{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T05:29:51Z","timestamp":1731648591437,"version":"3.28.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T00:00:00Z","timestamp":1710460800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T00:00:00Z","timestamp":1710460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s10207-024-00831-1","type":"journal-article","created":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T16:01:51Z","timestamp":1710518511000},"page":"2063-2073","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Spatial de-correlation of generated keys from wireless channels using adversarial deep learning"],"prefix":"10.1007","volume":"23","author":[{"given":"Amir","family":"Aliabadian","sequence":"first","affiliation":[]},{"given":"Mohammadreza","family":"Zahabi","sequence":"additional","affiliation":[]},{"given":"Majid","family":"Mobini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,15]]},"reference":[{"issue":"9","key":"831_CR1","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","volume":"104","author":"Y Zou","year":"2016","unstructured":"Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727\u20131765 (2016)","journal-title":"Proc. IEEE"},{"key":"831_CR2","volume-title":"Cryptography and Network Security: Principles and Practice","author":"W Stallings","year":"2011","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice. Prenntice Hall, Hoboken (2011)"},{"issue":"5","key":"831_CR3","doi-asserted-by":"publisher","first-page":"8169","DOI":"10.1109\/JIOT.2019.2927379","volume":"6","author":"N Wang","year":"2019","unstructured":"Wang, N., Wang, P., Alipour-Fanid, A., Jiao, L., Zeng, K.: Physical-layer security of 5G wireless networks for IoT: challenges and opportunities. IEEE Internet Things J. 6(5), 8169\u20138181 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"831_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3140257","volume":"3","author":"J Wan","year":"2018","unstructured":"Wan, J., Lopez, A., Faruque, M.A.A.: Physical layer key generation: securing wireless communication in automotive cyber-physical systems. ACM Trans. Cyber Phys. Syst. 3(2), 1\u201326 (2018)","journal-title":"ACM Trans. Cyber Phys. Syst."},{"key":"831_CR5","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/ACCESS.2016.2521718","volume":"4","author":"J Zhang","year":"2016","unstructured":"Zhang, J., Duong, T.Q., Marshall, A., Woods, R.: Key generation from wireless channels: a review. IEEE Access 4, 614\u2013626 (2016)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Alrabeiah, M., Alkhateeb, A.: Deep learning for TDD and FDD massive MIMO: Mapping channels in space and frequency. In: Proceedings of the 53rd Asilomar Conference on Record Asilomar Conference Signals System Computers (ACSSC), Pacific Grove, CA, United states, pp. 1465\u20131470 (2019)","key":"831_CR6","DOI":"10.1109\/IEEECONF44664.2019.9048929"},{"issue":"5","key":"831_CR7","doi-asserted-by":"publisher","first-page":"497","DOI":"10.3390\/e21050497","volume":"21","author":"G Li","year":"2019","unstructured":"Li, G., Sun, C., Zhang, J., Jorswieck, E., Xiao, B., Hu, A.: Physical layer key generation in 5G and beyond wireless communications: challenges and opportunities. Entropy 21(5), 497 (2019)","journal-title":"Entropy"},{"issue":"7","key":"831_CR8","doi-asserted-by":"publisher","first-page":"1605","DOI":"10.1007\/s11432-012-4570-2","volume":"55","author":"W Wang","year":"2012","unstructured":"Wang, W., Jiang, H., Xia, X., Mu, P., Yin, Q.: A wireless secret key generation method based on Chinese remainder theorem in FDD systems. Sci. China Inf. Sci. 55(7), 1605\u20131616 (2012)","journal-title":"Sci. China Inf. Sci."},{"issue":"9","key":"831_CR9","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1109\/LCOMM.2019.2924420","volume":"23","author":"B Liu","year":"2019","unstructured":"Liu, B., Hu, A., Li, G.: Secret key generation scheme based on the channel covariance matrix eigenvalues in FDD systems. IEEE Commun. Lett. 23(9), 1493\u20131496 (2019)","journal-title":"IEEE Commun. Lett."