{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:18:00Z","timestamp":1750220280743,"version":"3.41.0"},"reference-count":81,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T00:00:00Z","timestamp":1633392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2019YFB2102200"],"award-info":[{"award-number":["2019YFB2102200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"China NSF","award":["62002150, 62025204, 62072303, 61972252, and 61972254"],"award-info":[{"award-number":["62002150, 62025204, 62072303, 61972252, and 61972254"]}]},{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2020B0101390001 and 2020B010164001"],"award-info":[{"award-number":["2020B0101390001 and 2020B010164001"]}]},{"name":"Alibaba Group through Alibaba Innovation Research Program"},{"name":"Tencent Rhino Bird Key Research Project"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2022,2,28]]},"abstract":"<jats:p>To build a secure wireless networking system, it is essential that the cryptographic key is known only to the two (or more) communicating parties. Existing key extraction schemes put the devices into physical proximity and utilize the common inherent randomness between the devices to agree on a secret key, but they often rely on specialized hardware (e.g., the specific wireless NIC model) and have low bit rates. In this article, we seek a key extraction approach that only leverages off-the-shelf mobile devices, while achieving significantly higher key generation efficiency. The core idea of our approach is to exploit the fast varying inaudible acoustic channel as the common random source for key generation and wireless parallel communication for exchanging reconciliation information to improve the key generation rate. We have carefully studied and validated the feasibility of our approach through both theoretical analysis and a variety of measurements. We implement our approach on different mobile devices and conduct extensive experiments in different real scenarios. The experiment results show that our approach achieves high efficiency and satisfactory robustness. Compared with state-of-the-art methods, our approach improves the key generation rate by 38.46% and reduces the bit mismatch ratio by 42.34%.<\/jats:p>","DOI":"10.1145\/3480461","type":"journal-article","created":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T20:05:13Z","timestamp":1633464313000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Shared Secret Key Generation by Exploiting Inaudible Acoustic Channels"],"prefix":"10.1145","volume":"18","author":[{"given":"Youjing","family":"Lu","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, P.R. China"}]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, P.R. China"}]},{"given":"Qianyi","family":"Huang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology &amp; Peng Cheng Laboratory"}]},{"given":"Shaojie","family":"Tang","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas"}]},{"given":"Linghe","family":"Kong","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, P.R. China"}]},{"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, P.R. China"}]}],"member":"320","published-online":{"date-parts":[[2021,10,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01219-5"},{"volume-title":"Proceedings of the International Symposium on Signals, Systems, and Electronics (ISSSE\u201912)","author":"Ambekar Abhijit","key":"e_1_2_1_3_1","unstructured":"Abhijit Ambekar , Mohamed Hassan , and Hans D. Schotten . 2012. Improving channel reciprocity for effective key management systems . In Proceedings of the International Symposium on Signals, Systems, and Electronics (ISSSE\u201912) . 1\u20134. Abhijit Ambekar, Mohamed Hassan, and Hans D. Schotten. 2012. Improving channel reciprocity for effective key management systems. In Proceedings of the International Symposium on Signals, Systems, and Electronics (ISSSE\u201912). 1\u20134."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECWT.2005.1617683"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1771592.1771610"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2829193"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.771145"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MoWNet.2018.8428890"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1364\/OE.26.016422"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2278834"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2616406"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2543687"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/993515"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2015.7390857"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2878035"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997473"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.385951"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2995289.2995291"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.06.014"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614356"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831174"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/4234.824754"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of European Conference on Smart Objects, Systems and Technologies (Smart SysTech\u201915)","author":"Krentz Konrad-Felix","year":"2015","unstructured":"Konrad-Felix Krentz and Gerhard Wunder . 2015 . 6doku: Towards secure over-the-air preloading of 6lowpan nodes using phy key generation . In Proceedings of European Conference on Smart Objects, Systems and Technologies (Smart SysTech\u201915) . 1\u201311. Konrad-Felix Krentz and Gerhard Wunder. 2015. 6doku: Towards secure over-the-air preloading of 6lowpan nodes using phy key generation. In Proceedings of European Conference on Smart Objects, Systems and Technologies (Smart SysTech\u201915). 1\u201311."},{"key":"e_1_2_1_26_1","first-page":"1","article-title":"Physical layer key generation in 5G and beyond wireless communications: Challenges and opportunities","volume":"21","author":"Li Guyue","year":"2019","unstructured":"Guyue Li , Chen Sun , Junqing Zhang , Eduard Jorswieck , Bin Xiao , and Aiqun Hu . 2019 . Physical layer key generation in 5G and beyond wireless communications: Challenges and opportunities . Entropy 21 , 5 (2019), 1 \u2013 16 . Guyue Li, Chen Sun, Junqing Zhang, Eduard Jorswieck, Bin Xiao, and Aiqun Hu. 2019. Physical layer key generation in 5G and beyond wireless communications: Challenges and opportunities. Entropy 21, 5 (2019), 1\u201316.","journal-title":"Entropy"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2893249"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2790878"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057210"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2206385"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323679.3326529"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601960"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409960"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.51"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2018.10.008"},{"key":"e_1_2_1_38_1","volume-title":"Carmo","author":"Melo Wilson S.","year":"2018","unstructured":"Wilson S. Melo , Raphael Machado , and Luiz F. R. C . Carmo . 