{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:04:10Z","timestamp":1770336250448,"version":"3.49.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T00:00:00Z","timestamp":1697068800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T00:00:00Z","timestamp":1697068800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,12]]},"DOI":"10.1109\/wf-iot58464.2023.10539393","type":"proceedings-article","created":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T17:38:40Z","timestamp":1717090720000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Physical Layer Security in a Private 5G Network for Industrial and Mobility Application"],"prefix":"10.1109","author":[{"given":"Shivraj Hanumant","family":"Gonde","sequence":"first","affiliation":[{"name":"Secure Land Communications Airbus,UIm,Germany"}]},{"given":"Christoph","family":"Frisch","sequence":"additional","affiliation":[{"name":"Chair for Security in Information Technology Technical University of Munich,Munich,Germany"}]},{"given":"Svetoslav","family":"Duhovnikov","sequence":"additional","affiliation":[{"name":"Central Research and Technology Airbus,Munich,Germany"}]},{"given":"Martin","family":"Kubisch","sequence":"additional","affiliation":[{"name":"Central Research and Technology Airbus,Munich,Germany"}]},{"given":"Thomas","family":"Meyerhoff","sequence":"additional","affiliation":[{"name":"Central Research and Technology Airbus,Munich,Germany"}]},{"given":"Dominic","family":"Schupke","sequence":"additional","affiliation":[{"name":"Central Research and Technology Airbus,Munich,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/sfcs.1994.365700"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/pimrc50174.2021.9569556"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2009.88"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/icuwb.2014.6958955"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/sahcn.2014.6990365"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"ref9","first-page":"321","article-title":"On the effectiveness of secret key extraction from wireless signal strength in real environ- ments","volume-title":"Proceedings of the 15th annual international conference on Mobile computing and networking (MobiCom 09)","author":"Jana"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/access.2016.2521718"},{"key":"ref11","first-page":"128","article-title":"Radio-telepathy: extracting a secret key from an unauthenticated wireless channel","volume-title":"In Proceedings of the 14th ACM international conference on Mobile computing and net-working (MobiCom 08)","author":"Mathur","year":"2008"},{"key":"ref12","author":"Adrian","year":"2016","journal-title":"Physical-Layer Security in LTE Cellular Links: Simulation Results and Standardization Perspectives"},{"key":"ref13","first-page":"277","article-title":"Secret key generation scheme from WiFi and LTE reference signals","volume-title":"Analog Integr Circ Sig Process","volume":"91","author":"Kameni Ngassa","year":"2017"},{"issue":"5","key":"ref14","first-page":"497","article-title":"Physi-cal Layer Key Generation in 5G and Beyond Wireless Commu-nications: Challenges and Opportunities","volume-title":"Entropy","volume":"21","author":"Li","year":"2019"},{"key":"ref15","first-page":"37","article-title":"Key Generation for Internet of Things: A Contemporary Survey","volume-title":"ACM Comput. Surv","volume":"54","author":"Xu","year":"2021"}],"event":{"name":"2023 IEEE 9th World Forum on Internet of Things (WF-IoT)","location":"Aveiro, Portugal","start":{"date-parts":[[2023,10,12]]},"end":{"date-parts":[[2023,10,27]]}},"container-title":["2023 IEEE 9th World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10539362\/10539375\/10539393.pdf?arnumber=10539393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T04:53:31Z","timestamp":1717131211000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10539393\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wf-iot58464.2023.10539393","relation":{},"subject":[],"published":{"date-parts":[[2023,10,12]]}}}