{"id":"https://openalex.org/W3135098427","doi":"https://doi.org/10.1155/2021/6642605","title":"A Lightweight Key Generation Scheme for Secure Device\u2010to\u2010Device (D2D) Communication","display_name":"A Lightweight Key Generation Scheme for Secure Device\u2010to\u2010Device (D2D) Communication","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3135098427","doi":"https://doi.org/10.1155/2021/6642605","mag":"3135098427"},"language":"en","primary_location":{"id":"doi:10.1155/2021/6642605","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6642605","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/6642605.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/wcmc/2021/6642605.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109297460","display_name":"Chunwei Lou","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunwei Lou","raw_affiliation_strings":["University of Electronic Science and Technology of China (UESTC), Chengdu 611731, China","University of Electronic Science and Technology of China (UESTC), Chengdu 611731"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China (UESTC), Chengdu 611731, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"University of Electronic Science and Technology of China (UESTC), Chengdu 611731","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088153559","display_name":"Mingsheng Cao","orcid":"https://orcid.org/0000-0003-0691-2724"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mingsheng Cao","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, UESTC, Chengdu, China","Network and Data Security Key Laboratory of Sichuan Province, UESTC, Chengdu"],"raw_orcid":"https://orcid.org/0000-0003-0691-2724","affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, UESTC, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, UESTC, Chengdu","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055163684","display_name":"Rongchun Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I109131318","display_name":"Civil Service College","ror":"https://ror.org/02hxmqn30","country_code":"SG","type":"education","lineage":["https://openalex.org/I109131318"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Rongchun Wu","raw_affiliation_strings":["Officers College of PAP, Chengdu, China","Officers College of PAP, Chengdu"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Officers College of PAP, Chengdu, China","institution_ids":[]},{"raw_affiliation_string":"Officers College of PAP, Chengdu","institution_ids":["https://openalex.org/I109131318"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073181706","display_name":"Dajiang Chen","orcid":"https://orcid.org/0000-0003-0745-5836"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dajiang Chen","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, UESTC, Chengdu, China","Peng Cheng Laboratory, Shenzhen 518055, China","Peng Cheng Laboratory, Shenzhen 518055","Network and Data Security Key Laboratory of Sichuan Province, UESTC, Chengdu"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, UESTC, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Peng Cheng Laboratory, Shenzhen 518055, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"Peng Cheng Laboratory, Shenzhen 518055","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, UESTC, Chengdu","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002364428","display_name":"Hua Xu","orcid":"https://orcid.org/0000-0001-6653-7140"},"institutions":[{"id":"https://openalex.org/I4210141689","display_name":"Yancheng Teachers University","ror":"https://ror.org/042k5fe81","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210141689"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hua Xu","raw_affiliation_strings":["School of Physics and Electronic Engineering, Yancheng Teachers University, Yancheng 224007, China","School of Physics and Electronic Engineering, Yancheng Teachers University, Yancheng 224007"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Physics and Electronic Engineering, Yancheng Teachers University, Yancheng 224007, China","institution_ids":["https://openalex.org/I4210141689"]},{"raw_affiliation_string":"School of Physics and Electronic Engineering, Yancheng Teachers University, Yancheng 224007","institution_ids":["https://openalex.org/I4210141689"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5088153559"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":0.5084,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.63115345,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"2021","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8729616403579712},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7135380506515503},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6513687372207642},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.5252373218536377},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5051856637001038},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41470253467559814},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3419789969921112},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.19216036796569824}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8729616403579712},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7135380506515503},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6513687372207642},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.5252373218536377},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5051856637001038},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41470253467559814},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3419789969921112},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.19216036796569824},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/6642605","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6642605","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/6642605.