{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T12:35:09Z","timestamp":1763987709531,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T00:00:00Z","timestamp":1441670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,8]]},"DOI":"10.1145\/2841113.2841117","type":"proceedings-article","created":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T19:49:49Z","timestamp":1449776989000},"page":"44-58","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Exploiting the Physical Environment for Securing the Internet of Things"],"prefix":"10.1145","author":[{"given":"Christian T.","family":"Zenger","sequence":"first","affiliation":[{"name":"Horst G\u00f6rtz Institute for IT-Security (HGI), Ruhr-University Bochum, Germany"}]},{"given":"Jan","family":"Zimmer","sequence":"additional","affiliation":[{"name":"Horst G\u00f6rtz Institute for IT-Security (HGI), Ruhr-University Bochum, Germany"}]},{"given":"Mario","family":"Pietersz","sequence":"additional","affiliation":[{"name":"Horst G\u00f6rtz Institute for IT-Security (HGI), Ruhr-University Bochum, Germany"}]},{"given":"Jan-Felix","family":"Posielek","sequence":"additional","affiliation":[{"name":"Horst G\u00f6rtz Institute for IT-Security (HGI), Ruhr-University Bochum, Germany"}]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[{"name":"Horst G\u00f6rtz Institute for IT-Security (HGI), Ruhr-University Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2015,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"2012 International Symposium on","author":"Ambekar A.","year":"2012","unstructured":"A. Ambekar , M. Hassan , and H. D. Schotten . Improving channel reciprocity for effective key management systems. In Signals, Systems, and Electronics (ISSSE) , 2012 International Symposium on , pages 1 -- 4 . IEEE, 2012 . A. Ambekar, M. Hassan, and H. D. Schotten. Improving channel reciprocity for effective key management systems. In Signals, Systems, and Electronics (ISSSE), 2012 International Symposium on, pages 1--4. IEEE, 2012."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2005.858853"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315295"},{"key":"e_1_3_2_1_4_1","volume-title":"NIST DRAFT Special Publication 800-90b recommendation for the entropy sources used for random bit generation","author":"Barker E.","year":"2012","unstructured":"E. Barker and J. Kelsey . NIST DRAFT Special Publication 800-90b recommendation for the entropy sources used for random bit generation , 2012 . E. Barker and J. Kelsey. NIST DRAFT Special Publication 800-90b recommendation for the entropy sources used for random bit generation, 2012."},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science","first-page":"410","volume-title":"Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques","author":"Brassard G.","year":"1993","unstructured":"G. Brassard and L. Salvail . Secret-key reconciliation by public discussion . In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques , Lofthus, Norway, May 23-27, 1993 , Proceedings, volume 765 of Lecture Notes in Computer Science , pages 410 -- 423 . Springer , 1993. G. Brassard and L. Salvail. Secret-key reconciliation by public discussion. In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, volume 765 of Lecture Notes in Computer Science, pages 410--423. Springer, 1993."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2011","author":"Cai L.","year":"2011","unstructured":"L. Cai , K. Zeng , H. Chen , and P. Mohapatra . Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2011 , San Diego, California, USA, 6th February - 9th February 2011 . The Internet Society, 2011. L. Cai, K. Zeng, H. Chen, and P. Mohapatra. Good neighbor: Ad hoc pairing of nearby wireless devices by multiple antennas. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011. The Internet Society, 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.127"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503890"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2008.16"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2200290"},{"key":"e_1_3_2_1_12_1","volume-title":"Syndrome encoding and decoding of bch codes in sublinear time","author":"Dodis Y.","year":"2006","unstructured":"Y. Dodis , R. Ostrovsky , L. Reyzin , and A. Smith . Syndrome encoding and decoding of bch codes in sublinear time , 2006 . Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Syndrome encoding and decoding of bch codes in sublinear time, 2006."