{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:05:23Z","timestamp":1772240723126,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":24,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819785452","type":"print"},{"value":"9789819785469","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8546-9_12","type":"book-chapter","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:02:51Z","timestamp":1729155771000},"page":"204-220","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Framework of\u00a0General Channel Key Generation Based on\u00a0Physical Layer"],"prefix":"10.1007","author":[{"given":"Hong","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Enting","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Xiuheng","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"issue":"6","key":"12_CR1","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MCOM.2015.7120014","volume":"53","author":"K Zeng","year":"2015","unstructured":"Zeng, K.: Physical layer key generation in wireless networks: challenges and opportunities. IEEE Commun. Mag. 53(6), 33\u201339 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"12_CR2","unstructured":"Diffie, W.: Diffie-Hellman key exchange (1976)"},{"key":"12_CR3","volume":"83","author":"H Zhao","year":"2024","unstructured":"Zhao, H., Guo, E., Lian, Z., Zhao, Y., Huang, X., Su, C.: A review and implementation of physical layer channel key generation in the internet of things. J. Inf. Secur. Appl. 83, 103779 (2024)","journal-title":"J. Inf. Secur. Appl."},{"key":"12_CR4","first-page":"2023021","volume":"3","author":"Q Xiao","year":"2024","unstructured":"Xiao, Q., Zhao, J., Feng, S., Li, G., Hu, A.: Securing NextG networks with physical-layer key generation: a survey. Secur. Saf. 3, 2023021 (2024)","journal-title":"Secur. Saf."},{"key":"12_CR5","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1007\/978-981-99-7356-9_43","volume-title":"ICICS 2023","author":"H Zhao","year":"2023","unstructured":"Zhao, H., Guo, E., Su, C., Huang, X.: Efficient and appropriate key generation scheme in different IoT scenarios. In: Wang, D., Yung, M., Liu, Z., Chen, X. (eds.) ICICS 2023. LNCS, vol. 14252, pp. 738\u2013749. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-7356-9_43"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the ACM International Conference on Mobile Computing and Networking, pp. 128\u2013139 (2008)","DOI":"10.1145\/1409944.1409960"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Zhao, H., Guo, E., Su, C., Huang, X.: Instant and secure channel key extraction scheme among wireless devices. In: Proceedings of the IEEE Global Communications Conference, pp. 5366\u20135371. IEEE (2023)","DOI":"10.1109\/GLOBECOM54140.2023.10437428"},{"issue":"7","key":"12_CR8","doi-asserted-by":"publisher","first-page":"4917","DOI":"10.1109\/JIOT.2021.3119053","volume":"9","author":"H Zhao","year":"2021","unstructured":"Zhao, H., Zhang, Y., Huang, X., Xiang, Y., Su, C.: A physical-layer key generation approach based on received signal strength in smart homes. IEEE Internet Things J. 9(7), 4917\u20134927 (2021)","journal-title":"IEEE Internet Things J."},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Zhu, F., et al.: Lightweight verifiable privacy-preserving data aggregation for smart grids. IEEE Internet Things J. (2024)","DOI":"10.1109\/JIOT.2024.3419161"},{"issue":"8","key":"12_CR10","doi-asserted-by":"publisher","first-page":"5234","DOI":"10.1109\/TWC.2020.2991111","volume":"19","author":"Y Huang","year":"2020","unstructured":"Huang, Y., Wang, W., Wang, H., Jiang, T., Zhang, Q.: Authenticating on-body IoT devices: an adversarial learning approach. IEEE Trans. Wirel. Commun. 19(8), 5234\u20135245 (2020)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1016\/j.dcan.2022.03.004","volume":"9","author":"L Zhang","year":"2022","unstructured":"Zhang, L., et al.: An adaptive and robust secret key extraction scheme from high noise wireless channel in IIoT. Digit. Commun. Netw. 9, 809\u2013816 (2022)","journal-title":"Digit. Commun. Netw."},{"issue":"8","key":"12_CR12","doi-asserted-by":"publisher","first-page":"7590","DOI":"10.1109\/JIOT.2020.2986399","volume":"7","author":"L Wang","year":"2020","unstructured":"Wang, L., An, H., Zhu, H., Liu, W.: MobiKey: mobility-based secret key generation in smart home. IEEE Internet Things J. 7(8), 7590\u20137600 (2020)","journal-title":"IEEE Internet Things J."