{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:33:21Z","timestamp":1761989601988,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030797270"},{"type":"electronic","value":"9783030797287"}],"license":[{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T00:00:00Z","timestamp":1624492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-79728-7_26","type":"book-chapter","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:04:06Z","timestamp":1624471446000},"page":"263-275","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["ComPass: Proximity Aware Common Passphrase Agreement Protocol for Wi-Fi Devices Using Physical Layer Security"],"prefix":"10.1007","author":[{"given":"Khan","family":"Reaz","sequence":"first","affiliation":[]},{"given":"Gerhard","family":"Wunder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,24]]},"reference":[{"key":"26_CR1","unstructured":"Biswas, B., Herbert, V.: Efficient Root Finding of Polynomials over Fields of Characteristic 2. https:\/\/hal.archives-ouvertes.fr\/hal-00626997\/ (2009)"},{"issue":"1","key":"26_CR2","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/S0019-9958(60)90287-4","volume":"3","author":"RC Bose","year":"1960","unstructured":"Bose, R.C., Ray-Chaudhuri, D.K.: On a class of error correcting binary group codes. Inf. Control 3(1), 68\u201379 (1960)","journal-title":"Inf. Control"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Chien, R.: Cyclic decoding procedures for Bose-Chaudhuri-Hocquenghem codes. IEEE Trans. Inf. Theor. 10(4), 357\u2013363 (1964)","DOI":"10.1109\/TIT.1964.1053699"},{"key":"26_CR4","unstructured":"Djelic, I., Borgerding, M.: User BCH (Bose-Chaudhuri-Hocquenghem) encode\/decode library based on BCH module from Linux kernel. https:\/\/github.com\/mborgerding\/bch_codec (2015)"},{"issue":"1","key":"26_CR5","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97\u2013139 (2008)","journal-title":"SIAM J. Comput."},{"key":"26_CR6","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.FIPS.202","author":"MJ Dworkin","year":"2015","unstructured":"Dworkin, M.J.: SHA-3 standard: permutation-based hash and extendable-output functions. NIST Pubs (2015). https:\/\/doi.org\/10.6028\/NIST.FIPS.202","journal-title":"NIST Pubs"},{"key":"26_CR7","unstructured":"EVERIS-NTT DATA Company: KeePass Code Review Results Report. https:\/\/joinup.ec.europa.eu\/collection\/eu-fossa-2\/project-deliveries (2016)"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Gringoli, F., Schulz, M., Link, J., Hollick, M.: Free your CSI: a channel state information extraction platform for modern Wi-Fi chipsets. In: Proceedings of the 13th International Workshop on Wireless Network Testbeds, Experimental Evaluation & Characterization (2019)","DOI":"10.1145\/3349623.3355477"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Halperin, D., Hu, W., Sheth, A., Wetherall, D.: Tool release: Gathering 802.11 n traces with channel state information. ACM SIGCOMM Comput. Commun. Rev. 41(1), 53\u201353 (2011)","DOI":"10.1145\/1925861.1925870"},{"key":"26_CR10","doi-asserted-by":"publisher","unstructured":"Harkins, D., Kumari, W.: Opportunistic Wireless Encryption. RFC 8110 (2017). https:\/\/doi.org\/10.17487\/RFC8110. https:\/\/www.rfc-editor.org\/rfc\/rfc8110.html","DOI":"10.17487\/RFC8110"},{"key":"26_CR11","unstructured":"Harmon, K., Johnson, S., Reyzin, L.: An implementation of syndrome encoding and decoding for binary BCH codes, secure sketches and fuzzy extractors. https:\/\/www.cs.bu.edu\/~reyzin\/code\/fuzzy.html (2008)"},{"issue":"2","key":"26_CR12","first-page":"147","volume":"2","author":"A Hocquenghem","year":"1959","unstructured":"Hocquenghem, A.: