{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:12:34Z","timestamp":1740136354100,"version":"3.37.3"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T00:00:00Z","timestamp":1557532800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s00779-019-01226-z","type":"journal-article","created":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T15:01:58Z","timestamp":1557586918000},"page":"723-738","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Optimal secret sharing for wireless information security in the era of Internet of Things"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9901-4108","authenticated-orcid":false,"given":"Lei","family":"Miao","sequence":"first","affiliation":[]},{"given":"Dingde","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,11]]},"reference":[{"key":"1226_CR1","unstructured":"Miao L, Jiang D (2017) Optimal secret sharing for secure wireless communications in the era of internet of things. In: The 4th international conference on smart and sustainable city, Shanghai, China"},{"key":"1226_CR2","doi-asserted-by":"crossref","unstructured":"Barros J, Rodrigues MRD (July 2006) Secrecy capacity of wireless channels. In: IEEE international symposium on information theory, Seattle, WA","DOI":"10.1109\/ISIT.2006.261613"},{"key":"1226_CR3","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"UM Maurer","year":"1993","unstructured":"Maurer UM (1993) Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39:733\u2013742","journal-title":"IEEE Trans Inf Theory"},{"key":"1226_CR4","doi-asserted-by":"crossref","unstructured":"Perron E, Diggavi S, Telatar E (2009) On cooperative wireless network secrecy. In: IEEE Infocom, Rio de Janeiro, Brazil","DOI":"10.1109\/INFCOM.2009.5062115"},{"key":"1226_CR5","volume-title":"Antenna Theory: Analysis and Design","author":"CA Balanis","year":"1997","unstructured":"Balanis CA (1997) Antenna Theory: Analysis and Design, 2nd edn. Wiley, New York","edition":"2"},{"key":"1226_CR6","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1109\/TIFS.2007.902666","volume":"2","author":"R Wilson","year":"2007","unstructured":"Wilson R, Tse D, Scholtz RA (2007) Channel identification: Secret sharing using reciprocity in ultrawideband channels. IEEE Trans Inf Forensic Secur 2:364\u2013375","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"1226_CR7","doi-asserted-by":"crossref","unstructured":"Mathur S, Trappe W, Mandayam N, Ye C, Reznik A (2008) Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM international conference on mobile computing and networking, San Francisco, CA, USA","DOI":"10.1145\/1409944.1409960"},{"key":"1226_CR8","unstructured":"Kiayias BA-SA, Mercado A, Yener B (2007) Robust key generation from signal envelopes in wireless networks. In: Proceedings of the 14th ACM conference on computer and communications security, Alexandria, Virginia"},{"issue":"2","key":"1226_CR9","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1109\/LWC.2015.2399391","volume":"4","author":"L Miao","year":"2015","unstructured":"Miao L (2015) Differential secret sharing in wireless networks. IEEE Wirel Commun Lett 4(2):213\u2013216","journal-title":"IEEE Wirel Commun Lett"},{"key":"1226_CR10","doi-asserted-by":"crossref","unstructured":"Zeng K, Wu D, Chan AJ, Mohapatra P (2010) Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In: Proceedings of IEEE INFOCOM, San Diego, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462004"},{"key":"1226_CR11","unstructured":"Liu H, Yang J, Wang Y, Chen Y (2012) Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In: Proceedings of IEEE INFOCOM, Orlando, pp 927\u2013935"},{"key":"1226_CR12","doi-asserted-by":"crossref","unstructured":"Sun J, Chen X, Zhang J, Zhang Y, Zhang J (2014) Synergy: A game-theoretical approach for cooperative key generation in wireless networks. In: Proceedings of IEEE INFOCOM, Toronto, pp 997\u20131005","DOI":"10.1109\/INFOCOM.2014.6848029"},{"key":"1226_CR13","unstructured":"Xiao S, Gong W, Towsley D Secure wireless communication with dynamic secrets. In: IEEE Infocom, San Diego, CA"},{"key":"1226_CR14","doi-asserted-by":"publisher","first-page":"2025","DOI":"10.1109\/TCE.2009.5373765","volume":"55","author":"T Yao","year":"2009","unstructured":"Yao T, Fukui K, Nakashima J, Nakai T (2009) Initial common secret key sharing using random plaintexts for short-range wireless communications. IEEE Trans Consum Electron 55:2025\u20132033","journal-title":"IEEE Trans Consum Electron"},{"key":"1226_CR15","doi-asserted-by":"crossref","unstructured":"Safaka I, Fragouli C, Argyraki K, Diggavi S (2012) Creating shared secrets out of thin air. In: Proceedings of the 11th ACM Workshop on Hot Topics in Networks. ACM, pp 73\u201378","DOI":"10.1145\/2390231.2390244"},{"issue":"11","key":"1226_CR16","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"issue":"6","key":"1226_CR17","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1109\/TIT.2015.2421905","volume":"61","author":"S Zou","year":"2015","unstructured":"Zou S, Liang Y, Lai L, Shamai S (2015) An information theoretic approach to secret sharing. IEEE Trans Inf Theory 61(6):3121\u20133136","journal-title":"IEEE Trans Inf Theory"},{"issue":"12","key":"1226_CR18","doi-asserted-by":"publisher","first-page":"7195","DOI":"10.1109\/TIT.2016.2616144","volume":"62","author":"W Huang","year":"2016","unstructured":"Huang W, Langberg M, Kliewer J, Bruck J (2016) Communication efficient secret sharing. IEEE Trans Inf Theory 62(12):7195\u20137206","journal-title":"IEEE Trans Inf Theory"},{"issue":"721301","key":"1226_CR19","first-page":"12","volume":"2009","author":"M Killat","year":"2009","unstructured":"Killat M, Hartenstein H (2009) An empirical model for probability of packet reception in vehicular ad hoc networks. EURASIP J Wirel Commun Netw 2009(721301):12","journal-title":"EURASIP J Wirel Commun Netw"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01226-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-019-01226-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01226-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,9]],"date-time":"2020-05-09T23:17:46Z","timestamp":1589066266000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-019-01226-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,11]]},"references-count":19,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["1226"],"URL":"https:\/\/doi.org\/10.1007\/s00779-019-01226-z","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"type":"print","value":"1617-4909"},{"type":"electronic","value":"1617-4917"}],"subject":[],"published":{"date-parts":[[2019,5,11]]},"assertion":[{"value":"21 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}