{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:48:16Z","timestamp":1776282496550,"version":"3.50.1"},"reference-count":202,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100012246","name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61302104"],"award-info":[{"award-number":["61302104"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61401223"],"award-info":[{"award-number":["61401223"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61522109"],"award-info":[{"award-number":["61522109"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20140887"],"award-info":[{"award-number":["BK20140887"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20150040"],"award-info":[{"award-number":["BK20150040"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Project of Natural Science Research of Higher Education Institutions of Jiangsu Province","award":["15KJA510003"],"award-info":[{"award-number":["15KJA510003"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/jproc.2016.2558521","type":"journal-article","created":{"date-parts":[[2016,5,10]],"date-time":"2016-05-10T14:10:54Z","timestamp":1462889454000},"page":"1727-1765","source":"Crossref","is-referenced-by-count":1223,"title":["A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends"],"prefix":"10.1109","volume":"104","author":[{"given":"Yulong","family":"Zou","sequence":"first","affiliation":[]},{"given":"Jia","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xianbin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lajos","family":"Hanzo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2002.1011196"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/26.623078"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195840"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2011.6127469"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/48.972098"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/35.620533"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.33"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.316"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.314"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282424"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2178067"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2012.6314346"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935028"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121010"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.54"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2013.6531475"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2013.6581046"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654851"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055917"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"ref180","first-page":"46","article-title":"Identifying unique devices through wireless fingerprinting","author":"loh","year":"0","journal-title":"Proc 1st ACM Conf Wireless Netw Security"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500444"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195669"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070194"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.032914.120921"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120016"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2134850"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.916273"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848060"},{"key":"ref28","first-page":"1","article-title":"A practical message falsification attack on WPA","author":"ohigashi","year":"0","journal-title":"Proc Joint Workshop Inf Security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023662"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2123093"},{"key":"ref29","author":"christof","year":"2010","journal-title":"Understanding Cryptography A Textbook for Students and Practitioners"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.241"},{"key":"ref22","year":"2006","journal-title":"The transport layer security (TLS) protocol version 1 1"},{"key":"ref21","year":"2008","journal-title":"The Transport Layer Security (TLS) Protocol Version 1 2"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.87"},{"key":"ref23","year":"1999","journal-title":"The Transport Layer Security (TLS) Protocol Version 1 0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396947"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.6"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1368895"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934889"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"ref156","first-page":"1","article-title":"Intelligent mechanisms for key generation from multipath wireless channels","author":"shehadeh","year":"0","journal-title":"Proc Wireless Telecommun Symp"},{"key":"ref155","first-page":"927","article-title":"Collaborative secret key extraction leveraging received signal strength in mobile wireless networks","author":"liu","year":"0","journal-title":"Proc 31st Annu IEEE Int Conf Comput Commun"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/26.385951"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1996.0023"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5999759"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/26.701317"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2002.1011210"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1145\/238168.238182"},{"key":"ref59","year":"2007"},{"key":"ref58","year":"2005"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.082310.100113"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2007.4394775"},{"key":"ref55","first-page":"2157","article-title":"CDMA physical layer built-in security enhancement","author":"ren","year":"0","journal-title":"Proc IEEE 58th Veh Technol Conf"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.052311.101613"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1039518"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425922"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363721"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1984.1096105"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132919"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041110.00022"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462123"},{"key":"ref162","first-page":"235","article-title":"A practical man-in-the-middle attack on signal-based key generation protocols","author":"eberz","year":"2012","journal-title":"Comput Security"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972559"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2147314"},{"key":"ref4","year":"2012","journal-title":"Norton Cybercrime Report 2012"},{"key":"ref3","year":"2013","journal-title":"The World in 2013 ICT Facts and Figures"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4483671"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.080513"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501429"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462004"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2004.5342231"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090205"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934929"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090407"},{"key":"ref158","first-page":"1499","article-title":"Key generation exploiting MIMO channel evolution: Algorithm and theoretical limits","author":"wallace","year":"0","journal-title":"Proc Eur Conf Antennas Propagation"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2008.4558008"},{"key":"ref48","author":"stalling","year":"2010","journal-title":"Cryptography and Network Security Principles and Practices"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2006.05063"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.131011"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2191543"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601953"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.111213.130235"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2010.5421588"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090404"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74573-0_10"},{"key":"ref76","year":"1995","journal-title":"CERT Advisory IP Spoofing Attacks and Hijacked Terminal Connections"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.1996.493637"},{"key":"ref74","first-page":"623","article-title":"A novel classification scheme for 802.11 WLAN active attacking traffic patterns","author":"zhou","year":"0","journal-title":"Proc IEEE Wireless Commun Netw