{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:08:14Z","timestamp":1758892094409,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T00:00:00Z","timestamp":1540339200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11036-018-1151-7","type":"journal-article","created":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T03:56:42Z","timestamp":1540353402000},"page":"447-463","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1768-9193","authenticated-orcid":false,"given":"Hassan N.","family":"Noura","sequence":"first","affiliation":[]},{"given":"Reem","family":"Melki","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]},{"given":"Mohammad M.","family":"Mansour","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,24]]},"reference":[{"key":"1151_CR1","doi-asserted-by":"crossref","unstructured":"Zhang X et al (2018) Compressive sensing based multiuser detection via iterative reweighed approach in M2M communications. IEEE Wireless Commun Lett","DOI":"10.1109\/LWC.2018.2820704"},{"key":"1151_CR2","doi-asserted-by":"crossref","unstructured":"Chen B et al (2017) A dynamic module deployment framework for M2M platforms. In: IEEE Proc Int Symp Cloud and Service Computing (SC2). IEEE, pp 194\u2013200","DOI":"10.1109\/SC2.2017.37"},{"key":"1151_CR3","doi-asserted-by":"crossref","unstructured":"Akitaya T, Saba T (2015) Energy efficient artificial fast fading for MISO-OFDM systems. In: Proc IEEE Global Commun Conf (GLOBECOM), San Diego, CA, USA, pp 1\u20136","DOI":"10.1109\/GLOCOM.2015.7417411"},{"issue":"3","key":"1151_CR4","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.1109\/TVT.2016.2571264","volume":"66","author":"J Zhang","year":"2017","unstructured":"Zhang J et al (2017) Design of an OFDM physical layer encryption scheme. IEEE Trans Veh Technol 66 (3):2114\u20132127","journal-title":"IEEE Trans Veh Technol"},{"key":"1151_CR5","unstructured":"Lampinen K, Westman T, Haikola V Method and apparatus for physical layer link adaptation based on traffic properties, Mar. 14 2017, uS Patent 9,596,057"},{"key":"1151_CR6","doi-asserted-by":"crossref","unstructured":"Hussein S, Noura H, Martin S, Boukhatem L, Agha KA (2013) ERCA: Efficient and robust cipher algorithm for LTE data confidentiality. In: Proceedings of the 16th ACM international conference on modeling, analysis & simulation of wireless and mobile systems. ACM, pp 299\u2013308","DOI":"10.1145\/2507924.2507946"},{"key":"1151_CR7","doi-asserted-by":"crossref","unstructured":"Noura H, Hussein S, Martin S, Boukhatem L, Agha KA (2015) ERDIA: An efficient and robust data integrity algorithm for mobile and wireless networks. In: IEEE Proc. Wireless Commun Net. Conf. (WCNC). IEEE, pp 2103\u20132108","DOI":"10.1109\/WCNC.2015.7127792"},{"key":"1151_CR8","doi-asserted-by":"crossref","unstructured":"Huo F, Gong G (2014) A new efficient physical layer OFDM encryption scheme. In: Proc IEEE Int Conf Computer Commun (INFOCOM), Toronto, ON, Canada, pp 1024\u20131032","DOI":"10.1109\/INFOCOM.2014.6848032"},{"key":"1151_CR9","doi-asserted-by":"crossref","unstructured":"Akitaya T, Asano S, Saba T (2014) Time-domain artificial noise generation technique using time-domain and frequency-domain processing for physical layer security in MIMO-OFDM systems. In: Proc IEEE Int Conf Commun (ICC), Sydney, NSW, Australia, pp 807\u2013812","DOI":"10.1109\/ICCW.2014.6881299"},{"issue":"10","key":"1151_CR10","doi-asserted-by":"publisher","first-page":"6611","DOI":"10.1109\/TWC.2016.2586472","volume":"15","author":"X Wu","year":"2016","unstructured":"Wu X et al (2016) Artificial-noise-aided physical layer phase challenge-response authentication for practical OFDM transmission. IEEE Trans Wirel Commun 15(10):6611\u20136625","journal-title":"IEEE Trans Wirel Commun"},{"issue":"6","key":"1151_CR11","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1109\/JIOT.2016.2582540","volume":"3","author":"Y Cao","year":"2016","unstructured":"Cao Y, Jiang T, Han Z (2016) A survey of emerging M2M systems: Context, task, and objective. IEEE Internet of Things Journal 3(6):1246\u20131258","journal-title":"IEEE Internet of Things Journal"},{"issue":"15","key":"1151_CR12","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787\u20132805","journal-title":"Comput Netw"},{"issue":"4","key":"1151_CR13","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1109\/COMST.2014.2319555","volume":"16","author":"A Asadi","year":"2014","unstructured":"Asadi A, Wang Q, Mancuso V (2014) A survey on device-to-device communication in cellular networks. IEEE Commun Surv Tutorials 16(4):1801\u20131819. Fourthquarter","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"2","key":"1151_CR14","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MCOMSTD.2017.1700015","volume":"1","author":"S Chen","year":"2017","unstructured":"Chen S, et al. (2017) Vehicle-to-everything (v2x) services supported by LTE-based systems and 5G. IEEE Commun Standards Mag 1(2):70\u201376","journal-title":"IEEE Commun Standards Mag"},{"issue":"6","key":"1151_CR15","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MWC.2014.7000982","volume":"21","author":"T Adame","year":"2014","unstructured":"Adame T, Bel A, Bellalta B, Barcelo J, Oliver M (2014) IEEE 802.11 Ah: the WiFi approach for M2M