{"id":"https://openalex.org/W7127160857","doi":"https://doi.org/10.1109/trustcom66490.2025.00124","title":"PUF-Enhanced Physical-Layer Key Generation for Secure Drone Communication with Untrusted Relays","display_name":"PUF-Enhanced Physical-Layer Key Generation for Secure Drone Communication with Untrusted Relays","publication_year":2025,"publication_date":"2025-11-14","ids":{"openalex":"https://openalex.org/W7127160857","doi":"https://doi.org/10.1109/trustcom66490.2025.00124"},"language":null,"primary_location":{"id":"doi:10.1109/trustcom66490.2025.00124","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom66490.2025.00124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100369879","display_name":"Chen Li","orcid":"https://orcid.org/0000-0002-8438-259X"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tao Chen","raw_affiliation_strings":["Southeast University,School of Cyber Science and Engineering,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100759528","display_name":"Dongming Li","orcid":"https://orcid.org/0000-0002-4557-6279"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongming Li","raw_affiliation_strings":["Southeast University,School of Cyber Science and Engineering,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Southeast University,School of Cyber Science and Engineering,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061590421","display_name":"Xianglin Fan","orcid":"https://orcid.org/0009-0008-1532-7985"},"institutions":[{"id":"https://openalex.org/I4210147745","display_name":"West Anhui University","ror":"https://ror.org/046ft6c74","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210147745"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xianglin Fan","raw_affiliation_strings":["West Anhui University,School of Electronics and Information Engineering,Lu&#x2019;an,China"],"affiliations":[{"raw_affiliation_string":"West Anhui University,School of Electronics and Information Engineering,Lu&#x2019;an,China","institution_ids":["https://openalex.org/I4210147745"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5124759272","display_name":"Yi Lou","orcid":null},"institutions":[{"id":"https://openalex.org/I4210158823","display_name":"Weihai Science and Technology Bureau","ror":"https://ror.org/05mx4xx46","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210158823"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Lou","raw_affiliation_strings":["Harbin Institute of Technology Weihai,School of Information Science and Engineering,Weihai,China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology Weihai,School of Information Science and Engineering,Weihai,China","institution_ids":["https://openalex.org/I4210158823"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100369879"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.61955403,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1072","last_page":"1079"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.840399980545044,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.840399980545044,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.07919999957084656,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.01600000075995922,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.8930000066757202},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.8385000228881836},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.698199987411499},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.5414000153541565},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5260999798774719},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.49059998989105225},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.3968000113964081},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.3847000002861023}],"concepts":[{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.8930000066757202},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.8385000228881836},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.698199987411499},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6779999732971191},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.5414000153541565},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5260999798774719},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.49059998989105225},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4700999855995178},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4375999867916107},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.3968000113964081},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.3847000002861023},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.3824999928474426},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.3790999948978424},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.37279999256134033},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.3513999879360199},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.34929999709129333},{"id":"https://openalex.org/C53524968","wikidata":"https://www.wikidata.org/wiki/Q7315582","display_name":"Resist","level":3,"score":0.30320000648498535},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.2903999984264374},{"id":"https://openalex.org/C56296756","wikidata":"https://www.wikidata.org/wiki/Q840922","display_name":"Bit error rate","level":3,"score":0.2662999927997589},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.2572999894618988}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/trustcom66490.2025.00124","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom66490.2025.00124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 24th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.6281933188438416,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324856","display_name":"Southeast University","ror":"https://ror.org/04ct4d772"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W2883259164","https://openalex.org/W2981876784","https://openalex.org/W3157622106","https://openalex.org/W4285037976","https://openalex.org/W4313534845","https://openalex.org/W4386065271","https://openalex.org/W4390423548","https://openalex.org/W4393140585","https://openalex.org/W4394744167","https://openalex.org/W4403918831","https://openalex.org/W4404101446","https://openalex.org/W4405087593","https://openalex.org/W4405778562","https://openalex.org/W4406046639","https://openalex.org/W4406171212","https://openalex.org/W4406611194","https://openalex.org/W4406727854","https://openalex.org/W4407639894","https://openalex.org/W4407693684","https://openalex.org/W4408325220","https://openalex.org/W4413918262"],"related_works":[],"abstract_inverted_index":{"Physical-layer":[0],"key":[1,49,105,127,161,168],"generation":[2,128,162],"(PLKG)":[3],"has":[4,196],"attracted":[5],"significant":[6],"attention":[7],"due":[8],"to":[9,48,70,93],"its":[10],"lightweight":[11],"and":[12,23,45,84,111,125,146,167,181,205],"strong":[13],"randomness,":[14],"making":[15,201],"it":[16,202],"highly":[17],"suitable":[18],"for":[19,208],"drones":[20,77],"with":[21,80],"energy":[22],"computational":[24],"constraints.":[25],"However,":[26],"when":[27],"drone":[28,58,179,210],"communications":[29,212],"rely":[30],"on":[31],"relay":[32,35,72,99,142],"nodes,":[33],"untrusted":[34,71,98,217],"nodes":[36],"may":[37],"launch":[38],"attacks":[39],"such":[40,140],"as":[41,107,141],"eavesdropping,":[42,143],"tampering,":[43,144],"replay":[44],"man-in-the-middle,":[46],"leading":[47],"leakage.":[50],"To":[51],"address":[52],"this":[53],"problem,":[54],"we":[55],"propose":[56],"a":[57,203],"-physical":[59],"unclonable":[60],"functions":[61],"(PUFs)":[62],"-":[63],"PLKG":[64,91,157],"(DPPLKG)":[65],"scheme":[66,195],"that":[67,153],"enhances":[68],"resistance":[69],"attacks.":[73,148],"In":[74,191],"DPPLKG,":[75],"legitimate":[76,130],"are":[78],"equipped":[79],"paired":[81],"PUF":[82,189],"hardware,":[83],"artificial":[85],"noise":[86,183],"is":[87],"injected":[88],"during":[89],"the":[90,95,108,112,119,193,214],"process":[92],"reduce":[94],"accuracy":[96],"of":[97,116,160,216],"channel":[100],"estimation.":[101],"The":[102,149],"generated":[103],"physical-layer":[104],"serves":[106],"PUFs":[109,117],"challenge,":[110],"unique":[113],"hardware":[114,182],"response":[115],"generates":[118],"final":[120],"session":[121],"key,":[122],"ensuring":[123],"consistent":[124],"secure":[126,211],"among":[129],"drones.":[131],"After":[132],"analysis,":[133],"DPPLKG":[134,154],"can":[135,171],"effectively":[136],"resist":[137,173],"various":[138],"threats":[139],"replay,":[145],"impersonation":[147],"simulation":[150],"results":[151],"show":[152],"outperforms":[155],"traditional":[156],"in":[158,188,213],"terms":[159],"rate,":[163,166],"bit":[164],"error":[165],"entropy.":[169],"It":[170],"also":[172],"Doppler":[174],"frequency":[175],"changes":[176,187],"caused":[177,184],"by":[178,185],"mobility":[180],"temperature":[186],"devices.":[190],"addition,":[192],"proposed":[194],"an":[197],"acceptable":[198],"delay":[199],"time,":[200],"practical":[204],"efficient":[206],"solution":[207],"achieving":[209],"presence":[215],"relays.":[218]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-02-03T00:00:00"}
