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Hou, Y, Sun, H, Li, G, Dang, S & Hu, A 2025, 'Securing Wireless Communications via Channel Reciprocity and Dynamic Constellation Obfuscation', IEEE Internet of Things Journal, vol. 12, no. 18, pp. 37035-37049. https://doi.org/10.1109/JIOT.2025.3581791","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G601026658","display_name":null,"funder_award_id":"62171121","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6259989868","display_name":null,"funder_award_id":"BF2024065","funder_id":"https://openalex.org/F4320335774","funder_display_name":"Key Technologies Research and Development Program"},{"id":"https://openalex.org/G8853341699","display_name":null,"funder_award_id":"U22A2001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335774","display_name":"Key Technologies Research and Development Program","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1987963139","https://openalex.org/W2035143295","https://openalex.org/W2085197596","https://openalex.org/W2156214717","https://openalex.org/W2589911916","https://openalex.org/W2776395884","https://openalex.org/W2942980533","https://openalex.org/W2997133057","https://openalex.org/W3010089499","https://openalex.org/W3044759401","https://openalex.org/W3083430050","https://openalex.org/W3107650027","https://openalex.org/W3131509802","https://openalex.org/W4200633554","https://openalex.org/W4206987318","https://openalex.org/W4213457988","https://openalex.org/W4224210264","https://openalex.org/W4226330150","https://openalex.org/W4285818103","https://openalex.org/W4286567563","https://openalex.org/W4293094766","https://openalex.org/W4312712976","https://openalex.org/W4313451523","https://openalex.org/W4364304980","https://openalex.org/W4376480802","https://openalex.org/W4381748177","https://openalex.org/W4385800819","https://openalex.org/W4386920283","https://openalex.org/W4388040522","https://openalex.org/W4390406702","https://openalex.org/W4400810732","https://openalex.org/W4403677838","https://openalex.org/W4405717558","https://openalex.org/W4405812143","https://openalex.org/W4406311147","https://openalex.org/W4408304429"],"related_works":["https://openalex.org/W4224216661","https://openalex.org/W2132360941","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W2152144666","https://openalex.org/W1819617256","https://openalex.org/W2596984206","https://openalex.org/W1507511632"],"abstract_inverted_index":{"The":[0,119],"one-time":[1],"pad":[2],"secure":[3],"transmission":[4],"based":[5],"on":[6,125],"wireless":[7],"channel":[8,46,127,226,235],"reciprocity":[9,47],"(CR-OTP)":[10],"has":[11],"drawn":[12],"great":[13],"attention":[14],"recently":[15],"due":[16],"to":[17,88,117,144,165],"its":[18,77],"capability":[19],"of":[20,24,45,82,139,177,186,215],"providing":[21],"perfect":[22],"secrecy":[23,175,200,220],"data,":[25],"as":[26,28,42,101],"well":[27,53],"the":[29,73,93,102,113,126,132,137,140,148,154,167,174,178,187,193,219,224,233],"modulation":[30],"information.":[31],"However,":[32],"existing":[33,94],"CR-OTP":[34],"schemes":[35],"encounter":[36],"both":[37],"reliability":[38],"and":[39,48,131,158,202],"security":[40],"challenges":[41],"their":[43],"assumptions":[44],"randomness":[49,138],"are":[50],"not":[51],"always":[52],"satisfied":[54],"in":[55],"practical":[56],"application":[57],"scenarios.":[58],"To":[59],"tackle":[60],"these":[61],"issues,":[62],"we":[63],"propose":[64],"a":[65,105,160,205,213],"dynamic":[66],"constellation":[67,78],"obfuscation":[68],"(DCO)":[69],"method":[70,85,100,181,195],"that":[71,151,173,185,192],"obfuscates":[72],"plaintext":[74],"by":[75,111],"rotating":[76],"dynamically.":[79],"This":[80],"kind":[81],"analog":[83],"encryption":[84,99],"is":[86,122,163,182,222,237],"proven":[87],"be":[89],"more":[90],"robust":[91],"than":[92,184],"digital":[95],"exclusive":[96],"OR":[97],"(XOR)":[98],"former":[103],"achieves":[104],"lower":[106],"symbol":[107],"error":[108],"rate":[109],"(SER)":[110],"reducing":[112],"double":[114],"quantization":[115],"loss":[116],"one.":[118],"rotation":[120,141],"pattern":[121,142],"jointly":[123],"dependent":[124],"state":[128],"information":[129],"(CSI)":[130],"previous":[133,155],"message,":[134],"which":[135],"guarantees":[136],"subjected":[143],"environmental":[145],"drifts.":[146],"Only":[147],"legitimate":[149],"receiver":[150],"correctly":[152,157],"recovers":[153],"message":[156],"observes":[159],"similar":[161],"CSI":[162],"able":[164],"decode":[166],"newly":[168],"transmitted":[169],"message.":[170],"We":[171],"proved":[172],"capacity":[176,201,221],"proposed":[179,194],"DCO":[180],"higher":[183],"state-of-the-art.":[188],"Simulation":[189],"results":[190],"confirm":[191],"delivers":[196],"superior":[197],"performance":[198],"regarding":[199],"SER,":[203],"achieving":[204],"4.5":[206],"dB":[207,231],"signal-to-noise":[208],"ratio":[209],"(SNR)":[210],"gain":[211,228],"at":[212],"SER":[214],"0.1;":[216],"moreover,":[217],"when":[218,232],"0.1,":[223],"main":[225],"SNR":[227,236],"reaches":[229],"6.5":[230],"wiretap":[234],"20":[238],"dB.":[239]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
