{"id":"https://openalex.org/W4210608872","doi":"https://doi.org/10.1109/lwc.2022.3147952","title":"Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries","display_name":"Hardware-Impaired PHY Secret Key Generation With Man-in-the-Middle Adversaries","publication_year":2022,"publication_date":"2022-01-31","ids":{"openalex":"https://openalex.org/W4210608872","doi":"https://doi.org/10.1109/lwc.2022.3147952"},"language":"en","primary_location":{"id":"doi:10.1109/lwc.2022.3147952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2022.3147952","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074227661","display_name":"Mehdi Letafati","orcid":"https://orcid.org/0000-0003-3731-3943"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mehdi Letafati","raw_affiliation_strings":["EE Department, Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"EE Department, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051416738","display_name":"Hamid Behroozi","orcid":"https://orcid.org/0000-0001-9294-3134"},"institutions":[{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Hamid Behroozi","raw_affiliation_strings":["EE Department, Sharif University of Technology, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"EE Department, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016732612","display_name":"Babak Hossein Khalaj","orcid":"https://orcid.org/0000-0002-9289-2338"},"institutions":[{"id":"https://openalex.org/I4210146419","display_name":"Institute for Research in Fundamental Sciences","ror":"https://ror.org/04xreqs31","country_code":"IR","type":"facility","lineage":["https://openalex.org/I4210146419"]},{"id":"https://openalex.org/I133529467","display_name":"Sharif University of Technology","ror":"https://ror.org/024c2fq17","country_code":"IR","type":"education","lineage":["https://openalex.org/I133529467"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Babak Hossein Khalaj","raw_affiliation_strings":["EE Department, Sharif University of Technology, Tehran, Iran","School of Computer Science, Institute for Research in Fundamental Sciences, Tehran, Iran"],"affiliations":[{"raw_affiliation_string":"EE Department, Sharif University of Technology, Tehran, Iran","institution_ids":["https://openalex.org/I133529467"]},{"raw_affiliation_string":"School of Computer Science, Institute for Research in Fundamental Sciences, Tehran, Iran","institution_ids":["https://openalex.org/I4210146419"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029956964","display_name":"Eduard A. Jorswieck","orcid":"https://orcid.org/0000-0001-7893-8435"},"institutions":[{"id":"https://openalex.org/I94509681","display_name":"Technische Universit\u00e4t Braunschweig","ror":"https://ror.org/010nsgg66","country_code":"DE","type":"education","lineage":["https://openalex.org/I94509681"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Eduard A. Jorswieck","raw_affiliation_strings":["Department of Information Theory and Communication Systems, TU Braunschweig, Braunschweig, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Information Theory and Communication Systems, TU Braunschweig, Braunschweig, Germany","institution_ids":["https://openalex.org/I94509681"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5074227661"],"corresponding_institution_ids":["https://openalex.org/I133529467"],"apc_list":null,"apc_paid":null,"fwci":2.7449,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.90533149,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"11","issue":"4","first_page":"856","last_page":"860"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phy","display_name":"PHY","score":0.9167541265487671},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8059538006782532},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6357694268226624},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.6186715364456177},{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.6015405058860779},{"id":"https://openalex.org/keywords/transceiver","display_name":"Transceiver","score":0.5963353514671326},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5564588904380798},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.5080249309539795},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4640331268310547},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.43755099177360535},{"id":"https://openalex.org/keywords/interference","display_name":"Interference (communication)","score":0.4350239932537079},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3285006284713745},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29967689514160156},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.23112884163856506},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10753306746482849},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.08598032593727112}],"concepts":[{"id":"https://openalex.org/C41918916","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"PHY","level":4,"score":0.9167541265487671},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8059538006782532},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6357694268226624},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.6186715364456177},{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.6015405058860779},{"id":"https://openalex.org/C7720470","wikidata":"https://www.wikidata.org/wiki/Q954187","display_name":"Transceiver","level":3,"score":0.5963353514671326},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5564588904380798},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5080249309539795},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4640331268310547},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.43755099177360535},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.4350239932537079},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3285006284713745},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29967689514160156},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.23112884163856506},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10753306746482849},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.08598032593727112},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lwc.2022.3147952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lwc.2022.3147952","pdf_url":null,"source":{"id":"https://openalex.org/S2500830676","display_name":"IEEE Wireless Communications Letters","issn_l":"2162-2337","issn":["2162-2337","2162-2345"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Wireless Communications Letters","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6100000143051147}],"awards":[],"funders":[{"id":"https://openalex.org/F4320323645","display_name":"Institute for Research in Fundamental Sciences","ror":"https://ror.org/04xreqs31"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1525415266","https://openalex.org/W2064918557","https://openalex.org/W2115324684","https://openalex.org/W2320703891","https://openalex.org/W2586379114","https://openalex.org/W2946340226","https://openalex.org/W2962759916","https://openalex.org/W3009258166","https://openalex.org/W3034835560","https://openalex.org/W3041569330","https://openalex.org/W3044658684","https://openalex.org/W3045385301","https://openalex.org/W3088472696","https://openalex.org/W3097372264","https://openalex.org/W3212920100","https://openalex.org/W4210253477","https://openalex.org/W4297970789"],"related_works":["https://openalex.org/W3001241562","https://openalex.org/W3133609219","https://openalex.org/W1540970618","https://openalex.org/W2994999158","https://openalex.org/W1917092277","https://openalex.org/W2945523224","https://openalex.org/W4313639042","https://openalex.org/W2042042879","https://openalex.org/W2444418218","https://openalex.org/W2285734469"],"abstract_inverted_index":{"In":[0],"this":[1],"letter,":[2],"we":[3],"examine":[4],"the":[5,14,45,48,56,63,78,83,89,106,119,127,130,137,153,159],"PHY":[6],"layer":[7],"secret":[8,91],"key":[9,92],"generation":[10],"(PHY-SKG)":[11],"scheme":[12],"in":[13,44,72,158],"presence":[15],"of":[16,58,80,85,129],"man-in-the-middle":[17],"(MiM)":[18],"adversary,":[19],"while":[20,141],"legitimate":[21,53,66],"parties":[22,67],"suffer":[23],"from":[24,29],"<i>hardware":[25],"impairments</i>":[26],"(HIs).":[27],"Different":[28],"previous":[30],"works":[31],"on":[32,82,105,144],"PHY-SKG":[33,131],"that":[34,149],"consider":[35],"adversaries":[36],"who":[37],"simply":[38],"try":[39],"to":[40,51,125],"make":[41],"an":[42],"interference":[43],"communication":[46],"link,":[47],"MiM":[49,64],"aims":[50],"deceive":[52],"entities":[54],"about":[55,155],"source":[57],"common":[59],"randomness.":[60],"To":[61],"conquer":[62],"attack,":[65],"utilize":[68],"randomized":[69],"pilots":[70],"(RPs)":[71],"our":[73],"proposed":[74],"scheme.":[75],"We":[76,147],"analyze":[77],"effect":[79],"HIs":[81],"performance":[84,128],"system":[86,145],"by":[87,150],"deriving":[88],"achievable":[90],"rate":[93],"(SKR).":[94],"Our":[95,133],"results":[96,135],"highlight":[97],"a":[98,102],"fundamental":[99],"limit,":[100],"as":[101],"ceiling":[103],"phenomena,":[104],"SKR":[107,160],"when":[108],"having":[109],"practical":[110],"imperfections.":[111],"Top-level":[112],"guidelines":[113],"for":[114],"selecting":[115],"impairment":[116],"levels":[117],"along":[118],"transceiver":[120],"chains":[121],"is":[122,161],"also":[123],"provided":[124],"maximize":[126],"protocol.":[132],"numerical":[134],"verify":[136],"analytic":[138],"expressions":[139],"derived,":[140],"providing":[142],"insights":[143],"design.":[146],"show":[148],"properly":[151],"considering":[152],"HIs,":[154],"25&#x0025;":[156],"improvement":[157],"achievable.":[162]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
