{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:12:33Z","timestamp":1770225153406,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US National Science Foundation","award":["CNS-1619251, CNS-1824355, CNS-1933069, CNS-2055751"],"award-info":[{"award-number":["CNS-1619251, CNS-1824355, CNS-1933069, CNS-2055751"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484789","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"1306-1319","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks"],"prefix":"10.1145","author":[{"given":"Dianqi","family":"Han","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Ang","family":"Li","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Jiawei","family":"Li","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[{"name":"Indiana University-Purdue University Indianapolis, Indianapolis, IN, USA"}]},{"given":"Yanchao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Kendall Rank Correlation Coefficient. Encyclopedia of Measurement and Statistics","author":"Abdi Herve","year":"2007","unstructured":"Herve Abdi. 2007. The Kendall Rank Correlation Coefficient. Encyclopedia of Measurement and Statistics (2007), 508--510."},{"key":"e_1_3_2_1_2_1","volume-title":"Self-certified group key generation for ad hoc clusters in wireless sensor networks","author":"Arazi Ortal","unstructured":"Ortal Arazi and Hairong Qi. 2005. Self-certified group key generation for ad hoc clusters in wireless sensor networks. In IEEE INFOCOM. Miami, FL."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Xirong Bao Jin Liu Lihuang She and Shi Zhang. 2014. A key management scheme based on grouping within cluster. (2014) 3455--3460.","DOI":"10.1109\/WCICA.2014.7053290"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2751474"},{"key":"e_1_3_2_1_5_1","volume-title":"On a class of error correcting binary group codes. Information and control","author":"Bose Chandra","year":"1960","unstructured":"Chandra Bose and Dwijendra Ray-Chaudhuri. 1960. On a class of error correcting binary group codes. Information and control, Vol. 3, 1 (1960), 68--79."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2002.804034"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065548"},{"key":"e_1_3_2_1_9_1","volume-title":"ACM CCS.","author":"Eschenauer Laurent","unstructured":"Laurent Eschenauer and Virgil Gligor. 2002. A key-management scheme for distributed sensor networks. In ACM CCS. Washington, DC, 41--47."},{"key":"e_1_3_2_1_10_1","unstructured":"Jonathan Feist. 2018. How fast can a drone fly. https:\/\/dronerush.com\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Phil Goldstein. 2016. DHS Border protection and marines want commercial IoT devices on the battlefield. https:\/\/fedtechmagazine.com\/article\/2016\/05\/dhs-border-protection-and-marines-want-commercial-iot-devices-battlefield."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.385951"},{"key":"e_1_3_2_1_13_1","unstructured":"Texas Instruments. 2021. Engineering smarter factory automation and control designs. https:\/\/www.ti.com\/applications\/industrial\/factory-automation\/overview.html."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3054031"},{"key":"e_1_3_2_1_15_1","volume-title":"ACM MobiCom.","author":"Jana Suman","unstructured":"Suman Jana, Sriram Premnath, Mike Clark, Sneha Kasera, Neal Patwari, and Srikanth Krishnamurthy. 2009. On the effectiveness of secret key extraction from wireless signal strength in real environments. In ACM MobiCom. Beijing, China."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.073112.120450"},{"key":"e_1_3_2_1_17_1","unstructured":"KasaSmart. 2021. AC750 Wireless Travel Router. https:\/\/www.tp-link.com\/us\/home-networking\/wifi-router\/tl-wr902ac\/."},{"key":"e_1_3_2_1_18_1","volume-title":"Lightweight group secret key generation leveraging non-reconciled received signal strength in mobile wireless networks","author":"Li Guyue","unstructured":"Guyue Li, Liangjun Hu, and Aiqun Hu. 2019. Lightweight group secret key generation leveraging non-reconciled received signal strength in mobile wireless networks. In IEEE ICC. Shanghai, China, 1--6."},{"key":"e_1_3_2_1_19_1","volume-title":"Fast and practical secret key extraction by exploiting channel response","author":"Liu Hongbo","unstructured":"Hongbo Liu, Yang Wang, Jie Yang, and Yingying Chen. 2013. Fast and practical secret key extraction by exploiting channel response. In IEEE INFOCOM. Turin, Italy."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2310747"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.969514"},{"key":"e_1_3_2_1_23_1","unstructured":"Pendjari National Park. 2021. Management and Infrastructure. https:\/\/www.africanparks.org\/our-work\/Management-Infrastructure."},{"key":"e_1_3_2_1_24_1","unstructured":"IoBT Reign. 2020. IoBT: EMPOWERING READINESS TO MEET COMMANDER INTENT. https:\/\/iobt.illinois.edu\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Andrew Rukhin Juan Soto James Nechvatal Miles Smid and Elaine Barker. 