2018 . Using physical context-based authentication against external attacks: Models and protocols. Secur. Commun. Netw . (2018). Wilson S. Melo, Raphael Machado, and Luiz F. R. C. Carmo. 2018. Using physical context-based authentication against external attacks: Models and protocols. Secur. Commun. Netw. (2018)."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.07.030"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196106"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2806423"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20050026"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/294797"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.63"},{"key":"e_1_2_1_46_1","first-page":"66","article-title":"Channel estimation modeling","volume":"17","author":"Pukkila Markku","year":"2000","unstructured":"Markku Pukkila . 2000 . Channel estimation modeling . Nokia Research Center 17 (2000), 66 . Markku Pukkila. 2000. Channel estimation modeling. Nokia Research Center 17 (2000), 66.","journal-title":"Nokia Research Center"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057177"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/525688"},{"key":"e_1_2_1_49_1","first-page":"1","article-title":"Security issues in the Diffie-Hellman key agreement protocol","volume":"22","author":"Raymond Jean-Fransico","year":"2000","unstructured":"Jean-Fransico Raymond and Anton Stiglic . 2000 . Security issues in the Diffie-Hellman key agreement protocol . IEEE Trans. Inf. Theory 22 (2000), 1 \u2013 17 . Jean-Fransico Raymond and Anton Stiglic. 2000. Security issues in the Diffie-Hellman key agreement protocol. IEEE Trans. Inf. Theory 22 (2000), 1\u201317.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2008.4518284"},{"key":"e_1_2_1_51_1","volume-title":"Scharf and C\u00e9dric Demeure","author":"Louis","year":"1991","unstructured":"Louis L. Scharf and C\u00e9dric Demeure . 1991 . Statistical Signal Processing: Detection, Estimation , and Time series Analysis. Vol. 63 . Addison-Wesley Reading , MA. Louis L. Scharf and C\u00e9dric Demeure. 1991. Statistical Signal Processing: Detection, Estimation, and Time series Analysis. Vol. 63. Addison-Wesley Reading, MA."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.271"},{"key":"e_1_2_1_53_1","first-page":"2999","article-title":"Golay code based bit mismatch mitigation for wireless channel impulse response based secrecy generation","volume":"7","author":"Shen Chen","year":"2018","unstructured":"Chen Shen , Hao Li , Gokhan Sahin , Hyeong-Ah Choi , and Yogendra Shah . 2018 . Golay code based bit mismatch mitigation for wireless channel impulse response based secrecy generation . IEEE Access 7 (2018), 2999 \u2013 3007 . Chen Shen, Hao Li, Gokhan Sahin, Hyeong-Ah Choi, and Yogendra Shah. 2018. Golay code based bit mismatch mitigation for wireless channel impulse response based secrecy generation. IEEE Access 7 (2018), 2999\u20133007.","journal-title":"IEEE Access"},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of the International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI\/SPMU\u201912)","author":"Sigg Stephan","year":"2012","unstructured":"Stephan Sigg , Yusheng Ji , Ngu Nguyen , and An Huynh . 2012 . AdhocPairing: Spontaneous audio based secure device pairing for Android mobile devices . In Proceedings of the International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI\/SPMU\u201912) . 1\u20136. Stephan Sigg, Yusheng Ji, Ngu Nguyen, and An Huynh. 2012. AdhocPairing: Spontaneous audio based secure device pairing for Android mobile devices. In Proceedings of the International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI\/SPMU\u201912). 1\u20136."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2019.01.013"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254494"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464437"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/1111206"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934929"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121010"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403770"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2825560"},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of the IEEE\/ACM International Symposium on Quality of Service (IWQoS\u201914)","author":"Xi Wei","year":"2014","unstructured":"Wei Xi , Xiang-Yang Li , Chen Qian , Jinsong Han , Shaojie Tang , Jizhong Zhao , and Kun Zhao . 2014 . KEEP: Fast secret key extraction protocol for D2D communication . In Proceedings of the IEEE\/ACM International Symposium on Quality of Service (IWQoS\u201914) . 350\u2013359. Wei Xi, Xiang-Yang Li, Chen Qian, Jinsong Han, Shaojie Tang, Jizhong Zhao, and Kun Zhao. 2014. KEEP: Fast secret key extraction protocol for D2D communication. In Proceedings of the IEEE\/ACM International Symposium on Quality of Service (IWQoS\u201914). 350\u2013359."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978298"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2017.8117543"},{"key":"e_1_2_1_66_1","doi-asserted-by":"crossref","unstructured":"Weitao Xu Sanjay Jha and Wen Hu. 2018. Exploring the feasibility of physical layer key generation for LoRaWAN. In Proceedings of the IEEE International Conference on Trust Security and Privacy in Computing and Communications\/IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE\u201918). 231\u2013236. Weitao Xu Sanjay Jha and Wen Hu. 2018. Exploring the feasibility of physical layer key generation for LoRaWAN. In Proceedings of the IEEE International Conference on Trust Security and Privacy in Computing and Communications\/IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE\u201918). 231\u2013236.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00044"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430424"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081071"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.3390\/e21020192"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081356"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.22-7-2015.2260194"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.4108\/eai.22-7-2015.2260196"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.06.013"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2841113.2841117"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2929362"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2521718"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.3390\/e19080420"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833568"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2604618"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567032"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3480461","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3480461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:17Z","timestamp":1750188677000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3480461"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,5]]},"references-count":81,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2,28]]}},"alternative-id":["10.1145\/3480461"],"URL":"https:\/\/doi.org\/10.1145\/3480461","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2021,10,5]]},"assertion":[{"value":"2020-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}