{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:59Z","timestamp":1750220099699,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:00:00Z","timestamp":1652659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["ECCS-2139028"],"award-info":[{"award-number":["ECCS-2139028"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,16]]},"DOI":"10.1145\/3507657.3528550","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T11:30:36Z","timestamp":1651923036000},"page":"222-232","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["DyWCP"],"prefix":"10.1145","author":[{"given":"Shengping","family":"Bi","sequence":"first","affiliation":[{"name":"New Mexico State University, Las Cruces, NM, USA"}]},{"given":"Tao","family":"Hou","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[{"name":"New Mexico State University, Las Cruces, NM, USA"}]},{"given":"Yao","family":"Liu","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"given":"Zhuo","family":"Lu","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"given":"Qingqi","family":"Pei","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'An, China"}]}],"member":"320","published-online":{"date-parts":[[2022,5,16]]},"reference":[{"unstructured":"Internet of things. https:\/\/en.wikipedia.org\/wiki\/Internet_of_things.  Internet of things. https:\/\/en.wikipedia.org\/wiki\/Internet_of_things.","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/mwc.2017.1800112"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1016\/j.future.2017.11.022"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/MC.2017.201"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of USENIX Security","author":"Celik Z Berkay","year":"2018","unstructured":"Z Berkay Celik , Leonardo Babun , Amit Kumar Sikder , Hidayet Aksu , Gang Tan , Patrick McDaniel , and A Selcuk Uluagac . Sensitive information tracking in commodity iot . In Proceedings of USENIX Security , 2018 . Z Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A Selcuk Uluagac. Sensitive information tracking in commodity iot. In Proceedings of USENIX Security, 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/ICDCS.2008.87"},{"key":"e_1_3_2_1_7_1","volume-title":"TWINE: A lightweight block cipher for multiple platforms","author":"Suzaki Tomoyasu","year":"2012","unstructured":"Tomoyasu Suzaki , Kazuhiko Minematsu , Sumio Morioka , and Eita Kobayashi . TWINE: A lightweight block cipher for multiple platforms . In Proceedings of Springer SAC , 2012 . Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka, and Eita Kobayashi. TWINE: A lightweight block cipher for multiple platforms. In Proceedings of Springer SAC, 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1007\/978-3-642-23951-9_22"},{"key":"e_1_3_2_1_9_1","volume-title":"Katan and ktantan-a family of small and efficient hardware-oriented block ciphers","author":"Canniere Christophe De","year":"2009","unstructured":"Christophe De Canniere , Orr Dunkelman , and Miroslav Knevz evi\u0107. Katan and ktantan-a family of small and efficient hardware-oriented block ciphers . In Proceedings of Springer CHES , 2009 . Christophe De Canniere, Orr Dunkelman, and Miroslav Knevz evi\u0107. Katan and ktantan-a family of small and efficient hardware-oriented block ciphers. In Proceedings of Springer CHES, 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1007\/11894063_22"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1015047.1015052"},{"unstructured":"Soren Rinne Thomas Eisenbarth and Christof Paar. Performance analysis of contemporary light-weight block ciphers on 8-bit microcontrollers. ECRYPT page 33.  Soren Rinne Thomas Eisenbarth and Christof Paar. Performance analysis of contemporary light-weight block ciphers on 8-bit microcontrollers. ECRYPT page 33.","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1007\/s13389-017-0160-y"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1016\/j.jnca.2015.09.001"},{"key":"e_1_3_2_1_15_1","volume-title":"Communication theory of secrecy systems. Bell system technical journal, 28(4):656--715","author":"Shannon Claude E","year":"1949","unstructured":"Claude E Shannon . Communication theory of secrecy systems. Bell system technical journal, 28(4):656--715 , 1949 . Claude E Shannon. Communication theory of secrecy systems. Bell system technical journal, 28(4):656--715, 1949."},{"unstructured":"The one-time pad. http:\/\/users.telenet.be\/d.rijmenants\/en\/onetimepad.htm.  The one-time pad. http:\/\/users.telenet.be\/d.rijmenants\/en\/onetimepad.htm.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.5555\/993515"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1409944.1409949"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.14722\/ndss.2014.23162"},{"unstructured":"Gnuradio. http:\/\/gnuradio.org\/redmine\/projects\/gnuradio\/wiki.  