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f2d1c8fa5fe64983b1484f3d0fa7cb02","is_oa":true,"landing_page_url":"https://doaj.org/article/f2d1c8fa5fe64983b1484f3d0fa7cb02","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/6642605","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6642605","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2021/6642605.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1517189076","display_name":null,"funder_award_id":"61502085","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2227486999","display_name":null,"funder_award_id":"61872059","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2738946305","display_name":null,"funder_award_id":"61771417","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6566275626","display_name":null,"funder_award_id":"LZC0020","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3135098427.pdf","grobid_xml":"https://content.openalex.org/works/W3135098427.grobid-xml"},"referenced_works_count":36,"referenced_works":["https://openalex.org/W1639305476","https://openalex.org/W1902764075","https://openalex.org/W1916886752","https://openalex.org/W1970334960","https://openalex.org/W1986090422","https://openalex.org/W2003770618","https://openalex.org/W2009204314","https://openalex.org/W2011582944","https://openalex.org/W2040317577","https://openalex.org/W2042460777","https://openalex.org/W2053923031","https://openalex.org/W2054496355","https://openalex.org/W2055195752","https://openalex.org/W2080946167","https://openalex.org/W2083507154","https://openalex.org/W2085914567","https://openalex.org/W2099111195","https://openalex.org/W2102187818","https://openalex.org/W2108777864","https://openalex.org/W2111744417","https://openalex.org/W2126477936","https://openalex.org/W2128805726","https://openalex.org/W2136876942","https://openalex.org/W2138668183","https://openalex.org/W2154793448","https://openalex.org/W2156186849","https://openalex.org/W2159247478","https://openalex.org/W2344737609","https://openalex.org/W2570008916","https://openalex.org/W2765908489","https://openalex.org/W2789441909","https://openalex.org/W2808669017","https://openalex.org/W2908273190","https://openalex.org/W3094820284","https://openalex.org/W3103057714","https://openalex.org/W3116637734"],"related_works":["https://openalex.org/W3125305833","https://openalex.org/W2013817888","https://openalex.org/W2363759744","https://openalex.org/W2560394302","https://openalex.org/W2348393504","https://openalex.org/W2000260307","https://openalex.org/W4205536957","https://openalex.org/W2380713189","https://openalex.org/W269309995","https://openalex.org/W3094714434"],"abstract_inverted_index":{"Key":[0],"agreement":[1],"is":[2,73],"one":[3],"the":[4,26,60,101,106,120,124,127,133,143,152,171],"most":[5],"essential":[6],"steps":[7],"when":[8],"applying":[9],"cryptographic":[10],"techniques":[11],"to":[12,104],"secure":[13,158],"device\u2010to\u2010device":[14],"(D2D)":[15],"communications.":[16],"Recently,":[17],"several":[18],"PHY\u2010based":[19],"solutions":[20],"have":[21],"been":[22],"proposed":[23,74,121,134,153],"by":[24,75,91,100],"leveraging":[25],"channel":[27,93,110],"gains":[28,94],"as":[29],"a":[30,45,67,114,157,162],"common":[31],"randomness":[32],"source":[33],"for":[34,87],"key":[35,49,56,70,117,159,164,167],"extraction":[36,71],"in":[37,78],"wireless":[38,79,89],"networks.":[39],"However,":[40],"these":[41],"schemes":[42],"usually":[43],"suffer":[44],"low":[46,52],"rate":[47,118,165],"of":[48,54,62,109,119,126],"generation":[50],"and":[51,57,95,166],"entropy":[53,168],"generated":[55],"rely":[58],"on":[59],"mobility":[61],"devices.":[63],"In":[64],"this":[65],"paper,":[66],"novel":[68],"secret":[69],"protocol":[72],"using":[76],"interference":[77],"D2D":[80],"fading":[81],"channel.":[82],"It":[83,130],"establishes":[84],"symmetrical":[85],"keys":[86],"two":[88],"devices":[90],"measuring":[92],"utilizing":[96],"artificial":[97],"jamming":[98],"sent":[99],"third":[102],"party":[103],"change":[105],"measured":[107],"value":[108],"gains.":[111],"We":[112],"give":[113],"theoretically":[115],"reachable":[116],"scheme":[122,135,154],"from":[123],"viewpoint":[125],"information":[128],"theory.":[129],"shows":[131],"that":[132,151],"can":[136,155],"make":[137],"hundred":[138],"times":[139],"performance":[140],"gain":[141],"than":[142],"existing":[144,172],"approaches":[145],"theoretically.":[146],"Experimental":[147],"results":[148],"also":[149],"demonstrate":[150],"achieve":[156],"distribution":[160],"with":[161,170],"higher":[163],"compared":[169],"schemes.":[173]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