},{"unstructured":"Goldberg, S.J., Shah, Y.C., Reznik, A.: Method and apparatus for performing JRNSO in FDD, TDD and MIMO communications. U.S. Patent 8,401,196 B2 (2013)","key":"831_CR10"},{"doi-asserted-by":"crossref","unstructured":"Wu, X., Peng, Y., Hu, C., Zhao, H., Shu, L.: A secret key generation method based on CSI in OFDM-FDD system. In: Proceedings of the IEEE Globecom Workshops. (GC Wkshps), Atlanta, GA, United states, pp. 1297\u20131302 (2013)","key":"831_CR11","DOI":"10.1109\/GLOCOMW.2013.6825173"},{"issue":"12","key":"831_CR12","doi-asserted-by":"publisher","first-page":"2693","DOI":"10.1109\/TIFS.2016.2594143","volume":"11","author":"D Qin","year":"2016","unstructured":"Qin, D., Ding, Z.: Exploiting multi-antenna non-reciprocal channels for shared secret key generation. IEEE Trans. Inf. Forensics Secur. 11(12), 2693\u20132705 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"9","key":"831_CR13","doi-asserted-by":"publisher","first-page":"27","DOI":"10.5120\/cae2017652715","volume":"7","author":"AM Allam","year":"2017","unstructured":"Allam, A.M.: Channel-based secret key establishment for FDD wireless communication systems. Commun. Appl. Electron 7(9), 27\u201331 (2017)","journal-title":"Commun. Appl. Electron"},{"issue":"12","key":"831_CR14","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1109\/LCOMM.2018.2875708","volume":"22","author":"G Li","year":"2018","unstructured":"Li, G., Hu, A., Sun, C., Zhang, J.: Constructing reciprocal channel coefficients for secret key generation in FDD systems. IEEE Commun. Lett. 22(12), 2487\u20132490 (2018)","journal-title":"IEEE Commun. Lett."},{"unstructured":"Xinwei, Z., Li, G., Zhang, J., Hu, A., Hou, Z., Xiao, B.: Deep learning-based physical-layer secret key generation for FDD systems. IEEE Internet Things J. (2021)","key":"831_CR15"},{"issue":"6","key":"831_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MCOM.2015.7120011","volume":"53","author":"W Trappe","year":"2015","unstructured":"Trappe, W.: The challenges facing physical layer security. IEEE Commun. Mag. 53(6), 16\u201320 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"831_CR17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224","volume-title":"Wireless Communications","author":"A Goldsmith","year":"2005","unstructured":"Goldsmith, A.: Wireless Communications. Cambridge University Press, Cambridge (2005)"},{"doi-asserted-by":"crossref","unstructured":"He, X., Dai, H., Huang, Y., Wang, D., Shen, W., Ning, P.: The security of link signature: a view from channel models. In: Proceedings of the IEEE Conference on Communication and Network Security (CNS), San Francisco, California, USA, pp. 103\u2013108 (2014)","key":"831_CR18","DOI":"10.1109\/CNS.2014.6997473"},{"issue":"3","key":"831_CR19","doi-asserted-by":"publisher","first-page":"2104","DOI":"10.1109\/TWC.2015.2498621","volume":"15","author":"X He","year":"2016","unstructured":"He, X., Dai, H., Shen, W., Ning, P., Dutta, R.: Toward proper guard zones for link signature. IEEE Trans. Wirel. Commun. 15(3), 2104\u20132117 (2016)","journal-title":"IEEE Trans. Wirel. Commun."},{"doi-asserted-by":"crossref","unstructured":"Edman, M., Kiayias, A., Yener, B.: On passive inference attacks against physical-layer key extraction. In: Proceedings of the 4th European Workshop System Security, Salzburg, Austria, pp 8:1\u20138:6 (2011)","key":"831_CR20","DOI":"10.1145\/1972551.1972559"},{"doi-asserted-by":"crossref","unstructured":"He, X., Dai, H., Shen, W., Ning, P.: Is link signature dependable for wireless security?. In: Proceedings of the 32nd IEEE International Conference Computer Communication (INFOCOM), Turin, Italy, pp. 200\u2013204 (2013)","key":"831_CR21","DOI":"10.1109\/INFCOM.2013.6566763"},{"doi-asserted-by":"crossref","unstructured":"Bhartiya, N., Jangid, N., Jannu, S.: Biometric authentication systems: security concerns and solutions. In: 2018 3rd International Conference for Convergence in Technology (I2CT), pp. 1\u20136 (2018)","key":"831_CR22","DOI":"10.1109\/I2CT.2018.8529435"},{"issue":"1","key":"831_CR23","first-page":"9","volume":"7","author":"M Mobini","year":"2018","unstructured":"Mobini, M., Zahabi, M.R.: Masking communication using Sprott94 case A chaotic system in AWGN channel. J. World Elect. Eng. Tech. 7(1), 9\u201316 (2018)","journal-title":"J. World Elect. Eng. Tech."},{"issue":"6","key":"831_CR24","doi-asserted-by":"publisher","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","volume":"7","author":"S Goel","year":"2008","unstructured":"Goel, S., Negi, R.: Guaranteeing secrecy using artificial noise. IEEE Trans. Wirel. Commun. 7(6), 2180\u20132189 (2008)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"7","key":"831_CR25","doi-asserted-by":"publisher","first-page":"3088","DOI":"10.1109\/TIT.2010.2048445","volume":"56","author":"A Khisti","year":"2010","unstructured":"Khisti, A., Wornell, G.W.: Secure transmission with multiple antennas I: the MISOME wiretap channel. IEEE Trans. Inf. Theory 56(7), 3088\u20133104 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"831_CR26","doi-asserted-by":"publisher","first-page":"5515","DOI":"10.1109\/TIT.2010.2068852","volume":"56","author":"A Khisti","year":"2010","unstructured":"Khisti, A., Wornell, G.W.: Secure transmission with multiple antennas-part II: the MIMOME wiretap channel. IEEE Trans. Inf. Theory 56(11), 5515\u20135532 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"62","key":"831_CR27","doi-asserted-by":"publisher","first-page":"3479","DOI":"10.1109\/TSP.2014.2329273","volume":"5","author":"SH Tsai","year":"2014","unstructured":"Tsai, S.H., Poor, H.V.: Power allocation for artificial-noise secure MIMO precoding systems. IEEE Trans. Signal Process. 5(62), 3479\u201393 (2014)","journal-title":"IEEE Trans. Signal Process."},{"issue":"1","key":"831_CR28","doi-asserted-by":"publisher","first-page":"1571","DOI":"10.1109\/OJCOMS.2020.3028554","volume":"1","author":"M Mobini","year":"2020","unstructured":"Mobini, M., Kaddoum, G.: Deep chaos synchronization. IEEE Open J. Commun. Soc. 1(1), 1571\u20131582 (2020)","journal-title":"IEEE Open J. Commun. Soc."},{"key":"831_CR29","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54, 1355\u20131387 (1975)","journal-title":"Bell Syst. Tech. J."},{"issue":"9","key":"831_CR30","doi-asserted-by":"publisher","first-page":"1728","DOI":"10.1109\/JSAC.2013.130907","volume":"31","author":"PH Lin","year":"2013","unstructured":"Lin, P.H., Lai, S.H., Lin, S.C., Su, H.J.: On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels. IEEE J. Sel. Areas Commun. 31(9), 1728\u201340 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"unstructured":"Kim, B., Sagduyu, Y.E., Davaslioglu, K., Erpek, T., Ulukus, S.: Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers, arXiv, arXiv-2005 (2020)","key":"831_CR31"},{"doi-asserted-by":"crossref","unstructured":"Kokalj-Filipovic, S., Miller, R., Morman, J.: Targeted Adversarial Examples Against RF Deep Classifiers, arXiv, arXiv-2005 (2020)","key":"831_CR32","DOI":"10.1145\/3324921.3328792"},{"doi-asserted-by":"crossref","unstructured":"Sagduyu, Y.E., Shi, Y., Erpek, T.: IoT network security from the perspective of adversarial deep learning. In: 16th Annual IEEE International Conference on Sensing, Communication, and Networking, pp. 1\u20139 (2019)","key":"831_CR33","DOI":"10.1109\/SAHCN.2019.8824956"},{"issue":"5","key":"831_CR34","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1109\/LCOMM.2019.2901469","volume":"23","author":"M Sadeghi","year":"2019","unstructured":"Sadeghi, M., Larsson, E.G.: Physical adversarial attacks against end-to-end autoencoder communication systems. IEEE Commun. Lett. 23(5), 847\u2013850 (2019)","journal-title":"IEEE Commun. Lett."