2001. A statistical test suite for random and pseudorandom number generators for cryptographic applications. https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800--22\/rev-1a\/final.","DOI":"10.6028\/NIST.SP.800-22"},{"key":"e_1_3_2_1_26_1","volume-title":"ICASSP.","author":"Sayeed Akbar","unstructured":"Akbar Sayeed and Adrian Perrig. 2008. Secure wireless communications: Secret keys through multipath. In ICASSP. Las Vegas, NV."},{"key":"e_1_3_2_1_27_1","unstructured":"Lukas Schroth. 2020. The drone market size 2020--2025: 5 key takeaways. https:\/\/droneii.com\/the-drone-market-size-2020--2025--5-key-takeaways."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TIFS.2014.2375555","article-title":"Effective key management in dynamic wireless sensor networks","volume":"10","author":"Seo Seung-Hyun","year":"2014","unstructured":"Seung-Hyun Seo, Jongho Won, Salmin Sultana, and Elisa Bertino. 2014. Effective key management in dynamic wireless sensor networks. Transactions on Information Forensics and Security, Vol. 10, 2 (2014), 371--383.","journal-title":"Transactions on Information Forensics and Security"},{"key":"e_1_3_2_1_29_1","volume-title":"A mathematical theory of communication. ACM SIGMOBILE mobile computing and communications review","author":"Shannon Claude","year":"2001","unstructured":"Claude Shannon. 2001. A mathematical theory of communication. ACM SIGMOBILE mobile computing and communications review, Vol. 5, 1 (2001), 3--55."},{"key":"e_1_3_2_1_30_1","volume-title":"Group secret key generation in physical layer, protocols and achievable rates","author":"Tang Tianyu","unstructured":"Tianyu Tang, Ting Jiang, and Weixia Zou. 2017. Group secret key generation in physical layer, protocols and achievable rates. In IEEE ISCIT. Cairns, Australia."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1089803.1089975"},{"key":"e_1_3_2_1_32_1","unstructured":"Tesla. 2021. Tesla Factory. https:\/\/www.tesla.com\/factory."},{"key":"e_1_3_2_1_33_1","volume-title":"Secret group key generation in physical layer for mesh topology","author":"Thai Chan","unstructured":"Chan Thai, Jemin Lee, and Tony Quek. 2015. Secret group key generation in physical layer for mesh topology. In IEEE GLOBECOM. San Diego, CA."},{"key":"e_1_3_2_1_34_1","volume-title":"An energy efficient cluster-head selection for wireless sensor networks","author":"Thein Ma","unstructured":"Ma Thein and Thandar Thein. 2010. An energy efficient cluster-head selection for wireless sensor networks. In IEEE ISMS. Liverpool, UK, 287--291."},{"key":"e_1_3_2_1_35_1","volume-title":"Unconditionally secure communications over fading channels","author":"Tope Michael","unstructured":"Michael Tope and John McEachen. 2001. Unconditionally secure communications over fading channels. In IEEE MILCOM. McLean, VA."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974123"},{"key":"e_1_3_2_1_37_1","volume-title":"Group secret key generation algorithm from wireless signal strength","author":"Wei Yunchuan","unstructured":"Yunchuan Wei, Changmin Zhu, and Jun Ni. 2012. Group secret key generation algorithm from wireless signal strength. In IEEE ICICSE. Zhengzhou, China, 239--245."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.06.005"},{"key":"e_1_3_2_1_39_1","first-page":"1","article-title":"Auto-Key: Using autoencoder to speed up gait-based key generation in body area networks. ACM, Interactive","volume":"4","author":"Wu Yuezhong","year":"2020","unstructured":"Yuezhong Wu, Qi Lin, Hong Jia, Mahbub Hassan, and Wen Hu. 2020. Auto-Key: Using autoencoder to speed up gait-based key generation in body area networks. ACM, Interactive, Mobile, Wearable and Ubiquitous Technologies, Vol. 4, 1 (2020), 1--23.","journal-title":"Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2553643"},{"key":"e_1_3_2_1_41_1","volume-title":"Extracting secrecy from jointly Gaussian random variables","author":"Ye Chunxuan","unstructured":"Chunxuan Ye, Alex Reznik, and Yogendra Shah. 2006. Extracting secrecy from jointly Gaussian random variables. In IEEE ISIT. Seattle, WA."},{"key":"e_1_3_2_1_42_1","volume-title":"Spearman rank correlation. Encyclopedia of Biostatistics","author":"Zar Jerrold","year":"2005","unstructured":"Jerrold Zar. 2005. Spearman rank correlation. Encyclopedia of Biostatistics, Vol. 7 (2005)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2552165"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1218556.1218559"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484789","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484789","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484789","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:53:39Z","timestamp":1763499219000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484789"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":44,"alternative-id":["10.1145\/3460120.3484789","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484789","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}