{"id":"https://openalex.org/W2011582944","doi":"https://doi.org/10.1145/1614320.1614356","title":"On the effectiveness of secret key extraction from wireless signal strength in real environments","display_name":"On the effectiveness of secret key extraction from wireless signal strength in real environments","publication_year":2009,"publication_date":"2009-09-20","ids":{"openalex":"https://openalex.org/W2011582944","doi":"https://doi.org/10.1145/1614320.1614356","mag":"2011582944"},"language":"en","primary_location":{"id":"doi:10.1145/1614320.1614356","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1614320.1614356","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th annual international conference on Mobile computing and networking","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016425387","display_name":"Suman Jana","orcid":"https://orcid.org/0000-0002-9850-2169"},"institutions":[{"id":"https://openalex.org/I223532165","display_name":"University of Utah","ror":"https://ror.org/03r0ha626","country_code":"US","type":"education","lineage":["https://openalex.org/I223532165"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Suman Jana","raw_affiliation_strings":["University of Utah, Salt Lake City, UT, USA"],"affiliations":[{"raw_affiliation_string":"University of Utah, Salt Lake City, UT, USA","institution_ids":["https://openalex.org/I223532165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077732303","display_name":"Sriram N. Premnath","orcid":null},"institutions":[{"id":"https://openalex.org/I223532165","display_name":"University of Utah","ror":"https://ror.org/03r0ha626","country_code":"US","type":"education","lineage":["https://openalex.org/I223532165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sriram Nandha Premnath","raw_affiliation_strings":["University of Utah, Salt Lake City, UT, USA"],"affiliations":[{"raw_affiliation_string":"University of Utah, Salt Lake City, UT, USA","institution_ids":["https://openalex.org/I223532165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042242613","display_name":"Mike Clark","orcid":null},"institutions":[{"id":"https://openalex.org/I223532165","display_name":"University of Utah","ror":"https://ror.org/03r0ha626","country_code":"US","type":"education","lineage":["https://openalex.org/I223532165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mike Clark","raw_affiliation_strings":["University of Utah, Salt Lake City, UT, USA"],"affiliations":[{"raw_affiliation_string":"University of Utah, Salt Lake City, UT, USA","institution_ids":["https://openalex.org/I223532165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000720324","display_name":"Sneha Kumar Kasera","orcid":"https://orcid.org/0000-0002-5589-748X"},"institutions":[{"id":"https://openalex.org/I223532165","display_name":"University of Utah","ror":"https://ror.org/03r0ha626","country_code":"US","type":"education","lineage":["https://openalex.org/I223532165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sneha K. Kasera","raw_affiliation_strings":["University of Utah, Salt Lake City, UT, USA"],"affiliations":[{"raw_affiliation_string":"University of Utah, Salt Lake City, UT, USA","institution_ids":["https://openalex.org/I223532165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068259004","display_name":"Neal Patwari","orcid":"https://orcid.org/0000-0003-3440-2043"},"institutions":[{"id":"https://openalex.org/I223532165","display_name":"University of Utah","ror":"https://ror.org/03r0ha626","country_code":"US","type":"education","lineage":["https://openalex.org/I223532165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Neal Patwari","raw_affiliation_strings":["University of Utah, Salt Lake City, UT, USA"],"affiliations":[{"raw_affiliation_string":"University of Utah, Salt Lake City, UT, USA","institution_ids":["https://openalex.org/I223532165"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086268637","display_name":"Srikanth V. Krishnamurthy","orcid":"https://orcid.org/0000-0002-6533-4381"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Srikanth V. Krishnamurthy","raw_affiliation_strings":["University of California Riverside, Riverside, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California Riverside, Riverside, CA, USA","institution_ids":["https://openalex.org/I103635307"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5016425387"],"corresponding_institution_ids":["https://openalex.org/I223532165"],"apc_list":null,"apc_paid":null,"fwci":21.3371,"has_fulltext":false,"cited_by_count":514,"citation_normalized_percentile":{"value":0.99629389,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"321","last_page":"332"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7334932088851929},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7057164907455444},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.6506207585334778},{"id":"https://openalex.org/keywords/signal-strength","display_name":"Signal strength","score":0.6114345192909241},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43701431155204773},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.4238429665565491},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3679269552230835},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34747374057769775},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.27159082889556885}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7334932088851929},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7057164907455444},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.6506207585334778},{"id":"https://openalex.org/C176808163","wikidata":"https://www.wikidata.org/wiki/Q17105794","display_name":"Signal