Codes correcteurs d\u2019erreurs. Chiffres 2(2), 147\u201356 (1959)","journal-title":"Chiffres"},{"key":"26_CR13","doi-asserted-by":"publisher","unstructured":"IEEE: IEEE Std 802.11-2016 Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (2016). https:\/\/doi.org\/10.1109\/IEEESTD.2016.7786995","DOI":"10.1109\/IEEESTD.2016.7786995"},{"key":"26_CR14","unstructured":"INTERPOL: COVID-19 Cybercrime Analysis Report. https:\/\/www.interpol.int\/en\/News-and-Events\/News\/2020\/INTERPOL-report-shows-alarming-rate-of-cyberattacks-during-COVID-19 (2020)"},{"issue":"9","key":"26_CR15","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1109\/TCOMM.2005.855010","volume":"53","author":"P Jung","year":"2005","unstructured":"Jung, P., Wunder, G.: On time-variant distortions in multicarrier transmission with application to frequency offsets and phase noise. IEEE Trans. Commun. 53(9), 1561\u20131570 (2005)","journal-title":"IEEE Trans. Commun."},{"key":"26_CR16","doi-asserted-by":"publisher","unstructured":"Kaliski, B.: PKCS #5: Password-based cryptography specification version 2.0. RFC 2898 (2000). https:\/\/doi.org\/10.17487\/RFC2898. https:\/\/www.rfc-editor.org\/rfc\/rfc2898.html","DOI":"10.17487\/RFC2898"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Kilgallin, J., Vasko, R.: Factoring RSA keys in the IoT era. In: IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (2019)","DOI":"10.1109\/TPS-ISA48467.2019.00030"},{"key":"26_CR18","doi-asserted-by":"publisher","unstructured":"Kivinen, T., Kojo, M.: More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE). RFC 3526 (2003). https:\/\/doi.org\/10.17487\/RFC3526. https:\/\/www.rfc-editor.org\/rfc\/rfc3526.html","DOI":"10.17487\/RFC3526"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Kotaru, M., Joshi, K., Bharadia, D., Katti, S.: SpotFi: decimeter level localization using WiFi. In: Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, pp. 269\u2013282 (2015)","DOI":"10.1145\/2785956.2787487"},{"key":"26_CR20","doi-asserted-by":"crossref","unstructured":"Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theor. 39(3), 733\u2013742 (1993)","DOI":"10.1109\/18.256484"},{"key":"26_CR21","unstructured":"Meyer, F.: A single header-only C++ library for least squares fitting. https:\/\/github.com\/Rookfighter\/least-squares-cpp (2019)"},{"key":"26_CR22","unstructured":"Rappaport, T.: Wireless Communications: Principles and Practice, pp. 165\u2013166 (2001)"},{"key":"26_CR23","unstructured":"Reaz, K., Wunder, G.: Wireless Channel-based Autonomous Key Management for IoT (AutoKEY) on WiSHFUL Testbed. http:\/\/www.wishful-project.eu\/sites\/default\/files\/AutoKEY-leaflet.pdf (2017)"},{"issue":"4","key":"26_CR24","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Thai, C.D.T., Lee, J., Prakash, J., Quek, T.Q.: Secret group-key generation at physical layer for multi-antenna mesh topology. IEEE Trans. Inf. Forensics Secur. 14(1), 18\u201333 (2018)","DOI":"10.1109\/TIFS.2018.2837661"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Vanhoef, M., Piessens, F.: Key reinstallation attacks: forcing nonce reuse in WPA2. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM (2017)","DOI":"10.1145\/3133956.3134027"},{"key":"26_CR27","unstructured":"Vasisht, D., Kumar, S., Katabi, D.: Decimeter-level localization with a single WiFi access point. In: 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pp. 165\u2013178 (2016)"},{"key":"26_CR28","unstructured":"Vieb\u00f6ck, S.: Wi-Fi Protected Setup (WPS) PIN brute force vulnerability. CERT Vulnerability Note VU#723755. https:\/\/www.kb.cert.org\/vuls\/id\/723755\/"},{"issue":"9","key":"26_CR29","doi-asserted-by":"publisher","first-page":"1666","DOI":"10.1109\/JSAC.2012.121010","volume":"30","author":"Q Wang","year":"2012","unstructured":"Wang, Q., Xu, K., Ren, K.: Cooperative secret key generation from phase estimation in narrowband fading channels. IEEE J. Sel. Areas Commun. 