{"id":"https://openalex.org/W4406266487","doi":"https://doi.org/10.1109/vtc2024-fall63153.2024.10757826","title":"GAN-Assisted Secret Key Generation Against Eavesdropping In Dynamic Indoor LiFi Networks","display_name":"GAN-Assisted Secret Key Generation Against Eavesdropping In Dynamic Indoor LiFi Networks","publication_year":2024,"publication_date":"2024-10-07","ids":{"openalex":"https://openalex.org/W4406266487","doi":"https://doi.org/10.1109/vtc2024-fall63153.2024.10757826"},"language":"en","primary_location":{"id":"doi:10.1109/vtc2024-fall63153.2024.10757826","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2024-fall63153.2024.10757826","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060819430","display_name":"Elmahedi Mahalal","orcid":null},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Elmahedi Mahalal","raw_affiliation_strings":["Tennessee Technological University,Department of Computer Science,Cookeville,TN,USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Technological University,Department of Computer Science,Cookeville,TN,USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077148915","display_name":"Muhammad Ismail","orcid":"https://orcid.org/0000-0002-8051-9747"},"institutions":[{"id":"https://openalex.org/I63920570","display_name":"Tennessee Technological University","ror":"https://ror.org/05drmrq39","country_code":"US","type":"education","lineage":["https://openalex.org/I63920570"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Muhammad Ismail","raw_affiliation_strings":["Tennessee Technological University,Department of Computer Science,Cookeville,TN,USA"],"affiliations":[{"raw_affiliation_string":"Tennessee Technological University,Department of Computer Science,Cookeville,TN,USA","institution_ids":["https://openalex.org/I63920570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029956797","display_name":"Zi-Yang Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zi-Yang Wu","raw_affiliation_strings":["Northeastern University,College of Information Science and Engineering,Shenyang,China"],"affiliations":[{"raw_affiliation_string":"Northeastern University,College of Information Science and Engineering,Shenyang,China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068882573","display_name":"Mostafa M. Fouda","orcid":"https://orcid.org/0000-0003-1790-8640"},"institutions":[{"id":"https://openalex.org/I106969075","display_name":"Idaho State University","ror":"https://ror.org/0162z8b04","country_code":"US","type":"education","lineage":["https://openalex.org/I106969075"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mostafa M. Fouda","raw_affiliation_strings":["Idaho State University,Department of Electrical and Computer Engineering,Pocatello,ID,USA"],"affiliations":[{"raw_affiliation_string":"Idaho State University,Department of Electrical and Computer Engineering,Pocatello,ID,USA","institution_ids":["https://openalex.org/I106969075"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063911030","display_name":"Zubair Md. Fadlullah","orcid":"https://orcid.org/0000-0002-4785-2425"},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Zubair Md Fadlullah","raw_affiliation_strings":["Western University,Department of Computer Science,London,Canada"],"affiliations":[{"raw_affiliation_string":"Western University,Department of Computer Science,London,Canada","institution_ids":["https://openalex.org/I125749732"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5060819430"],"corresponding_institution_ids":["https://openalex.org/I63920570"],"apc_list":null,"apc_paid":null,"fwci":0.3735,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61953204,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9726999998092651,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.9438399076461792},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6803072690963745},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6571296453475952},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5386229753494263},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5056524276733398},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2653547525405884},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11240527033805847}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.9438399076461792},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6803072690963745},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6571296453475952},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5386229753494263},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5056524276733398},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2653547525405884},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11240527033805847}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtc2024-fall63153.2024.10757826","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2024-fall63153.2024.10757826","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4386561858","https://openalex.org/W4390045088","https://openalex.org/W2966050644","https://openalex.org/W3125305833","https://openalex.org/W2560394302","https://openalex.org/W2013817888","https://openalex.org/W2363759744","https://openalex.org/W2348393504","https://openalex.org/W2000260307","https://openalex.org/W2380713189"],"abstract_inverted_index":{"This":[0,181],"paper":[1],"explores":[2],"the":[3,22,46,51,59,66,76,84,95,101,118,122,134,142,145,166,170,178,185,194],"vulnerability":[4],"of":[5,28,48,109,124,144,172,196],"wireless":[6],"secret":[7,113],"key":[8],"generation":[9],"(WSKG)":[10],"to":[11,58,81,90,106,129,132,140,163,188],"eavesdropping":[12,173,199],"in":[13,53],"a":[14,110,153,158,189],"dynamic":[15],"indoor":[16],"light-fidelity":[17],"(LiFi)":[18],"network.":[19],"It":[20],"analyzes":[21],"channel":[23],"impulse":[24],"response":[25],"(CIR)":[26],"similarities":[27],"two":[29],"moving":[30],"user":[31],"equipments":[32],"(UEs)":[33],"across":[34],"scenarios":[35],"with":[36],"two,":[37],"four,":[38],"and":[39,87,136],"eight":[40,73,102],"UEs.":[41,64],"We":[42],"observe":[43],"that":[44,127,156],"as":[45,92],"number":[47,123],"UEs":[49,74,93,103],"increases,":[50],"similarity":[52,67,187],"CIR":[54,186],"also":[55],"rises,":[56],"due":[57],"proximal":[60],"movement":[61],"patterns":[62],"among":[63,100],"Specifically,":[65],"rate":[68],"peaks":[69],"at":[70],"70%":[71],"when":[72],"enter":[75],"room;":[77],"it":[78,115,138],"then":[79],"drops":[80],"24%":[82],"during":[83],"wandering":[85],"phase":[86],"rises":[88],"again":[89],"80%":[91],"exit":[94],"room.":[96],"Consequently,":[97],"an":[98],"eavesdropper":[99],"is":[104],"able":[105],"generate":[107],"27%":[108],"legitimate":[111],"UE\u2019s":[112],"key,":[114],"significantly":[116],"reduces":[117,184],"key\u2019s":[119],"complexity,":[120],"decreasing":[121],"possible":[125],"keys":[126],"need":[128],"be":[130],"tested":[131],"break":[133],"encryption":[135],"making":[137],"easier":[139],"predict":[141],"remainder":[143],"key.":[146],"To":[147],"mitigate":[148],"this":[149],"issue,":[150],"we":[151],"introduce":[152],"novel":[154],"approach":[155],"utilizes":[157],"generative":[159],"adversarial":[160],"network":[161],"(GAN)":[162],"artificially":[164],"manipulate":[165],"CIR,":[167],"thereby":[168],"reducing":[169],"effectiveness":[171],"by":[174],"adding":[175],"noise":[176],"into":[177],"observed":[179],"CIR.":[180],"method":[182],"effectively":[183],"negligible":[190],"1%,":[191],"thus":[192],"ensuring":[193],"integrity":[195],"WSKG":[197],"against":[198],"threats.":[200]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