Conf"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.527"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(99)00064-X"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com:20050441"},{"key":"ref60","year":"2011"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5510911"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5490974"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.70718"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/35.925684"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/90.929852"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/35.995853"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6146497"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/SCORED.2009.5443345"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736750"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2328098"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736752"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2264461"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4785384"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2292903"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081071"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPS.2009.87"},{"key":"ref94","first-page":"48","article-title":"A survey on wireless security protocols (WEP, WPA and WPA2\/802.11i)","author":"lashkari","year":"0","journal-title":"Proc 2nd IEEE Int Conf Comput Sci Inf Technol"},{"key":"ref190","author":"menezes","year":"2001","journal-title":"Handbook of Applied Cryptography"},{"key":"ref93","author":"toengel","year":"1999","journal-title":"Bluetooth Authentication athorisation and encryption"},{"key":"ref191","first-page":"1","article-title":"ARQ-based secret key sharing","author":"latif","year":"0","journal-title":"Proc IEEE Int Conf Commun"},{"key":"ref92","first-page":"1681","article-title":"Research of Bluetooth security manager","author":"kui","year":"0","journal-title":"Proc IEEE Int Conf Neural Netw Signal Process"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461974"},{"key":"ref91","author":"muller","year":"1999","journal-title":"Bluetooth Security Architecture"},{"key":"ref90","article-title":"A survey on security aspects for LTE and LTE-A networks","volume":"15","author":"cao","year":"2013","journal-title":"IEEE Commun Surv Tut"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77535-5_14"},{"key":"ref99","first-page":"536","article-title":"Secure enhanced wireless transfer protocol","author":"lin","year":"0","journal-title":"Proc 1st Int Conf on Availability Reliability and Security"},{"key":"ref96","first-page":"56","article-title":"Efficient low-latency RC4 architecture designs for IEEE 802.11i WEP\/TKIP","author":"lee","year":"0","journal-title":"Proc Int Symp Intell Signal Process Commun Syst"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996948"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039856"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.880180"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/65.681925"},{"key":"ref83","year":"1999","journal-title":"FTP security considerations"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601338"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.091511.00129"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070521"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4752688"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2005.1404569"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.013012.00028"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6898939"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514286"},{"key":"ref100","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/769800.769823","article-title":"Security flaws in 802.11 data link protocols","volume":"46","author":"nancy","year":"2003","journal-title":"Commun ACM"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7263345"},{"key":"ref202","article-title":"Relay selection for wireless communications against eavesdropping: A security-reliability tradeoff perspective","author":"zou","year":"0","journal-title":"IEEE Network"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2059057"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060848"},{"key":"ref125","first-page":"1","article-title":"MIMO broadcast channel with arbitrarily varying eavesdropper channel: Secrecy degrees of freedom","author":"he","year":"0","journal-title":"Proc IEEE Global Telecommun Conf"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158487"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5947124"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2094610"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111216"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2172433"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195817"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5501835"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2078810"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2178067"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/iccw.2011.5963524"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.810646"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7018202"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/49.730453"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6295726"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2005.847088"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.111213.130235"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2003.818096"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00000"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2181503"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.021312.00116"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.141121"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4907406"},{"key":"ref108","author":"ahson","year":"2007","journal-title":"WiMAX Standards and Security"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052352"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2006.252118"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.20"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/wicom.2011.6040271"},{"key":"ref103","first-page":"828","article-title":"Analysis of mobile WiMAX security: Vulnerabilities and solutions","author":"han","year":"0","journal-title":"Proc 5th IEEE Int Conf Mobile Ad Hoc Sensor Syst"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/MCOM.2009.5116806","article-title":"Advancement of MIMO technology in WiMAX: From IEEE 802.16d\/e\/j to 802.16m","volume":"47","author":"li","year":"2009","journal-title":"IEEE Commun Mag"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2004.842941"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2011.5982630"},{"key":"ref110","year":"2012","journal-title":"Technical specification group services and system aspects Service requirements for Home Node B (HNB) and home eNode B (HeNB) (Rel 11)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.021312.00138"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/9781118027974"},{"key":"ref12","author":"whitman","year":"2012","journal-title":"Principles of Information Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1155\/WCN\/2006\/93830"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/65.855475"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2006.1636182"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/98.295357"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1605889"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.93"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/25.764995"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.904814"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPS.2009.87"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2011.0033"},{"key":"ref113","year":"2001","journal-title":"Technical specification group services and system aspects 3G security specification of the 3GPP confidentiality and integrity algorithms"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/4234.913150"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/35.601747"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557590"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2048445"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2068852"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11526-4_1"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/iel7\/5\/7547344\/07467419.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5\/7547344\/07467419.pdf?arnumber=7467419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:42:03Z","timestamp":1641987723000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7467419\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":202,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/jproc.2016.2558521","relation":{},"ISSN":["0018-9219","1558-2256"],"issn-type":[{"value":"0018-9219","type":"print"},{"value":"1558-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9]]}}}