{"id":"https://openalex.org/W7124180223","doi":"https://doi.org/10.1109/tifs.2026.3654398","title":"RIS-Assisted Integrated Communication and Secret Key Generation in Quasi-Static Environments","display_name":"RIS-Assisted Integrated Communication and Secret Key Generation in Quasi-Static Environments","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7124180223","doi":"https://doi.org/10.1109/tifs.2026.3654398"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3654398","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3654398","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058052537","display_name":"Zheyuan Deng","orcid":"https://orcid.org/0009-0003-3409-4623"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zheyuan Deng","raw_affiliation_strings":["Information Engineering University, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0009-0003-3409-4623","affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123011604","display_name":"Xiaoyan Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyan Hu","raw_affiliation_strings":["Information Engineering University, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-4312-9889","affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123045079","display_name":"Keming Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Keming Ma","raw_affiliation_strings":["Information Engineering University, Zhengzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Liang Jin","orcid":"https://orcid.org/0000-0001-6464-6263"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Jin","raw_affiliation_strings":["Information Engineering University, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-6464-6263","affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122993666","display_name":"Boming Li","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Boming Li","raw_affiliation_strings":["Information Engineering University, Zhengzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014489362","display_name":"QU Jing-hua","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinghua Qu","raw_affiliation_strings":["Information Engineering University, Zhengzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5058052537"],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08817027,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"1112","last_page":"1126"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.6604999899864197,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.6604999899864197,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.3190999925136566,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.002400000113993883,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.8295999765396118},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.59579998254776},{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.5586000084877014},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5494999885559082},{"id":"https://openalex.org/keywords/probability-density-function","display_name":"Probability density function","score":0.3709000051021576},{"id":"https://openalex.org/keywords/communications-security","display_name":"Communications security","score":0.3452000021934509},{"id":"https://openalex.org/keywords/random-number-generation","display_name":"Random number generation","score":0.33869999647140503},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.31349998712539673}],"concepts":[{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.8295999765396118},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7494999766349792},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.59579998254776},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.5586000084877014},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5494999885559082},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4255000054836273},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.4075999855995178},{"id":"https://openalex.org/C197055811","wikidata":"https://www.wikidata.org/wiki/Q207522","display_name":"Probability density function","level":2,"score":0.3709000051021576},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.3452000021934509},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.33869999647140503},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32350000739097595},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.31349998712539673},{"id":"https://openalex.org/C122123141","wikidata":"https://www.wikidata.org/wiki/Q176623","display_name":"Random variable","level":2,"score":0.3027999997138977},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.30239999294281006},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3009999990463257},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.29179999232292175},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2913999855518341},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.2831999957561493},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2799000144004822},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2784000039100647},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.27489998936653137},{"id":"https://openalex.org/C71743495","wikidata":"https://www.wikidata.org/wiki/Q2845210","display_name":"Power