},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"He, H., et al.: Deep learning-based channel reciprocity learning for physical layer secret key generation. Secur. Commun. Netw. 2022 (2022)","DOI":"10.1155\/2022\/1844345"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Liu, D., Wang, T., Liu, S., Wang, R., Yao, S., Abdelzaher, T.: Contrastive self-supervised representation learning for sensing signals from the time-frequency perspective. In: Proceedings of the International Conference on Computer Communications and Networks, pp. 1\u201310. IEEE (2021)","DOI":"10.1109\/ICCCN52240.2021.9522151"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Abdelgader, A.M.S., Wu, L.: A secret key extraction technique applied in vehicular networks. In: Proceedings of the IEEE International Conference on Computational Science and Engineering, pp. 1396\u20131403 (2014)","DOI":"10.1109\/CSE.2014.264"},{"issue":"7","key":"12_CR16","doi-asserted-by":"publisher","first-page":"2065","DOI":"10.1109\/TMC.2016.2557784","volume":"16","author":"X Zhu","year":"2016","unstructured":"Zhu, X., Xu, F., Novak, E., Tan, C.C., Li, Q., Chen, G.: Using wireless link dynamics to extract a secret key in vehicular scenarios. IEEE Trans. Mob. Comput. 16(7), 2065\u20132078 (2016)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"3","key":"12_CR17","doi-asserted-by":"publisher","first-page":"2310","DOI":"10.1109\/TVT.2021.3056638","volume":"70","author":"M Bottarelli","year":"2021","unstructured":"Bottarelli, M., Karadimas, P., Epiphaniou, G., Ismail, D.K.B., Maple, C.: Adaptive and optimum secret key establishment for secure vehicular communications. IEEE Trans. Veh. Technol. 70(3), 2310\u20132321 (2021)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"7","key":"12_CR18","doi-asserted-by":"publisher","first-page":"4917","DOI":"10.1109\/JIOT.2021.3119053","volume":"9","author":"H Zhao","year":"2022","unstructured":"Zhao, H., Zhang, Y., Huang, X., Xiang, Y., Su, C.: A physical-layer key generation approach based on received signal strength in smart homes. IEEE Internet Things J. 9(7), 4917\u20134927 (2022)","journal-title":"IEEE Internet Things J."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Zhao, H., Zhang, Y., Huang, X., Xiang, Y.: An adaptive physical layer key extraction scheme for smart homes. In: Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications\/IEEE International Conference on Big Data Science and Engineering, pp. 499\u2013506 (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00073"},{"issue":"4","key":"12_CR20","first-page":"25","volume":"19","author":"T Joachims","year":"1999","unstructured":"Joachims, T.: SVMlight: support vector machine. SVM-Light Support Vector Mach. 19(4), 25 (1999)","journal-title":"SVM-Light Support Vector Mach."},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Pisner, D.A., Schnyer, D.M.: Support vector machine. In: Machine Learning, pp. 101\u2013121. Elsevier (2020)","DOI":"10.1016\/B978-0-12-815739-8.00006-7"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Garb, K., Xhemrishi, M., K\u00fcrzinger, L., Frisch, C.: The wiretap channel for capacitive PUF-based security enclosures. arXiv preprint arXiv:2202.01508 (2022)","DOI":"10.46586\/tches.v2022.i3.165-191"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Zhou, Q., He, Y., Yang, K., Chi, T.: Physical-layer identification of wireless IoT nodes through PUF-controlled transmitter spectral regrowth. IEEE Trans. Microwave Theory Tech. (2023)","DOI":"10.1109\/TMTT.2023.3305055"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Mitev, M., Pham, T.M., Chorti, A., Barreto, A.N., Fettweis, G.: Physical layer security-from theory to practice. IEEE BITS Inf. Theory Mag. (2023)","DOI":"10.36227\/techrxiv.21388338.v1"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8546-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:12:30Z","timestamp":1729156350000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8546-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"ISBN":["9789819785452","9789819785469"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8546-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"18 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}