{"id":"https://openalex.org/W2744615514","doi":"https://doi.org/10.1109/tifs.2017.2737963","title":"Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers","display_name":"Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers","publication_year":2017,"publication_date":"2017-08-09","ids":{"openalex":"https://openalex.org/W2744615514","doi":"https://doi.org/10.1109/tifs.2017.2737963","mag":"2744615514"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2737963","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2737963","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://infoscience.epfl.ch/record/234057","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091369772","display_name":"Jo\u00e3o S\u00e1 Sousa","orcid":"https://orcid.org/0000-0002-7145-3539"},"institutions":[{"id":"https://openalex.org/I76903346","display_name":"University of Coimbra","ror":"https://ror.org/04z8k9a98","country_code":"PT","type":"education","lineage":["https://openalex.org/I76903346"]},{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH","PT"],"is_corresponding":true,"raw_author_name":"Joao Sa Sousa","raw_affiliation_strings":["CISUC, University of Coimbra, Coimbra, Portugal","LCA1 Laboratory, \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"],"affiliations":[{"raw_affiliation_string":"CISUC, University of Coimbra, Coimbra, Portugal","institution_ids":["https://openalex.org/I76903346"]},{"raw_affiliation_string":"LCA1 Laboratory, \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074435675","display_name":"Jo\u00e3o P. Vilela","orcid":"https://orcid.org/0000-0001-5805-1351"},"institutions":[{"id":"https://openalex.org/I76903346","display_name":"University of Coimbra","ror":"https://ror.org/04z8k9a98","country_code":"PT","type":"education","lineage":["https://openalex.org/I76903346"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Joao P. Vilela","raw_affiliation_strings":["CISUC, University of Coimbra, Coimbra, Portugal"],"affiliations":[{"raw_affiliation_string":"CISUC, University of Coimbra, Coimbra, Portugal","institution_ids":["https://openalex.org/I76903346"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5091369772"],"corresponding_institution_ids":["https://openalex.org/I5124864","https://openalex.org/I76903346"],"apc_list":null,"apc_paid":null,"fwci":0.8601,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.75783751,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"13","issue":"1","first_page":"143","last_page":"155"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8251259326934814},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.792624831199646},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.7597753405570984},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7016599774360657},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.6946086287498474},{"id":"https://openalex.org/keywords/frequency-hopping-spread-spectrum","display_name":"Frequency-hopping spread spectrum","score":0.6013834476470947},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5960272550582886},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.5426069498062134},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5355845093727112},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4774872958660126},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4724702537059784},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.4223431646823883},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20882484316825867},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12773668766021729}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8251259326934814},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.792624831199646},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.7597753405570984},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7016599774360657},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.6946086287498474},{"id":"https://openalex.org/C122962297","wikidata":"https://www.wikidata.org/wiki/Q1136013","display_name":"Frequency-hopping spread