{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:11:37Z","timestamp":1755216697683,"version":"3.43.0"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,6,1]],"date-time":"2018-06-01T00:00:00Z","timestamp":1527811200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/cybersecpods.2018.8560676","type":"proceedings-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T20:24:46Z","timestamp":1544127886000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Quantisation feasibility and performance of RSS-based secret key extraction in VANETs"],"prefix":"10.1109","author":[{"given":"Mirko","family":"Bottarelli","sequence":"first","affiliation":[{"name":"Institute for Research in Applicable Computing (IRAC), University of Bedfordshire, Bedfordshire, UK"}]},{"given":"Gregory","family":"Epiphaniou","sequence":"additional","affiliation":[{"name":"Wolverhampton Cyber Research Institute (WCRI), University of Wolverhampton, UK"}]},{"given":"Dhouha Kbaier","family":"Ben Ismail","sequence":"additional","affiliation":[{"name":"Wolverhampton Cyber Research Institute (WCRI), University of Wolverhampton, UK"}]},{"given":"Petros","family":"Karadimas","sequence":"additional","affiliation":[{"name":"School of Engineering, University of Glasgow, Scotland"}]},{"given":"Haider","family":"Al-Khateeb","sequence":"additional","affiliation":[{"name":"Wolverhampton Cyber Research Institute (WCRI), University of Wolverhampton, UK"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2011.5720584"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73009"},{"key":"ref33","first-page":"1727","article-title":"AN EFFECTIVE KEY GENERATION SYSTEM USING IMPROVED CHANNEL Junqing Zhang Roger Woods Trung Q. Duong ECIT","author":"zhang","year":"2015","journal-title":"Queen s University Belfast Department of Electrical Engineering and Electronics"},{"key":"ref32","first-page":"401","article-title":"Robust key generation from signal envelopes in wireless networks","author":"azimi-sadjadi","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security Ser CCS '07"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.71"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2005.858853"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462231"},{"key":"ref35","first-page":"410","author":"brassard","year":"1994","journal-title":"Secret-Key Reconciliation by Public Discussion"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"ref28","first-page":"927","article-title":"Collaborative secret key extraction leveraging received signal strength in mobile wireless networks","author":"liu","year":"2012","journal-title":"2012 Proceedings IEEE INFOCOM"},{"journal-title":"Wireless Communications Principles and Practice","year":"2001","author":"rappaport","key":"ref27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.88"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2007.09.025"},{"journal-title":"Sustainable Transport A Sourcebook for Policy-makers in Developing Cities","article-title":"Urban Road Safety","year":"2017","key":"ref1"},{"key":"ref20","first-page":"1","article-title":"The Physical Layer of the IEEE 802. 11 P WAVE Communication Standard: The Specifications and Challenges","volume":"ii","author":"ma","year":"2014","journal-title":"Electric Vehicles - Modelling and Simulations"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.vehcom.2014.05.001","article-title":"Survey on VANET security challenges and possible cryptographic solutions","volume":"1","author":"mejri","year":"2014","journal-title":"Vehicular Communications"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023878"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICISA.2013.6579370"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-015-0913-y"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900023"},{"journal-title":"Handbook of Applied Cryptography","year":"1996","author":"menezes","key":"ref50"},{"key":"ref51","article-title":"Sp 800&#x2013;22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications","author":"bassham","year":"2010","journal-title":"Gaithersburg MD United States Tech Rep"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.07.080874"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/25.182598"},{"key":"ref53","first-page":"33","author":"hirschausen","year":"2014","journal-title":"Identifying Key Design Parameters for Monte Carlo Simulation of Doppler Spread Channels"},{"journal-title":"Digital Communications","year":"1995","author":"proakis","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.262101"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2004.830257"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934929"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2254507"},{"key":"ref15","first-page":"980","article-title":"Improving robustness of key extraction from wireless channels with differential techniques","year":"2012","journal-title":"2012 International Conference on Computing Networking and Communications ICNC'12"},{"key":"ref16","first-page":"13:1","article-title":"Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security","volume":"13","author":"syvanen","year":"2016","journal-title":"2016 ACM\/IEEE 7th International Conference on Cyber-Physical Systems ICCPS 2016 - Proceedings"},{"key":"ref17","article-title":"Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks","author":"epiphaniou","year":"2017","journal-title":"IEEE Internet of Things Journal"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.08.001"},{"journal-title":"Vehicle Safety Communications - Applications (VSC-A) Final Report","article-title":"VSC-A Consortium","year":"2011","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCS.2017.8034893"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2013.06.010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WC-M.2006.250352"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.vehcom.2017.01.002","article-title":"VANet security challenges and solutions: A survey","volume":"7","author":"hasrouny","year":"2017","journal-title":"Vehicular Communications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1996.0023"},{"key":"ref7","volume":"19964964","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2005.858853"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.63"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791222"},{"key":"ref47","first-page":"1233","author":"karas","year":"2011","journal-title":"Neural Network Based PRY-Layer Key Exchange"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462004"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2001.985763"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"1763","DOI":"10.1109\/ICACT.2007.358712","article-title":"A scheme of secret key agreement based on received signal strength variation by antenna switching in land mobile radio","volume":"3","author":"kitaura","year":"2007","journal-title":"International Conference on Advanced Communication Technology ICACT"}],"event":{"name":"2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)","start":{"date-parts":[[2018,6,11]]},"location":"Glasgow, UK","end":{"date-parts":[[2018,6,12]]}},"container-title":["2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8537418\/8560662\/08560676.pdf?arnumber=8560676","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,4]],"date-time":"2025-08-04T18:39:39Z","timestamp":1754332779000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8560676\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/cybersecpods.2018.8560676","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}