{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:41:12Z","timestamp":1753922472105,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T00:00:00Z","timestamp":1601596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11276-020-02468-z","type":"journal-article","created":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T13:03:46Z","timestamp":1601643826000},"page":"557-574","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme"],"prefix":"10.1007","volume":"27","author":[{"given":"Hassan N.","family":"Noura","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0234-4419","authenticated-orcid":false,"given":"Reem","family":"Melki","sequence":"additional","affiliation":[]},{"given":"Rouwaida","family":"Kanj","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Chehab","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"2468_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420005929","volume-title":"MIMO system technology for wireless communications","author":"George Tsoulos","year":"2006","unstructured":"Tsoulos, George. (2006). MIMO system technology for wireless communications. Boca Raton: CRC Press."},{"key":"2468_CR2","doi-asserted-by":"crossref","unstructured":"Sivakrishna, S., and Yarrabothu, R. (2018). Design and simulation of 5g massive MIMO kernel algorithm on SIMD vector processor. In Conference on signal processing and communication engineering systems (SPACES), pp. 53\u201357. IEEE","DOI":"10.1109\/SPACES.2018.8316315"},{"issue":"3","key":"2468_CR3","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1007\/s11276-019-02060-0","volume":"26","author":"R Melki","year":"2020","unstructured":"Melki, R., Noura, H., Mansour, M., & Chehab, A. (2020). Physical layer security schemes for MIMO systems: an overview. Wireless Networks, 26(3), 2089\u20132111.","journal-title":"Wireless Networks"},{"key":"2468_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.phycom.2018.10.008","volume":"32","author":"R Melki","year":"2019","unstructured":"Melki, R., Noura, H., Mansour, M., & Chehab, A. (2019). A survey on OFDM physical layer security. Physical Communication, 32, 1\u201330.","journal-title":"Physical Communication"},{"key":"2468_CR5","doi-asserted-by":"crossref","unstructured":"Yaacoub, E., and Al-Husseini, M. (2017). Achieving physical layer security with massive MIMO beamforming. In 2017 11th European conference on antennas and propagation (EUCAP), pp. 1753\u20131757, March","DOI":"10.23919\/EuCAP.2017.7928045"},{"key":"2468_CR6","unstructured":"Janvier (2019) Spatial multiplexing - matlab & simulink - mathworks france. https:\/\/fr.mathworks.com\/help\/comm\/examples\/spatial-multiplexing.html"},{"key":"2468_CR7","doi-asserted-by":"crossref","unstructured":"Li, X., Huang, H. C., Lozano, A., & Foschini, G. J. (2000). Reduced-complexity detection algorithms for systems using multi-element arrays. In Globecom\u201900-IEEE. global telecommunications conference. Conference record (Cat. No. 00CH37137), (Vol. 2, pp. 1072\u20131076). IEEE","DOI":"10.1109\/GLOCOM.2000.891302"},{"issue":"3","key":"2468_CR8","doi-asserted-by":"publisher","first-page":"1904","DOI":"10.1109\/JIOT.2018.2817339","volume":"5","author":"H Salameh","year":"2018","unstructured":"Salameh, H., et al. (2018). Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet of Things Journal, 5(3), 1904\u20131913.","journal-title":"IEEE Internet of Things Journal"},{"key":"2468_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-87126-9","volume-title":"Introduction to cryptography","author":"H Delfs","year":"2002","unstructured":"Delfs, H., Knebl, H., & Knebl, H. (2002). Introduction to cryptography (Vol. 2). Berlin: Springer."},{"key":"2468_CR10","volume-title":"Big data: Principles and paradigms","author":"R Buyya","year":"2016","unstructured":"Buyya, R., Calheiros, R., & Dastjerdi, A. (2016). Big data: Principles and paradigms. Burlington: Morgan Kaufmann."},{"key":"2468_CR11","doi-asserted-by":"crossref","unstructured":"Tanigawa et al. Y., (2017). A physical layer security scheme employing imaginary receiver for multiuser MIMO-OFDM systems. In International conference on communications (ICC), pp. 1\u20136","DOI":"10.1109\/ICC.2017.7997486"},{"key":"2468_CR12","doi-asserted-by":"crossref","unstructured":"Ahmed, M., & Lin, Bai (2017). Space time block coding aided physical layer security in gaussian MIMO channels. In International Bhurban conference on applied sciences and technology (IBCAST), pp. 805\u2013808","DOI":"10.1109\/IBCAST.2017.7868148"},{"key":"2468_CR13","unstructured":"Li, G., & Hu, A. (2016). Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security. In IEEE proc. int. conf. commun. China (ICCC), pp. 2246\u20132250"},{"key":"2468_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et. al. (2015). Joint transmit antenna selection and jamming for security enhancement in MIMO wiretap channels. In IEEE proc. int. conf. commun. China (ICCC), pp. 1\u20136","DOI":"10.1109\/ICCChina.2015.7448598"},{"key":"2468_CR15","doi-asserted-by":"publisher","first-page":"5747","DOI":"10.1109\/ACCESS.2017.2694478","volume":"5","author":"Y Fan","year":"2017","unstructured":"Fan, Y., et al. (2017). Physical layer security based on interference alignment in K-User MIMO Y wiretap channels. IEEE Access, 5, 5747\u20135759.","journal-title":"IEEE Access"},{"issue":"2","key":"2468_CR16","doi-asserted-by":"publisher","first-page":"1128","DOI":"10.1109\/JSYST.2015.2413843","volume":"11","author":"X Chen","year":"2017","unstructured":"Chen, X., & Zhang, Y. (2017). Mode selection in MU-MIMO downlink networks: A physical-layer security perspective. IEEE Systems Journal, 11(2), 1128\u20131136.","journal-title":"IEEE Systems Journal"},{"issue":"8","key":"2468_CR17","doi-asserted-by":"publisher","first-page":"2933","DOI":"10.1109\/TIT.2007.901143","volume":"53","author":"A Thangaraj","year":"2007","unstructured":"Thangaraj, A., Dihidar, S., Calderbank, A., McLaughlin, S., & Merolla, J. (2007). Applications of LDPC codes to the wiretap channel. IEEE Transactions on Information Theory, 53(8), 2933\u20132945.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"8","key":"2468_CR18","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A Wyner","year":"1975","unstructured":"Wyner, A. (1975). The wire-tap channel. Bell System Technical Journal, 54(8), 1355\u20131387.","journal-title":"Bell System Technical Journal"},{"issue":"3","key":"2468_CR19","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csisz\u00e1r","year":"1978","unstructured":"Csisz\u00e1r, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339\u2013348.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"2468_CR20","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1109\/TIFS.2011.2148715","volume":"6","author":"A Subramanian","year":"2011","unstructured":"Subramanian, A., Thangaraj, A., Bloch, M., & McLaughlin, S. (2011). Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes. IEEE Transactions on Information Forensics and Security, 6(3), 585\u2013594.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2468_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2846258","author":"D Chen","year":"2018","unstructured":"Chen, D., Zhang, N., Cheng, N., Zhang, K., Qin, Z., & Shen, X. (2018). Physical layer based message authentication with secure channel codes. IEEE Transactions on Dependable and Secure Computing,. https:\/\/doi.org\/10.1109\/TDSC.2018.2846258.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"8","key":"2468_CR22","doi-asserted-by":"publisher","first-page":"5498","DOI":"10.1109\/TWC.2017.2712158","volume":"16","author":"X Fang","year":"2017","unstructured":"Fang, X., Zhang, N., Zhang, S., Chen, D., Sha, X., & Shen, X. (2017). On physical layer security: Weighted fractional Fourier transform based user cooperation. IEEE Transactions on Wireless Communications, 16(8), 5498\u20135510.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"12","key":"2468_CR23","doi-asserted-by":"publisher","first-page":"155014771989595","DOI":"10.1177\/1550147719895957","volume":"15","author":"M Usama","year":"2019","unstructured":"Usama, M., Rehman, O., Memon, I., & Rizvi, S. (2019). An efficient construction of key-dependent substitution box based on chaotic sine map. International Journal of Distributed Sensor Networks, 15(12), 1550147719895957.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"2468_CR24","doi-asserted-by":"publisher","first-page":"3031","DOI":"10.1109\/ACCESS.2017.2786681","volume":"6","author":"X Zhao","year":"2018","unstructured":"Zhao, X., Abdo, A., Xu, C., Geng, S., Zhang, J., & Memon, I. (2018). Dimension reduction of channel correlation matrix using CUR-decomposition technique for 3-D massive antenna system. IEEE Access, 6, 3031\u20133039.","journal-title":"IEEE Access"},{"key":"2468_CR25","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7138232","author":"A Abdo","year":"2018","unstructured":"Abdo, A., Zhao, X., Zhang, R., Zhou, Z., Zhang, J., Zhang, Y., et al. (2018). MU-MIMO downlink capacity analysis and optimum code weight vector design for 5G big data massive antenna millimeter wave communication. Wireless Communications and Mobile Computing,. https:\/\/doi.org\/10.1155\/2018\/7138232.