{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:35:05Z","timestamp":1775745305236,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Technology Innovation Institute (TII) Project \u2018PHY Layer Security for Heterogeneous UAV-Ground Wireless Networks,\u2019","award":["EX2020-036"],"award-info":[{"award-number":["EX2020-036"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/ojcoms.2023.3234338","type":"journal-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T13:53:48Z","timestamp":1672926828000},"page":"209-225","source":"Crossref","is-referenced-by-count":34,"title":["High-Rate Secret Key Generation Using Physical Layer Security and Physical Unclonable Functions"],"prefix":"10.1109","volume":"4","author":[{"given":"Tasneem","family":"Assaf","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3487-3438","authenticated-orcid":false,"given":"Arafat","family":"Al-Dweik","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi, UAE"}]},{"given":"Youssef","family":"Iraqi","sequence":"additional","affiliation":[{"name":"School of Computer Science, Mohammed VI Polytechnic University, Ben Guerir, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2348-2113","authenticated-orcid":false,"given":"Sobia","family":"Jangsher","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7911-3451","authenticated-orcid":false,"given":"Anshul","family":"Pandey","sequence":"additional","affiliation":[{"name":"Secure Systems Research Center, Technology Innovation Institute, Abu Dhabi, UAE"}]},{"given":"Jean-Pierre","family":"Giacalone","sequence":"additional","affiliation":[{"name":"Secure Systems Research Center, Technology Innovation Institute, Abu Dhabi, UAE"}]},{"given":"Enas E.","family":"Abulibdeh","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7185-0278","authenticated-orcid":false,"given":"Hani","family":"Saleh","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi, UAE"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6063-473X","authenticated-orcid":false,"given":"Baker","family":"Mohammad","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Khalifa University, Abu Dhabi, UAE"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Unmanned aerial vehicle (UAV) market search report","year":"2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3116603"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2878035"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2521718"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2706657"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2974621"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.050713.120730"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934889"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2014.6881299"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.052013.130556"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2437882"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1126\/science.1074376"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2018.2865584"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2849324"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2320516"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3142084"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5999759"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2883144"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.88"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.63"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/4234.824754"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2831703"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2594143"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3083409"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.2976979"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3084347"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.1003822"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TMTT.2021.3058183"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2278834"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120011"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.2966441"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3059454"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2021.3070845"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2018.2877438"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3089854"},{"key":"ref36","first-page":"9","article-title":"Physical unclonable functions for device authentication and secret key generation","volume-title":"Proc. ACM\/IEEE Des. Autom. Conf.","author":"Suh"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2703088"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2512534"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3096048"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/VLSICircuits18222.2020.9162890"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2018.2855061"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2019.2943121"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2740925"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2340736"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2942588"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3022054"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2740290"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2604618"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2825560"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2806423"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3094401"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2704609"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3021205"},{"key":"ref54","volume-title":"UAV navigation group","year":"2022"},{"key":"ref55","volume-title":"System on chip and method for cryptography using a physically unclonable function","author":"Kirkpatrick","year":"2012"},{"key":"ref56","volume-title":"Secure hash standard (SHS)","year":"2015"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2870835"},{"key":"ref58","volume-title":"Digital Signal Processing: A Computer-Based Approach","author":"Maitra","year":"2011"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2020.2982355"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-22"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8782661\/10008219\/10007641.pdf?arnumber=10007641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T01:09:49Z","timestamp":1707440989000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10007641\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2023.3234338","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.21547695.v1","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.21547695","asserted-by":"object"}]},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}