spectrum","level":2,"score":0.6013834476470947},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5960272550582886},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.5426069498062134},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5355845093727112},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4774872958660126},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4724702537059784},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.4223431646823883},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20882484316825867},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12773668766021729},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2017.2737963","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2737963","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:infoscience.epfl.ch:234057","is_oa":true,"landing_page_url":"http://infoscience.epfl.ch/record/234057","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:infoscience.epfl.ch:260260","is_oa":true,"landing_page_url":"http://infoscience.epfl.ch/record/260260","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"WoS","raw_type":"research article"}],"best_oa_location":{"id":"pmh:oai:infoscience.epfl.ch:234057","is_oa":true,"landing_page_url":"http://infoscience.epfl.ch/record/234057","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5799999833106995}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1573762502","https://openalex.org/W1880384800","https://openalex.org/W1919042217","https://openalex.org/W1970334960","https://openalex.org/W1985633252","https://openalex.org/W2003723516","https://openalex.org/W2030988557","https://openalex.org/W2043769961","https://openalex.org/W2066459959","https://openalex.org/W2075295072","https://openalex.org/W2081856154","https://openalex.org/W2102940326","https://openalex.org/W2106833918","https://openalex.org/W2113629043","https://openalex.org/W2122653429","https://openalex.org/W2124952412","https://openalex.org/W2129457795","https://openalex.org/W2146794521","https://openalex.org/W2159362188","https://openalex.org/W2159724474","https://openalex.org/W2162926971","https://openalex.org/W2171006634","https://openalex.org/W2289776356","https://openalex.org/W2542732716","https://openalex.org/W3098064086","https://openalex.org/W6639386119","https://openalex.org/W6696669102"],"related_works":["https://openalex.org/W4362501885","https://openalex.org/W2907256842","https://openalex.org/W2364658003","https://openalex.org/W2996695026","https://openalex.org/W2356164603","https://openalex.org/W2765236478","https://openalex.org/W3186736830","https://openalex.org/W2972424885","https://openalex.org/W2766780944","https://openalex.org/W2380214240"],"abstract_inverted_index":{"Current":[0],"physical-layer":[1,49],"security":[2,50],"techniques":[3,51,132],"typically":[4],"rely":[5],"on":[6,176],"a":[7,72,99,134,169],"degraded":[8],"eavesdropper,":[9],"thus":[10],"warranting":[11],"some":[12],"sort":[13],"of":[14,25,46,63,92,111,114,123,137],"advantage":[15,178],"that":[16,32,119,142,174,193],"can":[17],"be":[18,161],"relied":[19],"upon":[20],"to":[21,54,59,104,148,184],"achieve":[22],"higher":[23],"levels":[24],"security.":[26],"We":[27,87,126,167],"consider":[28,70],"instead":[29],"non-degraded":[30,190],"eavesdroppers":[31,192],"possess":[33],"equal":[34],"or":[35],"better":[36],"capabilities":[37],"than":[38],"legitimate":[39],"receivers.":[40],"Under":[41],"this":[42,93],"challenging":[43],"setup,":[44],"most":[45],"the":[47,89,106,121,177],"current":[48],"become":[52],"hard":[53],"administer":[55],"and":[56,129,182],"new":[57],"dimensions":[58],"establish":[60,185],"advantageous":[61,197],"periods":[62],"communication":[64],"are":[65],"needed.":[66],"For":[67],"that,":[68],"we":[69],"employing":[71],"spread":[73,94],"spectrum":[74,95],"uncoordinated":[75],"frequency":[76,156],"hopping":[77],"(UFH)":[78],"scheme":[79],"aided":[80],"by":[81,97,154,180],"friendly":[82,124],"jammers":[83],"for":[84,163,171],"improved":[85],"secrecy.":[86],"characterize":[88],"secrecy":[90],"level":[91],"scheme,":[96],"devising":[98],"stochastic":[100],"geometry":[101],"mathematical":[102],"model":[103],"assess":[105],"secure":[107,112,150],"packet":[108,151],"throughput":[109,152],"(probability":[110],"communication)":[113],"devices":[115],"operating":[116],"under":[117],"UFH":[118,144,181],"accommodates":[120],"impact":[122],"jammers.":[125],"further":[127],"implement":[128],"evaluate":[130],"these":[131,158],"in":[133,196],"real-world":[135],"test-bed":[136],"software-defined":[138],"radios.":[139],"Results":[140],"show":[141],"although":[143],"with":[145],"jamming":[146,183],"leads":[147],"low":[149],"values,":[153],"exploiting":[155],"diversity,":[157],"methods":[159],"may":[160,194],"used":[162],"establishing":[164],"secret":[165,186],"keys.":[166],"propose":[168],"method":[170],"secret-key":[172],"establishment":[173],"builds":[175],"provided":[179],"keys,":[187],"notably":[188],"against":[189],"adversary":[191],"appear":[195],"situations.":[198]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
