{"id":"https://openalex.org/W7105610810","doi":"https://doi.org/10.1109/ojcoms.2025.3632643","title":"Multi-User Secret Key Generation for WSNs via Wireless Channels","display_name":"Multi-User Secret Key Generation for WSNs via Wireless Channels","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7105610810","doi":"https://doi.org/10.1109/ojcoms.2025.3632643"},"language":"en","primary_location":{"id":"doi:10.1109/ojcoms.2025.3632643","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2025.3632643","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/ojcoms.2025.3632643","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Mehmet Ali Aygul","orcid":"https://orcid.org/0000-0002-1797-8238"},"institutions":[{"id":"https://openalex.org/I48912391","display_name":"Istanbul Technical University","ror":"https://ror.org/059636586","country_code":"TR","type":"education","lineage":["https://openalex.org/I48912391"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Mehmet Ali Aygul","raw_affiliation_strings":["Department of Electronics and Communications Engineering, Istanbul Technical University, Istanbul, T&#x00FC;rkiye"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communications Engineering, Istanbul Technical University, Istanbul, T&#x00FC;rkiye","institution_ids":["https://openalex.org/I48912391"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ebubekir Memisoglu","orcid":"https://orcid.org/0000-0001-5137-8511"},"institutions":[{"id":"https://openalex.org/I3125470973","display_name":"Istanbul Medipol University","ror":"https://ror.org/037jwzz50","country_code":"TR","type":"education","lineage":["https://openalex.org/I3125470973"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Ebubekir Memisoglu","raw_affiliation_strings":["Department of Electrical and Electronics Engineering, Istanbul Medipol University, Istanbul, T&#x00FC;rkiye"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronics Engineering, Istanbul Medipol University, Istanbul, T&#x00FC;rkiye","institution_ids":["https://openalex.org/I3125470973"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Hakan Ali Cirpan","orcid":"https://orcid.org/0000-0002-3591-6567"},"institutions":[{"id":"https://openalex.org/I48912391","display_name":"Istanbul Technical University","ror":"https://ror.org/059636586","country_code":"TR","type":"education","lineage":["https://openalex.org/I48912391"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Hakan Ali Cirpan","raw_affiliation_strings":["Department of Electronics and Communications Engineering, Istanbul Technical University, Istanbul, T&#x00FC;rkiye"],"affiliations":[{"raw_affiliation_string":"Department of Electronics and Communications Engineering, Istanbul Technical University, Istanbul, T&#x00FC;rkiye","institution_ids":["https://openalex.org/I48912391"]}]},{"author_position":"last","author":{"id":null,"display_name":"Huseyin Arslan","orcid":"https://orcid.org/0000-0001-9474-7372"},"institutions":[{"id":"https://openalex.org/I3125470973","display_name":"Istanbul Medipol University","ror":"https://ror.org/037jwzz50","country_code":"TR","type":"education","lineage":["https://openalex.org/I3125470973"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Huseyin Arslan","raw_affiliation_strings":["Department of Electrical and Electronics Engineering, Istanbul Medipol University, Istanbul, T&#x00FC;rkiye"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronics Engineering, Istanbul Medipol University, Istanbul, T&#x00FC;rkiye","institution_ids":["https://openalex.org/I3125470973"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I48912391"],"apc_list":{"value":1750,"currency":"USD","value_usd":1750},"apc_paid":{"value":1750,"currency":"USD","value_usd":1750},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.58382527,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"6","issue":null,"first_page":"9654","last_page":"9672"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.5116000175476074,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.5116000175476074,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.45010000467300415,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.011099999770522118,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8034999966621399},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.6830000281333923},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6320000290870667},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6147000193595886},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.588699996471405},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5827000141143799},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.5249000191688538},{"id":"https://openalex.org/keywords/star-network","display_name":"Star