{"id":"https://openalex.org/W7125814985","doi":"https://doi.org/10.1109/tifs.2026.3657885","title":"Experimental Validation of Information-Theoretic Physical Layer Security","display_name":"Experimental Validation of Information-Theoretic Physical Layer Security","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7125814985","doi":"https://doi.org/10.1109/tifs.2026.3657885"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2026.3657885","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3657885","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/tifs.2026.3657885","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5123900992","display_name":"Johannes Voichtleitner","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Johannes Voichtleitner","raw_affiliation_strings":["Chair of Theoretical Information Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":"https://orcid.org/0009-0003-3306-1977","affiliations":[{"raw_affiliation_string":"Chair of Theoretical Information Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024474222","display_name":"Moritz Wiese","orcid":"https://orcid.org/0000-0003-4561-9766"},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Moritz Wiese","raw_affiliation_strings":["Chair of Theoretical Information Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":"https://orcid.org/0000-0003-4561-9766","affiliations":[{"raw_affiliation_string":"Chair of Theoretical Information Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123947415","display_name":"Anna Frank","orcid":null},"institutions":[{"id":"https://openalex.org/I4210153047","display_name":"Giesecke and Devrient (Germany)","ror":"https://ror.org/053e6g844","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210153047"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Anna Frank","raw_affiliation_strings":["Giesecke+Devrient GmbH, Munich, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Giesecke+Devrient GmbH, Munich, Germany","institution_ids":["https://openalex.org/I4210153047"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123949964","display_name":"Holger Boche","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Holger Boche","raw_affiliation_strings":["Chair of Theoretical Information Technology, Technical University of Munich, Munich, Germany"],"raw_orcid":"https://orcid.org/0000-0002-8375-8946","affiliations":[{"raw_affiliation_string":"Chair of Theoretical Information Technology, Technical University of Munich, Munich, Germany","institution_ids":["https://openalex.org/I62916508"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5123900992"],"corresponding_institution_ids":["https://openalex.org/I62916508"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15495399,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"1697","last_page":"1711"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.004100000020116568,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.003100000089034438,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.6103000044822693},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.5523999929428101},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.5058000087738037},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.45969998836517334},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.45719999074935913},{"id":"https://openalex.org/keywords/attack-model","display_name":"Attack model","score":0.4375999867916107},{"id":"https://openalex.org/keywords/additive-white-gaussian-noise","display_name":"Additive white Gaussian noise","score":0.4009000062942505},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.3889000117778778},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.36719998717308044}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8392000198364258},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.6103000044822693},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.5523999929428101},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.5058000087738037},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.45969998836517334},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.45719999074935913},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.4375999867916107},{"id":"https://openalex.org/C169334058","wikidata":"https://www.wikidata.org/wiki/Q353292","display_name":"Additive white Gaussian noise","level":3,"score":0.4009000062942505},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.3889000117778778},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.36719998717308044},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.3668000102043152},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3578000068664551},{"id":"https://openalex.org/C4199805","wikidata":"https://www.wikidata.org/wiki/Q2725903","display_name":"Gaussian noise","level":2,"score":0.34439998865127563},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.33090001344680786},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.30410000681877136},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.2946000099182129},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.2904999852180481},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.28940001130104065},{"id":"https://openalex.org/C29265498","wikidata":"https://www.wikidata.org/wiki/Q7047719","display_name":"Noise measurement","level":3,"score":0.27790001034736633},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C112633086","wikidata":"https://www.wikidata.org/wiki/Q381287","display_name":"White noise","level":2,"score":0.2705000042915344},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.27000001072883606},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.2533000111579895},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2508000135421753}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2026.3657885","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3657885","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:mediatum.ub.tum.de:node/1840731","is_oa":false,"landing_page_url":"https://mediatum.ub.tum.de/1840731","pdf_url":null,"source":{"id":"https://openalex.org/S4377196330","display_name":"mediaTUM  (Technical University of Munich)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I62916508","host_organization_name":"Technical University of Munich","host_organization_lineage":["https://openalex.org/I62916508"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/tifs.2026.3657885","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3657885","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6552072763442993,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0,32,142],"maximum":[1,120],"likelihood":[2,121],"attack":[3,11,38,109,122,136,187],"strategy":[4,12,83],"is":[5,39,69,145],"known":[6],"to":[7,75,84,114,174],"be":[8,152],"the":[9,28,49,77,80,86,108,112,116,119,128,135,177,181],"optimal":[10,37,81],"for":[13,63,101,154,166,192],"an":[14],"eavesdropper":[15,50,113],"in":[16,189],"a":[17,60,97,162],"wiretap":[18],"channel":[19],"scenario":[20],"with":[21,185],"additive":[22],"white":[23],"Gaussian":[24],"noise":[25],"channels":[26],"under":[27,139],"distinguishing":[29],"security":[30,117],"criterion.":[31],"main":[33],"drawback":[34],"of":[35,79,88,111],"this":[36,45,93,167],"its":[40],"high":[41],"computational":[42],"complexity.":[43,178],"While":[44],"complexity":[46,99],"doesn\u2019t":[47],"hinder":[48],"since":[51],"he":[52],"has":[53],"unlimited":[54],"computing":[55],"power,":[56],"it":[57,68],"does":[58],"present":[59],"significant":[61],"challenge":[62],"legitimate":[64],"parties.":[65],"For":[66],"them,":[67],"extremely":[70],"difficult,":[71],"if":[72],"not":[73],"impossible,":[74],"estimate":[76],"outcome":[78],"attacker":[82],"validate":[85,115],"secrecy":[87],"their":[89],"communication":[90],"system.":[91],"In":[92],"paper,":[94],"we":[95,160],"introduce":[96],"low":[98],"method":[100,144,169,184],"generating":[102],"upper":[103],"and":[104,150,170],"lower":[105],"bounds":[106,130],"on":[107,134,147],"performance":[110],"against":[118],"strategy.":[123],"We":[124,179],"theoretically":[125],"establish":[126],"that":[127],"derived":[129],"represent":[131],"valid":[132],"constraints":[133],"success":[137],"probability":[138],"suitable":[140],"constraints.":[141],"validation":[143,168,183],"based":[146],"list":[148,163],"generation":[149,164],"can":[151],"used":[153],"any":[155],"linear":[156],"block":[157],"code.":[158],"Furthermore,":[159],"propose":[161],"algorithm":[165],"show":[171],"different":[172],"ways":[173],"further":[175],"reduce":[176],"compare":[180],"proposed":[182],"state-of-the-art":[186],"strategies":[188],"numerical":[190],"simulations":[191],"various":[193],"error-correcting":[194],"codes.":[195]},"counts_by_year":[],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2026-01-28T00:00:00"}
