{"id":"https://openalex.org/W4408858297","doi":"https://doi.org/10.1109/tccn.2025.3554683","title":"Securing Physical Layer Key Generation in Ambient Backscatter Devices Against Injection Attack","display_name":"Securing Physical Layer Key Generation in Ambient Backscatter Devices Against Injection Attack","publication_year":2025,"publication_date":"2025-03-26","ids":{"openalex":"https://openalex.org/W4408858297","doi":"https://doi.org/10.1109/tccn.2025.3554683"},"language":"en","primary_location":{"id":"doi:10.1109/tccn.2025.3554683","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2025.3554683","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012006111","display_name":"Neji Mensi","orcid":"https://orcid.org/0000-0002-8495-3532"},"institutions":[{"id":"https://openalex.org/I106959904","display_name":"Florida Institute of Technology","ror":"https://ror.org/04atsbb87","country_code":"US","type":"education","lineage":["https://openalex.org/I106959904"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Neji Mensi","raw_affiliation_strings":["EECS Department, Florida Tech, Melbourne, FL, USA"],"affiliations":[{"raw_affiliation_string":"EECS Department, Florida Tech, Melbourne, FL, USA","institution_ids":["https://openalex.org/I106959904"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046343080","display_name":"Danda B. Rawat","orcid":"https://orcid.org/0000-0003-3638-3464"},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danda B. Rawat","raw_affiliation_strings":["Department of Electrical and Computer Science, Howard University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Science, Howard University, Washington, DC, USA","institution_ids":["https://openalex.org/I137853757"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101882677","display_name":"Min Song","orcid":"https://orcid.org/0000-0002-6245-9816"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Min Song","raw_affiliation_strings":["ECE Department, Stevens Institute of Technology, Hoboken, NJ, USA"],"affiliations":[{"raw_affiliation_string":"ECE Department, Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012006111"],"corresponding_institution_ids":["https://openalex.org/I106959904"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05799115,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":null,"first_page":"144","last_page":"157"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backscatter","display_name":"Backscatter (email)","score":0.7040287852287292},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6643376350402832},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.6482412815093994},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5576342940330505},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.4794013500213623},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4224301874637604},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3220985531806946},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2730906009674072},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.268867552280426},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2153143584728241}],"concepts":[{"id":"https://openalex.org/C30354325","wikidata":"https://www.wikidata.org/wiki/Q204667","display_name":"Backscatter (email)","level":3,"score":0.7040287852287292},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6643376350402832},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.6482412815093994},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5576342940330505},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.4794013500213623},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4224301874637604},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3220985531806946},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2730906009674072},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.268867552280426},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2153143584728241}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tccn.2025.3554683","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tccn.2025.3554683","pdf_url":null,"source":{"id":"https://openalex.org/S2484188435","display_name":"IEEE Transactions on Cognitive Communications and Networking","issn_l":"2332-7731","issn":["2332-7731","2372-2045"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cognitive Communications and Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2994517465","display_name":null,"funder_award_id":"W911NF-20-2-0277","funder_id":"https://openalex.org/F4320306078","funder_display_name":"U.S. Department of Defense"}],"funders":[{"id":"https://openalex.org/F4320306078","display_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1958735522","https://openalex.org/W2132694208","https://openalex.org/W2183625517","https://openalex.org/W2335626951","https://openalex.org/W2791978050","https://openalex.org/W2803696359","https://openalex.org/W2885549624","https://openalex.org/W2889184287","https://openalex.org/W2963271202","https://openalex.org/W2963564396","https://openalex.org/W2963907541","https://openalex.org/W2981994442","https://openalex.org/W3009258166","https://openalex.org/W3014919731","https://openalex.org/W3045685747","https://openalex.org/W3088527522","https://openalex.org/W3089171781","https://openalex.org/W3134527039","https://openalex.org/W3156928296","https://openalex.org/W3183697517","https://openalex.org/W3188560796","https://openalex.org/W3205530931","https://openalex.org/W3214755734","https://openalex.org/W4205612541","https://openalex.org/W4206117516","https://openalex.org/W4226029229","https://openalex.org/W4285107223","https://openalex.org/W4289538107","https://openalex.org/W4312470089","https://openalex.org/W4312549303","https://openalex.org/W4315629914","https://openalex.org/W4317418722","https://openalex.org/W4328007342","https://openalex.org/W4381302456","https://openalex.org/W4387031738","https://openalex.org/W4387197029","https://openalex.org/W4387870374","https://openalex.org/W4388193252","https://openalex.org/W4390492876","https://openalex.org/W4391092657","https://openalex.org/W4392152547","https://openalex.org/W4392559254","https://openalex.org/W4401163080"],"related_works":["https://openalex.org/W4320075926","https://openalex.org/W3167206921","https://openalex.org/W3125305833","https://openalex.org/W1919042217","https://openalex.org/W3080982036","https://openalex.org/W3205185567","https://openalex.org/W3209591750","https://openalex.org/W2995273700","https://openalex.org/W2560394302","https://openalex.org/W2013817888"],"abstract_inverted_index":{"The":[0],"necessity":[1],"for":[2,53,149,156],"ultra-low-power":[3],"consumption":[4],"devices":[5,27,141],"that":[6,45,121,138,170],"enable":[7],"the":[8,38,73,81,91,100,103,115,125,129,144,153,160,163,172,175,178,189,197],"Internet":[9],"of":[10,80,102,117,174,180,188,199],"Things":[11],"(IoT)":[12],"networks":[13],"to":[14,20,32,48,58,72,89,109,142],"be":[15],"more":[16],"energy":[17,157,201],"efficient,":[18],"leads":[19],"considering":[21],"Ambient":[22],"Backscatter":[23],"Communication":[24],"(AmBC).":[25],"Such":[26],"exploit":[28],"ambient":[29,147],"radio-frequency":[30],"signals":[31,69],"communicate":[33],"and":[34,70,84,127,177],"harvest":[35],"energy.":[36],"Though,":[37],"physical":[39],"layer":[40],"key":[41,52],"generation":[42],"(PLKG)":[43],"scheme":[44],"enables":[46,139],"AmBC":[47,108],"generate":[49],"a":[50,63,78,118,135],"secret":[51],"data":[54],"encryption,":[55],"is":[56,192],"vulnerable":[57],"injection":[59,110],"attacks.":[60],"Under":[61],"such":[62],"menace,":[64],"an":[65],"attacker":[66,161],"injects":[67],"predefined":[68],"contributes":[71],"PLKG.":[74],"Thereby,":[75],"it":[76],"possesses":[77],"part":[79],"generated":[82],"bits":[83],"uses":[85],"brute":[86],"force":[87],"attack":[88,126],"compromise":[90],"entire":[92,145],"key.":[93],"Inspired":[94],"by":[95],"that,":[96],"we":[97,113,133,166,195],"carefully":[98],"prove":[99,196],"vulnerability":[101],"existing":[104],"PLKG":[105,150],"approach":[106],"in":[107],"attack.":[111],"Then,":[112],"propose":[114,134],"employment":[116],"smart":[119],"device":[120],"aims":[122],"at":[123],"detecting":[124],"canceling":[128],"malicious":[130,154],"signal.":[131],"Furthermore,":[132],"new":[136],"strategy":[137],"legitimate":[140],"utilize":[143],"received":[146],"signal":[148,155,191],"while":[151],"exploiting":[152],"harvesting.":[158],"Hence,":[159],"becomes":[162],"victim.":[164],"Finally,":[165],"provide":[167],"numerical":[168],"simulations":[169],"accentuate":[171],"consequence":[173],"menace":[176],"effectiveness":[179],"our":[181,200],"security":[182],"method,":[183],"even":[184],"though":[185],"only":[186],"80%":[187],"injected":[190],"removed.":[193],"Besides,":[194],"efficacy":[198],"harvesting":[202],"strategy.":[203]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