network","score":0.47870001196861267},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.4603999853134155}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8034999966621399},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6883999705314636},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.6830000281333923},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6765000224113464},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6320000290870667},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6147000193595886},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.588699996471405},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5827000141143799},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5249000191688538},{"id":"https://openalex.org/C71976206","wikidata":"https://www.wikidata.org/wiki/Q841749","display_name":"Star network","level":4,"score":0.47870001196861267},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.4603999853134155},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44359999895095825},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4399000108242035},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.4341000020503998},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39980000257492065},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3666999936103821},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.34549999237060547},{"id":"https://openalex.org/C50230483","wikidata":"https://www.wikidata.org/wiki/Q2108226","display_name":"Pre-shared key","level":5,"score":0.3424000144004822},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.3411000072956085},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.32499998807907104},{"id":"https://openalex.org/C184660509","wikidata":"https://www.wikidata.org/wiki/Q462624","display_name":"Shared secret","level":3,"score":0.3163999915122986},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.299699991941452},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.295199990272522},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2904999852180481},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.28690001368522644},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.2529999911785126}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ojcoms.2025.3632643","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2025.3632643","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3ced4b29afc04e55918a14683b23131d","is_oa":true,"landing_page_url":"https://doaj.org/article/3ced4b29afc04e55918a14683b23131d","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Open Journal of the Communications Society, Vol 6, Pp 9654-9672 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/ojcoms.2025.3632643","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2025.3632643","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8891858237","display_name":null,"funder_award_id":"5230073","funder_id":"https://openalex.org/F4320322626","funder_display_name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu"}],"funders":[{"id":"https://openalex.org/F4320322626","display_name":"T\u00fcrkiye Bilimsel ve Teknolojik Ara\u015ft\u0131rma Kurumu","ror":"https://ror.org/04w9kkr77"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Wireless":[0],"sensor":[1,31],"networks":[2],"(WSNs)":[3],"are":[4,52],"resource-constrained":[5],"and":[6,27,47,58,75,105,146,159,169],"highly":[7],"vulnerable":[8],"to":[9,12,55,89,125],"eavesdropping":[10],"due":[11],"their":[13],"broadcast":[14],"nature.":[15],"Traditional":[16],"symmetric":[17],"key":[18,36,153,156,160],"cryptography":[19],"provides":[20],"strong":[21],"security":[22],"but":[23,123],"imposes":[24],"excessive":[25],"computational":[26],"energy":[28],"demands":[29],"on":[30],"nodes.":[32],"Physical":[33],"layer\u2013based":[34],"secret":[35],"generation":[37,157],"(SKG)":[38],"offers":[39,132],"a":[40,72,76,91,99,140],"lightweight":[41],"alternative":[42],"by":[43,163],"exploiting":[44],"channel":[45],"reciprocity":[46],"randomness;":[48],"however,":[49],"existing":[50],"methods":[51],"mostly":[53],"limited":[54],"two-user":[56],"scenarios":[57],"lack":[59],"scalability":[60],"in":[61,152],"multi-user":[62,69],"settings.":[63],"This":[64],"paper":[65],"introduces":[66],"two":[67],"scalable":[68],"SKG":[70],"frameworks:":[71],"sequential":[73,82,117],"method":[74,118],"star":[77,96,130],"topology-based":[78],"method.":[79],"In":[80],"the":[81,95,113,129,136,164],"method,":[83],"users":[84],"cooperatively":[85],"relay":[86],"random":[87],"signals":[88],"derive":[90],"shared":[92],"key,":[93],"while":[94,128],"topology":[97,131],"leverages":[98],"central":[100,143],"node":[101,126],"for":[102],"signal":[103],"aggregation":[104],"redistribution.":[106],"A":[107],"comparative":[108],"analysis":[109],"reveals":[110],"trade-offs":[111],"between":[112],"proposed":[114],"methods.":[115],"The":[116],"is":[119],"more":[120],"computationally":[121],"efficient":[122],"sensitive":[124],"failures,":[127],"lower":[133],"delay":[134],"at":[135],"cost":[137],"of":[138,167],"requiring":[139],"fully":[141],"connected":[142],"node.":[144],"Analyses":[145],"simulations":[147],"confirm":[148],"both":[149],"methods\u2019":[150],"effectiveness":[151],"mismatch":[154],"probability,":[155],"rate,":[158],"randomness":[161],"validated":[162],"National":[165],"Institute":[166],"Standards":[168],"Technology":[170],"test":[171],"suite.":[172]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-11-13T00:00:00"}