analysis","level":3,"score":0.27469998598098755},{"id":"https://openalex.org/C65422117","wikidata":"https://www.wikidata.org/wiki/Q358527","display_name":"Transmitter power output","level":4,"score":0.2703000009059906},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.2630999982357025},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.2556000053882599},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.25040000677108765},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3654398","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3654398","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2269388675","display_name":null,"funder_award_id":"62301608","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2715850826","display_name":null,"funder_award_id":"2022YFB2902202","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3098379323","display_name":null,"funder_award_id":"2022YFB2902205","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G3830296978","display_name":null,"funder_award_id":"2022YFB2902205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8014458112","display_name":null,"funder_award_id":"2022YFB2902202","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8853341699","display_name":null,"funder_award_id":"U22A2001","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1517403092","https://openalex.org/W2008880538","https://openalex.org/W2010820924","https://openalex.org/W2031724611","https://openalex.org/W2061474925","https://openalex.org/W2086959852","https://openalex.org/W2099111195","https://openalex.org/W2102163288","https://openalex.org/W2142795465","https://openalex.org/W2154750699","https://openalex.org/W2171074980","https://openalex.org/W2529677322","https://openalex.org/W2603622529","https://openalex.org/W2887346460","https://openalex.org/W2901364244","https://openalex.org/W2916993856","https://openalex.org/W2921180372","https://openalex.org/W2969424089","https://openalex.org/W2980053862","https://openalex.org/W2982157847","https://openalex.org/W2995554704","https://openalex.org/W3007256892","https://openalex.org/W3045385301","https://openalex.org/W3049088677","https://openalex.org/W3132465714","https://openalex.org/W3163555793","https://openalex.org/W3166393976","https://openalex.org/W3173962711","https://openalex.org/W3215165642","https://openalex.org/W4206016832","https://openalex.org/W4226061238","https://openalex.org/W4385338749","https://openalex.org/W4387757777","https://openalex.org/W4388624531","https://openalex.org/W4390492876","https://openalex.org/W4392939662","https://openalex.org/W4395027750","https://openalex.org/W4400770731","https://openalex.org/W4401211760"],"related_works":[],"abstract_inverted_index":{"Wireless":[0],"Channel-based":[1],"Secret":[2],"Key":[3],"Generation":[4],"(WC-SKG)":[5],"offers":[6],"a":[7,41,105,118,134,156],"promising":[8],"alternative":[9],"for":[10,38,175],"wireless":[11],"communication":[12,76,128],"security,":[13],"yet":[14,55],"suffers":[15],"from":[16],"an":[17],"extremely":[18],"low":[19],"key":[20,33],"generation":[21],"rate":[22],"(KGR)":[23],"in":[24,182],"quasi-static":[25,183],"environments":[26],"(e.g.,":[27],"indoor":[28],"Internet":[29],"of":[30,172],"Things),":[31],"where":[32],"refresh":[34],"cycles":[35],"can":[36,48],"extend":[37],"hours,":[39],"creating":[40],"security":[42],"vulnerability.":[43],"Reconfigurable":[44],"Intelligent":[45],"Surfaces":[46],"(RIS)":[47],"boost":[49],"KGR":[50,72,125,157],"by":[51],"introducing":[52],"artificial":[53],"randomness,":[54],"existing":[56],"schemes":[57],"only":[58],"randomize":[59],"the":[60,71,75,90,101,124,127,163,176],"RIS":[61],"phase":[62],"shifts":[63],"without":[64],"using":[65,117],"environmental":[66],"priors,":[67],"failing":[68],"to":[69,122,141],"maximize":[70,123],"and":[73,94,109],"meet":[74],"signal-to-noise":[77],"ratio":[78],"(SNR)":[79],"requirement,":[80],"causing":[81],"service":[82],"outages.":[83],"To":[84],"overcome":[85],"these":[86],"limitations,":[87],"we":[88,99,132],"propose":[89],"RIS-assisted":[91],"Integrated":[92],"Communication":[93],"WC-SKG":[95],"(RICK)":[96],"scheme.":[97],"First,":[98],"treat":[100],"RIS-adjusted":[102],"channel":[103],"as":[104],"designable":[106],"random":[107],"variable":[108],"derive":[110],"its":[111,180],"optimal":[112,143],"probability":[113],"density":[114],"function":[115],"(PDF)":[116],"novel":[119],"geometric-algebraic":[120],"framework":[121],"under":[126],"SNR":[129],"constraint.":[130],"Second,":[131],"design":[133],"constrained-clustering-based":[135],"quantization":[136],"region":[137],"division":[138],"scheme":[139,165],"tailored":[140],"this":[142],"non-uniform":[144],"PDF,":[145],"guaranteeing":[146],"uniformly":[147],"distributed":[148],"secret":[149],"keys.":[150],"Simulation":[151],"results":[152],"show":[153],"RICK":[154],"achieves":[155],"approximately":[158],"3.5-5":[159],"times":[160],"higher":[161],"than":[162],"state-of-the-art":[164],"while":[166],"saving":[167],"at":[168],"least":[169],"20":[170],"dB":[171],"transmit":[173],"power":[174],"same":[177],"KGR,":[178],"confirming":[179],"effectiveness":[181],"scenarios.":[184]},"counts_by_year":[],"updated_date":"2026-01-29T23:13:10.619473","created_date":"2026-01-15T00:00:00"}