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"2468_CR26","doi-asserted-by":"publisher","first-page":"16189","DOI":"10.1109\/ACCESS.2018.2815037","volume":"6","author":"A Shifa","year":"2018","unstructured":"Shifa, A., Afgan, M. S., Asghar, M. N., Fleury, M., Memon, I., Abdullah, S., et al. (2018). Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering. IEEE Access, 6, 16189\u201316206.","journal-title":"IEEE Access"},{"key":"2468_CR27","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3701","author":"R Madhusudhan","year":"2018","unstructured":"Madhusudhan, R., Hegde, M., & Memon, I. (2018). A secure and enhancedelliptic curve cryptography-based dynamic authentication scheme using smart card. International Journal of Communication Systems.  https:\/\/doi.org\/10.1002\/dac.3701","journal-title":"International Journal of Communication Systems"},{"issue":"3","key":"2468_CR28","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1007\/s11277-015-2833-0","volume":"85","author":"I Memon","year":"2015","unstructured":"Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167\u20131191.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"2468_CR29","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s11280-016-0403-3","volume":"20","author":"I Memon","year":"2017","unstructured":"Memon, I., & Arain, Q. (2017). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web, 20(4), 639\u2013672.","journal-title":"World Wide Web"},{"key":"2468_CR30","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/JIOT.2018.2846578","volume":"6","author":"R Melki","year":"2018","unstructured":"Melki FN: R., et al. (2018). An efficient OFDM-based encryption scheme using a dynamic key approach. IEEE Internet of Things Journal, 6, 361.","journal-title":"IEEE Internet of Things Journal"},{"key":"2468_CR31","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s11036-018-1151-7","volume":"24","author":"H Noura","year":"2018","unstructured":"Noura, H., et al. (2018). A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach. Mobile Networks and Applications, 24, 447.","journal-title":"Mobile Networks and Applications"},{"key":"2468_CR32","doi-asserted-by":"crossref","unstructured":"Noura, H., et al. (2018). Efficient and secure physical encryption scheme for low-power wireless M2M devices. In IWCMC security symposium, Limassol: Cyprus","DOI":"10.1109\/IWCMC.2018.8450330"},{"issue":"14","key":"2468_CR33","doi-asserted-by":"publisher","first-page":"18383","DOI":"10.1007\/s11042-018-5660-y","volume":"77","author":"H Noura","year":"2018","unstructured":"Noura, H., Chehab, A., Sleem, L., Noura, M., Couturier, R., & Mansour, M. M. (2018). One round cipher algorithm for multimedia IoT devices. Multimedia Tools and Applications, 77(14), 18383\u201318413.","journal-title":"Multimedia Tools and Applications"},{"issue":"2","key":"2468_CR34","doi-asserted-by":"publisher","first-page":"e81","DOI":"10.1002\/itl2.81","volume":"2","author":"G Baldini","year":"2019","unstructured":"Baldini, G., Giuliani, R., & Dimc, F. (2019). Physical layer authentication of internet of things wireless devices using convolutional neural networks and recurrence plots. Internet Technology Letters, 2(2), e81.","journal-title":"Internet Technology Letters"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02468-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-020-02468-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02468-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T01:37:01Z","timestamp":1633138621000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-020-02468-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,2]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["2468"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02468-z","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2020,10,2]]},"assertion":[{"value":"18 September 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2020","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}