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"e_1_3_2_1_15_1","series-title":"Lecture Notes in Computer Science","first-page":"206","volume-title":"Information Security Applications - 11th International Workshop, WISA","author":"D\u00f6ttling N.","year":"2010","unstructured":"N. D\u00f6ttling , D. E. Lazich , J. M\u00fcller-Quade , and A. S. de Almeida . Vulnerabilities of wireless key exchange based on channel reciprocity . In Y. Chung and M. Yung, editors, Information Security Applications - 11th International Workshop, WISA 2010 , Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers, volume 6513 of Lecture Notes in Computer Science , pages 206 -- 220 . Springer , 2010. N. D\u00f6ttling, D. E. Lazich, J. M\u00fcller-Quade, and A. S. de Almeida. Vulnerabilities of wireless key exchange based on channel reciprocity. In Y. Chung and M. Yung, editors, Information Security Applications - 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers, volume 6513 of Lecture Notes in Computer Science, pages 206--220. Springer, 2010."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_14"},{"key":"e_1_3_2_1_17_1","volume-title":"On the security of key extraction from measuring physical quantities. CoRR, abs\/1311.4591","author":"Edman M.","year":"2013","unstructured":"M. Edman , A. Kiayias , Q. Tang , and B. Yener . On the security of key extraction from measuring physical quantities. CoRR, abs\/1311.4591 , 2013 . M. Edman, A. Kiayias, Q. Tang, and B. Yener. On the security of key extraction from measuring physical quantities. CoRR, abs\/1311.4591, 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_12"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.894"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/993515"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229334"},{"key":"e_1_3_2_1_22_1","volume-title":"OFDM 2014","author":"Guillaume R.","year":"2014","unstructured":"R. Guillaume , A. Mueller , C. T. Zenger , C. Paar , and A. Czylwik . Fair comparison and evaluation of quantization schemes for phy-based key generation . OFDM 2014 , 2014 . R. Guillaume, A. Mueller, C. T. Zenger, C. Paar, and A. Czylwik. Fair comparison and evaluation of quantization schemes for phy-based key generation. OFDM 2014, 2014."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1790343.1790355"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.385951"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11799313_14"},{"key":"e_1_3_2_1_27_1","first-page":"406","volume-title":"Amenaza Technologies Limited","author":"Ingoldsby T.","year":"2005","unstructured":"T. Ingoldsby . Fundamentals of capabilities-based attack tree analysis . Amenaza Technologies Limited , pages 406 -- 917 , 2005 . T. Ingoldsby. Fundamentals of capabilities-based attack tree analysis. Amenaza Technologies Limited, pages 406--917, 2005."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814466"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088748"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exs029"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"e_1_3_2_1_33_1","first-page":"927","volume-title":"Proceedings of the IEEE INFOCOM 2012","author":"Liu H.","year":"2012","unstructured":"H. Liu , J. Yang , Y. Wang , and Y. Chen . Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In A. G. Greenberg and K. Sohraby, editors , Proceedings of the IEEE INFOCOM 2012 , Orlando, FL, USA , March 25-30, 2012 , pages 927 -- 935 . IEEE, 2012. H. Liu, J. Yang, Y. Wang, and Y. Chen. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In A. G. Greenberg and K. Sohraby, editors, Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, pages 927--935. IEEE, 2012."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"e_1_3_2_1_35_1","series-title":"Lecture Notes in Computer Science","first-page":"461","volume-title":"Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference","author":"Maurer U. M.","year":"1992","unstructured":"U. M. Maurer . Protocols for secret key agreement by public discussion based on common information. In E. F. Brickell, editor, Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference , Santa Barbara, California, USA , August 16-20, 1992 , Proceedings, volume 740 of Lecture Notes in Computer Science , pages 461 -- 470 . Springer , 1992. U. M. Maurer. Protocols for secret key agreement by public discussion based on common information. In E. F. Brickell, editor, Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings, volume 740 of Lecture Notes in Computer Science, pages 461--470. Springer, 1992."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756169.1756202"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660334"},{"key":"e_1_3_2_1_38_1","volume-title":"Conxsense - context sensing for adaptive usable access control. CoRR, abs\/1308.2903","author":"Miettinen M.","year":"2013","unstructured":"M. Miettinen , S. Heuser , W. Kronz , A. Sadeghi , and N. Asokan . Conxsense - context sensing for adaptive usable access control. CoRR, abs\/1308.2903 , 2013 . M. Miettinen, S. Heuser, W. Kronz, A. Sadeghi, and N. Asokan. Conxsense - context sensing for adaptive usable access control. CoRR, abs\/1308.2903, 2013."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590337"},{"key":"e_1_3_2_1_40_1","volume-title":"A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications","author":"S. NIST.","year":"2000","unstructured":"S. NIST. 800-22. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 . S. NIST. 800-22. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, 2000."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.88"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147744"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.63"},{"key":"e_1_3_2_1_44_1","volume-title":"Digital communications, new york: Mcgrawhill","author":"Proakis J.","year":"2001","unstructured":"J. Proakis . Digital communications, new york: Mcgrawhill , 2001 . J. Proakis. Digital communications, new york: Mcgrawhill, 2001."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516658"},{"key":"e_1_3_2_1_46_1","volume-title":"Dec.","author":"Schneier B.","year":"1999","unstructured":"B. Schneier . Attack trees. j-DDJ, 24(12):21--22, 24, 26, 28--29 , Dec. 1999 . B. Schneier. Attack trees. j-DDJ, 24(12):21--22, 24, 26, 28--29, Dec. 1999."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185454"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462123"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2004.830257"},{"key":"e_1_3_2_1_51_1","volume-title":"Fuming acid and cryptanalysis: Handy tools for overcoming a digital locking and access control system - full version. IACR Cryptology ePrint Archive","author":"Strobel D.","year":"2013","unstructured":"D. Strobel , B. Driessen , T. Kasper , G. Leander , D. Oswald , F. Schellenberg , and C. Paar . Fuming acid and cryptanalysis: Handy tools for overcoming a digital locking and access control system - full version. IACR Cryptology ePrint Archive , 2013 :598, 2013. D. Strobel, B. Driessen, T. Kasper, G. Leander, D. Oswald, F. Schellenberg, and C. Paar. Fuming acid and cryptanalysis: Handy tools for overcoming a digital locking and access control system - full version. IACR Cryptology ePrint Archive, 2013:598, 2013."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352557"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2009.2033055"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2001.985763"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"A.\n      Varshavsky A.\n      Scannell A.\n      LaMarca and     \n      E.\n  de Lara. Amigo: Proximity-based authentication of mobile devices\n  . In J. Krumm G. D. Abowd A. Seneviratne and T. Strang editors UbiComp \n  2007\n  : Ubiquitous Computing 9th International Conference UbiComp 2007 Innsbruck Austria September 16-19 2007 Proceedings volume \n  4717\n   of \n  Lecture Notes in Computer Science pages \n  253\n  --\n  270\n  . \n  Springer 2007.   A. Varshavsky A. Scannell A. LaMarca and E. de Lara. Amigo: Proximity-based authentication of mobile devices. In J. Krumm G. D. Abowd A. Seneviratne and T. Strang editors UbiComp 2007: Ubiquitous Computing 9th International Conference UbiComp 2007 Innsbruck Austria September 16-19 2007 Proceedings volume 4717 of Lecture Notes in Computer Science pages 253--270. Springer 2007.","DOI":"10.1007\/978-3-540-74853-3_15"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934929"},{"key":"e_1_3_2_1_57_1","volume-title":"Microwave mobile communications","author":"Jr J. WC","year":"1974","unstructured":"J. WC Jr . Microwave mobile communications , 1974 . J. WC Jr. Microwave mobile communications, 1974."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1741866.1741889"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998422"},{"issue":"8","key":"e_1_3_2_1_60_1","first-page":"1355","article-title":"The wire-tap channel. Bell System Technical Journal","volume":"54","author":"Wyner A. D.","year":"1975","unstructured":"A. D. Wyner . The wire-tap channel. Bell System Technical Journal , The , 54 ( 8 ): 1355 -- 1387 , 1975 . A. D. Wyner. The wire-tap channel. Bell System Technical Journal, The, 54(8):1355--1387, 1975.","journal-title":"The"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2043187"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2183146"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2014.7"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833568"}],"event":{"name":"NSPW '15: New Security Paradigms Workshop","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Twente Netherlands","acronym":"NSPW '15"},"container-title":["Proceedings of the 2015 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841117","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2841113.2841117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:53:47Z","timestamp":1750222427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841117"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,8]]},"references-count":64,"alternative-id":["10.1145\/2841113.2841117","10.1145\/2841113"],"URL":"https:\/\/doi.org\/10.1145\/2841113.2841117","relation":{},"subject":[],"published":{"date-parts":[[2015,9,8]]},"assertion":[{"value":"2015-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}