{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:25:36Z","timestamp":1771705536197,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T00:00:00Z","timestamp":1621296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,18]]},"DOI":"10.1145\/3412382.3458256","type":"proceedings-article","created":{"date-parts":[[2021,5,20]],"date-time":"2021-05-20T23:56:47Z","timestamp":1621555007000},"page":"47-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["A Novel Model-Based Security Scheme for LoRa Key Generation"],"prefix":"10.1145","author":[{"given":"Jiayao","family":"Gao","sequence":"first","affiliation":[{"name":"The University of New South Wales, Sydney, NSW, Australia"}]},{"given":"Weitao","family":"Xu","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong"}]},{"given":"Salil","family":"Kanhere","sequence":"additional","affiliation":[{"name":"The University of New South Wales, Sydney, NSW, Australia"}]},{"given":"Sanjay","family":"Jha","sequence":"additional","affiliation":[{"name":"The University of New South Wales, Sydney, NSW, Australia"}]},{"given":"Jun Young","family":"Kim","sequence":"additional","affiliation":[{"name":"WBS Technology, Sydney, NSW, Australia"}]},{"given":"Walter","family":"Huang","sequence":"additional","affiliation":[{"name":"WBS Technology, Sydney, NSW, Australia"}]},{"given":"Wen","family":"Hu","sequence":"additional","affiliation":[{"name":"The University of New South Wales, Sydney, NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,5,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/4234.913150"},{"key":"e_1_3_2_1_2_1","volume-title":"Handbook of mathematical functions with formulas, graphs, and mathematical tables","author":"Abramowitz Milton","unstructured":"Milton Abramowitz and Irene A Stegun . 1948. Handbook of mathematical functions with formulas, graphs, and mathematical tables . Vol. 55 . US Government printing office. Milton Abramowitz and Irene A Stegun. 1948. Handbook of mathematical functions with formulas, graphs, and mathematical tables. Vol. 55. US Government printing office."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"e_1_3_2_1_4_1","volume-title":"Mohammad Abdul Matin, et al. [n.d.]. Coding for MIMO-OFDM in future wireless systems","author":"Ahmed Bannour","unstructured":"Bannour Ahmed , Mohammad Abdul Matin, et al. [n.d.]. Coding for MIMO-OFDM in future wireless systems . Springer . Bannour Ahmed, Mohammad Abdul Matin, et al. [n.d.]. Coding for MIMO-OFDM in future wireless systems. Springer."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.71"},{"key":"e_1_3_2_1_6_1","volume-title":"Compressive sensing","author":"Baraniuk Richard G","year":"2007","unstructured":"Richard G Baraniuk . 2007. Compressive sensing . IEEE signal processing magazine 24, 4 ( 2007 ). Richard G Baraniuk. 2007. Compressive sensing. IEEE signal processing magazine 24, 4 (2007)."},{"key":"e_1_3_2_1_7_1","volume-title":"Mobile Ad-Hoc Netzwerke, 1. deutscher Workshop \u00fcber Mobile Ad-Hoc Netzwerke WMAN","author":"Bettstetter Christian","year":"2002","unstructured":"Christian Bettstetter and Christian Wagner . 2002. The spatial node distribution of the random waypoint mobility model . In Mobile Ad-Hoc Netzwerke, 1. deutscher Workshop \u00fcber Mobile Ad-Hoc Netzwerke WMAN 2002 . Gesellschaft f\u00fcr Informatik eV. Christian Bettstetter and Christian Wagner. 2002. The spatial node distribution of the random waypoint mobility model. In Mobile Ad-Hoc Netzwerke, 1. deutscher Workshop \u00fcber Mobile Ad-Hoc Netzwerke WMAN 2002. Gesellschaft f\u00fcr Informatik eV."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"e_1_3_2_1_9_1","volume-title":"Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 410--423","author":"Brassard Gilles","year":"1993","unstructured":"Gilles Brassard and Louis Salvail . 1993 . Secret-key reconciliation by public discussion . In Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 410--423 . Gilles Brassard and Louis Salvail. 1993. Secret-key reconciliation by public discussion. In Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 410--423."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"},{"key":"e_1_3_2_1_11_1","volume-title":"Linking information reconciliation and privacy amplification. journal of Cryptology 10, 2","author":"Cachin Christian","year":"1997","unstructured":"Christian Cachin and Ueli M Maurer . 1997. Linking information reconciliation and privacy amplification. journal of Cryptology 10, 2 ( 1997 ), 97--110. Christian Cachin and Ueli M Maurer. 1997. Linking information reconciliation and privacy amplification. journal of Cryptology 10, 2 (1997), 97--110."},{"key":"e_1_3_2_1_12_1","volume-title":"International conference on testbeds and research infrastructures. Springer, 302--316","author":"Doddavenkatappa Manjunath","year":"2011","unstructured":"Manjunath Doddavenkatappa , Mun Choon Chan , and Akkihebbal L Ananda . 2011 . Indriya: A low-cost, 3D wireless sensor network testbed . In International conference on testbeds and research infrastructures. Springer, 302--316 . Manjunath Doddavenkatappa, Mun Choon Chan, and Akkihebbal L Ananda. 2011. Indriya: A low-cost, 3D wireless sensor network testbed. In International conference on testbeds and research infrastructures. Springer, 302--316."},{"key":"e_1_3_2_1_13_1","volume-title":"LinkLab: A Scalable and Heterogeneous Testbed for Remotely Developing and Experimenting IoT Applications","author":"Gao Yi","unstructured":"Yi Gao , Jiadong Zhang , Gaoyang Guan , and Wei Dong . 2020. LinkLab: A Scalable and Heterogeneous Testbed for Remotely Developing and Experimenting IoT Applications . In IoTDI. IEEE , 176--188. Yi Gao, Jiadong Zhang, Gaoyang Guan, and Wei Dong. 2020. LinkLab: A Scalable and Heterogeneous Testbed for Remotely Developing and Experimenting IoT Applications. In IoTDI. IEEE, 176--188."},{"key":"e_1_3_2_1_14_1","volume-title":"Distributed Physical Layer Key Generation for Secure LPWAN Communication. In 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 225--232","author":"Han Biao","year":"2019","unstructured":"Biao Han , Sirui Peng , Xiaoyan Wang , and Baosheng Wang . 