30(9), 1666\u20131674 (2012)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"26_CR30","unstructured":"Wheeler, D.L.: zxcvbn: low-budget password strength estimation. In: 25th USENIX Security Symposium, pp. 157\u2013173 (2016)"},{"key":"26_CR31","unstructured":"Wi-Fi Alliance: Wi-Fi Easy Connect. https:\/\/www.wi-fi.org\/discover-wi-fi\/wi-fi-easy-connect. Accessed 23 Oct 2019"},{"key":"26_CR32","unstructured":"Wi-Fi Alliance: Opportunistic Wireless Encryption Specification. Specification v1.0 (2019)"},{"key":"26_CR33","unstructured":"Wi-Fi Alliance: Wi-Fi Protected Setup Version 2.0.2 (2020)"},{"key":"26_CR34","unstructured":"Wi-Fi Alliance: WPA3 Specification Version 3.0 (2020)"},{"key":"26_CR35","doi-asserted-by":"crossref","unstructured":"Wu, C., Yang, Z., Zhou, Z., Qian, K., Liu, Y., Liu, M.: PhaseU: Real-time LOS identification with WiFi. In: IEEE Conference on Computer Communications, pp. 2038\u20132046. IEEE (2015)","DOI":"10.1109\/INFOCOM.2015.7218588"},{"key":"26_CR36","doi-asserted-by":"crossref","unstructured":"Wyner, A.D.: The Wire-Tap Channel. Bell Syst. Tech. J. 54(8), 1355\u20131387 (1975)","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"26_CR37","doi-asserted-by":"crossref","unstructured":"Xi, W., et al.: Instant and Robust Authentication and Key Agreement among Mobile Devices. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978298"},{"key":"26_CR38","doi-asserted-by":"publisher","unstructured":"Xie, Y., Li, Z., Li, M.: Precise Power Delay Profiling with Commodity WiFi. MobiCom 2015. ACM (2015). https:\/\/doi.org\/10.1145\/2789168.2790124","DOI":"10.1145\/2789168.2790124"},{"key":"26_CR39","doi-asserted-by":"crossref","unstructured":"Zenger, C., Zimmer, J., Paar, C.: Security analysis of quantization schemes for channel-based key extraction. In: proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (2015)","DOI":"10.4108\/eai.22-7-2015.2260194"},{"key":"26_CR40","doi-asserted-by":"crossref","unstructured":"Zenger, C.T., Chur, M.J., Posielek, J.F., Paar, C., Wunder, G.: A novel key generating architecture for wireless low-resource devices. In: 2014 International Workshop on Secure Internet of Things. IEEE (2014)","DOI":"10.1109\/SIoT.2014.7"},{"issue":"9","key":"26_CR41","doi-asserted-by":"publisher","first-page":"2155","DOI":"10.1109\/TMC.2018.2793222","volume":"17","author":"H Zhu","year":"2018","unstructured":"Zhu, H., Zhuo, Y., Liu, Q., Chang, S.: $$\\pi $$-splicer: perceiving accurate CSI phases with commodity WiFi devices. IEEE Trans. Mobile Comput. 17(9), 2155\u20132165 (2018)","journal-title":"IEEE Trans. Mobile Comput."},{"key":"26_CR42","unstructured":"Zinoviev, V.: On the solution of equations of degree $$ \\le 10$$ over finite fields $$GF (2^m)$$. Rapports de recherche-INRIA (1996)"}],"container-title":["Lecture Notes in Networks and Systems","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79728-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:53:48Z","timestamp":1624474428000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79728-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,24]]},"ISBN":["9783030797270","9783030797287"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79728-7_26","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,6,24]]},"assertion":[{"value":"24 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}