strength","level":3,"score":0.6114345192909241},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43701431155204773},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.4238429665565491},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3679269552230835},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34747374057769775},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.27159082889556885},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/1614320.1614356","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1614320.1614356","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th annual international conference on Mobile computing and networking","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.148.6578","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.148.6578","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.utah.edu/~suman/publications/com431-jana-1.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.149.6777","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.6777","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.utah.edu/~kasera/myPapers/com431-janaPS.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.158.3852","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.3852","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.ucr.edu/~krish/mobicom09-final.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.352.2551","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.352.2551","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.utexas.edu/~suman/publications/mobicom09/mobicom09-key-extraction.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1517403092","https://openalex.org/W1557662267","https://openalex.org/W1916886752","https://openalex.org/W1982366917","https://openalex.org/W1995875735","https://openalex.org/W2001466659","https://openalex.org/W2042460777","https://openalex.org/W2054496355","https://openalex.org/W2064423787","https://openalex.org/W2085428487","https://openalex.org/W2106833918","https://openalex.org/W2110358873","https://openalex.org/W2115650836","https://openalex.org/W2131580663","https://openalex.org/W2138009247","https://openalex.org/W2141954204","https://openalex.org/W2142795465","https://openalex.org/W2149808502","https://openalex.org/W2151043249","https://openalex.org/W2155886813","https://openalex.org/W2161081468","https://openalex.org/W2169748886","https://openalex.org/W2336770924","https://openalex.org/W2570008916","https://openalex.org/W4232394999","https://openalex.org/W4243494487","https://openalex.org/W6633483871","https://openalex.org/W6648982606"],"related_works":["https://openalex.org/W2130966263","https://openalex.org/W2329452785","https://openalex.org/W2356380379","https://openalex.org/W2363925233","https://openalex.org/W2366284060","https://openalex.org/W3205432346","https://openalex.org/W1794016765","https://openalex.org/W2391464953","https://openalex.org/W4367556723","https://openalex.org/W4226196295"],"abstract_inverted_index":{"We":[0,30],"evaluate":[1],"the":[2,16,23,27,59,62,95,108,119,162,169,194,198],"effectiveness":[3],"of":[4,35,40,56,121,173,197],"secret":[5,75,123,132,184],"key":[6,83,124,133,185],"extraction,":[7],"for":[8,73],"private":[9],"communication":[10],"between":[11,26],"two":[12,28,96],"wireless":[13,24,60],"devices,":[14],"from":[15],"received":[17],"signal":[18],"strength":[19],"(RSS)":[20],"variations":[21,57],"on":[22,118],"channel":[25],"devices.":[29],"use":[31],"real":[32],"world":[33],"measurements":[34,154],"RSS":[36],"in":[37,50,58,85,91,107,142,159,171],"a":[38,74,104,179],"variety":[39],"environments":[41],"and":[42,89,149],"settings.":[43],"Our":[44,153],"experimental":[45],"results":[46],"show":[47,155],"that":[48,136,156,165,203],"(i)":[49],"certain":[51],"environments,":[52,88],"due":[53],"to":[54,161],"lack":[55],"channel,":[61],"extracted":[63],"bits":[64,71,112,177],"have":[65],"very":[66],"low":[67],"entropy":[68,111,176],"making":[69],"these":[70,86],"unsuitable":[72],"key,":[76],"(ii)":[77],"an":[78,129,138],"adversary":[79],"can":[80],"cause":[81],"predictable":[82],"generation":[84,134],"static":[87],"(iii)":[90],"dynamic":[92],"scenarios":[93],"where":[94,101],"devices":[97],"are":[98,113],"mobile,":[99],"and/or":[100],"there":[102],"is":[103],"significant":[105],"movement":[106],"environment,":[109],"high":[110,175,180],"obtained":[114],"fairly":[115],"quickly.":[116],"Building":[117],"strengths":[120],"existing":[122,163],"extraction":[125],"approaches,":[126],"we":[127,166,204],"develop":[128],"environment":[130],"adaptive":[131,139],"scheme":[135,191],"uses":[137],"lossy":[140],"quantizer":[141],"conjunction":[143],"with":[144],"Cascade-based":[145],"information":[146],"reconciliation":[147],"[7]":[148],"privacy":[150],"amplification":[151],"[14].":[152],"our":[157,190],"scheme,":[158],"comparison":[160],"ones":[164],"evaluate,":[167],"performs":[168],"best":[170],"terms":[172],"generating":[174],"at":[178],"bit":[181,186],"rate.":[182],"The":[183],"streams":[187],"generated":[188],"by":[189],"also":[192],"pass":[193],"randomness":[195],"tests":[196],"NIST":[199],"test":[200],"suite":[201],"[21]":[202],"conduct.":[205]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":23},{"year":2023,"cited_by_count":22},{"year":2022,"cited_by_count":22},{"year":2021,"cited_by_count":39},{"year":2020,"cited_by_count":36},{"year":2019,"cited_by_count":32},{"year":2018,"cited_by_count":39},{"year":2017,"cited_by_count":40},{"year":2016,"cited_by_count":51},{"year":2015,"cited_by_count":42},{"year":2014,"cited_by_count":43},{"year":2013,"cited_by_count":39},{"year":2012,"cited_by_count":29}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