2019 . Distributed Physical Layer Key Generation for Secure LPWAN Communication. In 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 225--232 . Biao Han, Sirui Peng, Xiaoyan Wang, and Baosheng Wang. 2019. Distributed Physical Layer Key Generation for Secure LPWAN Communication. In 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 225--232."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00041"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.385951"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292708"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134624"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302506.3310406"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994551.2994555"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.88"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.63"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2014.6966172"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/584490.584500"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232803"},{"key":"e_1_3_2_1_31_1","volume-title":"Experimental Investigation on Wireless Key Generation for Low Power Wide Area Networks","author":"Ruotsalainen Henri","year":"2019","unstructured":"Henri Ruotsalainen , Junqing Zhang , and Stepan Grebeniuk . 2019. Experimental Investigation on Wireless Key Generation for Low Power Wide Area Networks . IEEE Internet of Things Journal ( 2019 ). Henri Ruotsalainen, Junqing Zhang, and Stepan Grebeniuk. 2019. Experimental Investigation on Wireless Key Generation for Low Power Wide Area Networks. IEEE Internet of Things Journal (2019)."},{"key":"e_1_3_2_1_32_1","unstructured":"Semtech. 2019. SX1272 Datasheet. https:\/\/semtech.my.salesforce.com\/sfc\/p\/#E0000000JelG\/a\/440000001NCE\/v_VBhk1IolDgxwwnOpcS_vTFxPfSEPQbuneK3mWsXlU  Semtech. 2019. SX1272 Datasheet. https:\/\/semtech.my.salesforce.com\/sfc\/p\/#E0000000JelG\/a\/440000001NCE\/v_VBhk1IolDgxwwnOpcS_vTFxPfSEPQbuneK3mWsXlU"},{"key":"e_1_3_2_1_33_1","unstructured":"IHS Statista. 2018. Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). (2018).  IHS Statista. 2018. Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions). (2018)."},{"key":"e_1_3_2_1_34_1","volume-title":"Principles of mobile communication","author":"St\u00fcber Gordon L","unstructured":"Gordon L St\u00fcber and Gordon L St\u00e8uber . 1996. Principles of mobile communication . Vol. 2 . Springer . Gordon L St\u00fcber and Gordon L St\u00e8uber. 1996. Principles of mobile communication. Vol. 2. Springer."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2014.7063627"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CAMA.2017.8273458"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2052253"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934929"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121010"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2046199"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.144"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130911"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3131700"},{"key":"e_1_3_2_1_44_1","volume-title":"2013 IEEE Globecom Workshops (GC Wkshps). IEEE, 1297--1302","author":"Wu Xiaohua","year":"2013","unstructured":"Xiaohua Wu , Yuexing Peng , Chunjing Hu , Hui Zhao , and Lei Shu . 2013 . A secret key generation method based on CSI in OFDM-FDD system . In 2013 IEEE Globecom Workshops (GC Wkshps). IEEE, 1297--1302 . Xiaohua Wu, Yuexing Peng, Chunjing Hu, Hui Zhao, and Lei Shu. 2013. A secret key generation method based on CSI in OFDM-FDD system. In 2013 IEEE Globecom Workshops (GC Wkshps). IEEE, 1297--1302."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2014.6914340"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978298"},{"key":"e_1_3_2_1_47_1","volume-title":"Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE)","author":"Xu Weitao","unstructured":"Weitao Xu , Sanjay Jha , and Wen Hu. 2018. Exploring the feasibility of physical layer key generation for LoRaWAN. In 2018 17th IEEE International Conference On Trust , Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE) . IEEE , 231--236. Weitao Xu, Sanjay Jha, and Wen Hu. 2018. Exploring the feasibility of physical layer key generation for LoRaWAN. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE). IEEE, 231--236."},{"key":"e_1_3_2_1_48_1","volume-title":"Lora-key: Secure key generation system for lora-based network","author":"Xu Weitao","year":"2018","unstructured":"Weitao Xu , Sanjay Jha , and Wen Hu . 2018 . Lora-key: Secure key generation system for lora-based network . IEEE Internet of Things Journal ( 2018). Weitao Xu, Sanjay Jha, and Wen Hu. 2018. Lora-key: Secure key generation system for lora-based network. IEEE Internet of Things Journal (2018)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2946900"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2016.7460726"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2043187"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462004"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2877201"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800455"}],"event":{"name":"IPSN '21: The 20th International Conference on Information Processing in Sensor Networks","location":"Nashville TN USA","acronym":"IPSN '21","sponsor":["IEEE-SPS Signal Processing Society","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412382.3458256","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412382.3458256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:01Z","timestamp":1750195501000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412382.3458256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,18]]},"references-count":53,"alternative-id":["10.1145\/3412382.3458256","10.1145\/3412382"],"URL":"https:\/\/doi.org\/10.1145\/3412382.3458256","relation":{},"subject":[],"published":{"date-parts":[[2021,5,18]]},"assertion":[{"value":"2021-05-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}