communications. IEEE Wireless Commun 21(6):144\u2013152","journal-title":"IEEE Wireless Commun"},{"key":"1151_CR16","doi-asserted-by":"crossref","unstructured":"Huo F, Gong G (2014) A new efficient physical layer OFDM encryption scheme. In: Proc IEEE Int Conf Computer Commun (INFOCOM), Toronto, ON, Canada, pp 1024\u20131032","DOI":"10.1109\/INFOCOM.2014.6848032"},{"key":"1151_CR17","doi-asserted-by":"crossref","unstructured":"Noura H, Melki R, Chehab A, Mansour M, Martin S (2018) Efficient and secure physical encryption scheme for Low-Power wireless M2M devices. In: IWCMC 2018 Security Symposium (IWCMC-security 2018), Limassol, Cyprus","DOI":"10.1109\/IWCMC.2018.8450330"},{"key":"1151_CR18","unstructured":"Tsai Y-R, Tai C-W, Yang K-J (2014) Effective channel perturbation based on cyclic delay for physical layer security in OFDM systems. In: Proc Int Conf Inf science, Electronics Electrical Eng\u2019g (ISEEE), vol 2, pp 823\u2013827"},{"issue":"5","key":"1151_CR19","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/LCOMM.2017.2651801","volume":"21","author":"J Hamamreh","year":"2017","unstructured":"Hamamreh J, Arslan H (2017) Secure orthogonal transform division multiplexing (OTDM) waveform for 5G and beyond. IEEE Commun Lett 21(5):1191\u20131194","journal-title":"IEEE Commun Lett"},{"key":"1151_CR20","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/ACCESS.2016.2521718","volume":"4","author":"J Zhang","year":"2016","unstructured":"Zhang J, Duong TQ, Marshall A, Woods R (2016) Key generation from wireless channels: a review. IEEE Access 4:614\u2013626","journal-title":"IEEE Access"},{"issue":"6","key":"1151_CR21","doi-asserted-by":"publisher","first-page":"2578","DOI":"10.1109\/TCOMM.2016.2552165","volume":"64","author":"J Zhang","year":"2016","unstructured":"Zhang J, Marshall A, Woods R, Duong TQ (2016) Efficient key generation by exploiting randomness from channel responses of individual ofdm subcarriers. IEEE Trans Commun 64(6):2578\u20132588","journal-title":"IEEE Trans Commun"},{"issue":"4","key":"1151_CR22","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/LCOMM.2017.2649496","volume":"21","author":"J Zhang","year":"2017","unstructured":"Zhang J, He B, Duong TQ, Woods R (2017) On the key generation from correlated wireless channels. IEEE Commun Lett 21(4):961\u2013964","journal-title":"IEEE Commun Lett"},{"issue":"6","key":"1151_CR23","doi-asserted-by":"publisher","first-page":"3775","DOI":"10.1109\/TWC.2017.2688405","volume":"16","author":"H Rahbari","year":"2017","unstructured":"Rahbari H, Krunz M (2017) Exploiting frame preamble waveforms to support new physical-layer functions in OFDM-based 802.11 systems. IEEE Trans Wirel Commun 16(6):3775\u20133786","journal-title":"IEEE Trans Wirel Commun"},{"issue":"3","key":"1151_CR24","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.1109\/TVT.2016.2571264","volume":"66","author":"J Zhang","year":"2017","unstructured":"Zhang J, Marshall A, Woods R, Duong TQ (2017) Design of an ofdm physical layer encryption scheme. IEEE Trans Veh Technol 66(3):2114\u20132127","journal-title":"IEEE Trans Veh Technol"},{"key":"1151_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.phycom.2015.11.005","volume":"19","author":"A Badawy","year":"2016","unstructured":"Badawy A et al (2016) Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Phys Commun 19:1\u201310","journal-title":"Phys Commun"},{"issue":"14","key":"1151_CR26","doi-asserted-by":"publisher","first-page":"18383","DOI":"10.1007\/s11042-018-5660-y","volume":"77","author":"H Noura","year":"2018","unstructured":"Noura H, Chehab A, Sleem L, Noura M, Couturier R, Mansour M (2018) One round cipher algorithm for multimedia IoT devices. Multimed Tools Appl 77(14):18383\u201318413","journal-title":"Multimed Tools Appl"},{"key":"1151_CR27","doi-asserted-by":"crossref","unstructured":"Bassham L et al (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST NIST Pubs 800-22 Rev 1a","DOI":"10.6028\/NIST.SP.800-22r1a"},{"issue":"1","key":"1151_CR28","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1080\/00031305.1988.10475524","volume":"42","author":"J Lee Rodgers","year":"1988","unstructured":"Lee Rodgers J, Nicewander WA (1988) Thirteen ways to look at the correlation coefficient. Amer Statist 42(1):59\u201366","journal-title":"Amer Statist"},{"issue":"1","key":"1151_CR29","first-page":"1","volume":"2008","author":"A Massoudi","year":"2008","unstructured":"Massoudi A et al (2008) Overview on selective encryption of image and video: challenges and perspectives. EURASIP J Inf Secur 2008(1):1\u201318","journal-title":"EURASIP J Inf Secur"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1151-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1151-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1151-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T14:32:33Z","timestamp":1662301953000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1151-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,24]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["1151"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1151-7","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2018,10,24]]},"assertion":[{"value":"24 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}