},{"doi-asserted-by":"crossref","unstructured":"Bahramali, A., Nasr, M., Houmansadr, A., Goeckel, D., Towsley, D.: Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems (2021). [Online]. Available: arXiv:2102.00918","key":"831_CR35","DOI":"10.1145\/3460120.3484777"},{"doi-asserted-by":"crossref","unstructured":"Deng, Y., et al.: An analysis of adversarial attacks and defenses on autonomous driving models. In: Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom), Austin, TX,USA, March 23\u201327, pp. 1\u201310 (2020)","key":"831_CR36","DOI":"10.1109\/PerCom45495.2020.9127389"},{"doi-asserted-by":"crossref","unstructured":"Manoj, B.R., Sadeghi, M., Larsson, E.G.: Adversarial attacks on deep learning based power allocation in a massive MIMO network. In: Proceedings of the IEEE International Conference on Communications (ICC), Montreal, QC, Canada, June 14\u201323, pp. 1\u20136 (2021)","key":"831_CR37","DOI":"10.1109\/ICC42927.2021.9500424"},{"unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization (2014). [Online]. Available: http:\/\/arxiv.org\/abs\/1412.6980","key":"831_CR38"},{"issue":"5","key":"831_CR39","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","volume":"2","author":"K Hornik","year":"1989","unstructured":"Hornik, K., Stinchcombe, M., White, H., et al.: Multilayer feedforward networks are universal approximators. Neural Netw. 2(5), 359\u2013366 (1989)","journal-title":"Neural Netw."},{"doi-asserted-by":"crossref","unstructured":"Zenger, C., Zimmer, J., Paar, C.: Security analysis of quantization schemes for channel-based key extraction. In: Proceedings of the Coimbra, Portugal, Jul, Workshop Wireless Communication Security Physical Layer, pp. 267\u2013272 (2015)","key":"831_CR40","DOI":"10.4108\/eai.22-7-2015.2260194"},{"doi-asserted-by":"crossref","unstructured":"Zhu, X., Xu, F., Novak, E., Tan, C.C., Li, Q., Chen, G.: Extracting secret key from wireless link dynamics in vehicular environments. In: Proceedings of the Turin, Italy, Apr, IEEE INFOCOM, pp. 2283\u20132291 (2013)","key":"831_CR41","DOI":"10.1109\/INFCOM.2013.6567032"},{"unstructured":"\u201cDeepMIMO\u201d [Online]. Available: https:\/\/deepmimo.net\/","key":"831_CR42"},{"unstructured":"Alkhateeb, A.: DeepMIMO: a generic deep learning dataset for millimeter wave and massive MIMO applications. In: Proceedings of the Information Theory Applications Workshop (ITA), pp. 1\u20138. San Diego, CA, USA (2019)","key":"831_CR43"},{"unstructured":"\u201cRemcom wireless insite\". [Online]. Available: http:\/\/www.remcom.com\/wireless-insite","key":"831_CR44"},{"doi-asserted-by":"crossref","unstructured":"Zenger, C.T., Zimmer, J., Paar, C.: Security analysis of quantization schemes for channel-based key extraction. In: Workshop Wireless Communication, Coimbra, Portugal, Jul, Security at the Physical Layer, pp. 1\u20136 (2015)","key":"831_CR45","DOI":"10.4108\/eai.22-7-2015.2260194"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00831-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00831-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00831-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T11:20:36Z","timestamp":1731583236000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00831-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,15]]},"references-count":45,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["831"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00831-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2024,3,15]]},"assertion":[{"value":"15 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"the author declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not Applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving Human Participants and\/or Animals"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}