Gnuradio. http:\/\/gnuradio.org\/redmine\/projects\/gnuradio\/wiki.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","volume-title":"DTIC Document","author":"Rukhin Andrew","year":"2001","unstructured":"Andrew Rukhin , Juan Soto , James Nechvatal , Miles Smid , and Elaine Barker . A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report , DTIC Document , 2001 . Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, and Elaine Barker. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, DTIC Document, 2001."},{"key":"e_1_3_2_1_22_1","volume-title":"Yannick Seurin, and Charlotte Vikkelsoe. Present: An ultra-lightweight block cipher","author":"Bogdanov Andrey","year":"2007","unstructured":"Andrey Bogdanov , Lars R Knudsen , Gregor Leander , Christof Paar , Axel Poschmann , Matthew JB Robshaw , Yannick Seurin, and Charlotte Vikkelsoe. Present: An ultra-lightweight block cipher . In Proceedings of Springer CHES , 2007 . Andrey Bogdanov, Lars R Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew JB Robshaw, Yannick Seurin, and Charlotte Vikkelsoe. Present: An ultra-lightweight block cipher. In Proceedings of Springer CHES, 2007."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/MILCOM.2005.1605889"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1109\/TWC.2010.080210.090948"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/JCN.2012.6292244"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/INFCOM.2012.6195817"},{"key":"e_1_3_2_1_27_1","volume-title":"Cipher Machines and Cryptology","author":"Rijmenants Dirk","year":"2010","unstructured":"Dirk Rijmenants . The complete guide to secure communications with the one time pad cipher . Cipher Machines and Cryptology , 2010 . Dirk Rijmenants. The complete guide to secure communications with the one time pad cipher. Cipher Machines and Cryptology, 2010."},{"key":"e_1_3_2_1_28_1","volume-title":"Fine-grained network time synchronization using reference broadcasts. ACM SIGOPS Operating Systems Review, 36(SI):147--163","author":"Elson Jeremy","year":"2002","unstructured":"Jeremy Elson , Lewis Girod , and Deborah Estrin . Fine-grained network time synchronization using reference broadcasts. ACM SIGOPS Operating Systems Review, 36(SI):147--163 , 2002 . Jeremy Elson, Lewis Girod, and Deborah Estrin. Fine-grained network time synchronization using reference broadcasts. ACM SIGOPS Operating Systems Review, 36(SI):147--163, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/1380564.1380571"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.5555\/1111206"},{"key":"e_1_3_2_1_31_1","volume-title":"Digital communication","author":"Lee Edward A","year":"2012","unstructured":"Edward A Lee and David G Messerschmitt . Digital communication . Springer Science Business Media , 2012 . Edward A Lee and David G Messerschmitt. Digital communication. Springer Science Business Media, 2012."},{"unstructured":"Random number generation. https:\/\/en.wikipedia.org\/wiki\/Random_number_generation.  Random number generation. https:\/\/en.wikipedia.org\/wiki\/Random_number_generation.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of ACM IPSN","author":"Xiao Lin","year":"2006","unstructured":"Lin Xiao , Stephen Boyd , and Sanjay Lall . A space-time diffusion scheme for peer-to-peer least-squares estimation . In Proceedings of ACM IPSN , 2006 . Lin Xiao, Stephen Boyd, and Sanjay Lall. A space-time diffusion scheme for peer-to-peer least-squares estimation. In Proceedings of ACM IPSN, 2006."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1109\/TWC.2015.2493145"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/2660267.2660272"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.5555\/2513630"},{"unstructured":"Closed set. https:\/\/en.wikipedia.org\/wiki\/Closed_set.  Closed set. https:\/\/en.wikipedia.org\/wiki\/Closed_set.","key":"e_1_3_2_1_37_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1201\/b17668"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of ACM MobiCom","author":"Mathur Suhas","year":"2008","unstructured":"Suhas Mathur , Wade Trappe , Narayan Mandayam , Chunxuan Ye , and Alex Reznik . Radio-telepathy : extracting a secret key from an unauthenticated wireless channel . In Proceedings of ACM MobiCom , 2008 . Suhas Mathur, Wade Trappe, Narayan Mandayam, Chunxuan Ye, and Alex Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of ACM MobiCom, 2008."},{"key":"e_1_3_2_1_41_1","volume-title":"Channel estimation modeling","author":"Pukkila Markku","year":"2000","unstructured":"Markku Pukkila . Channel estimation modeling . Nokia Research Center , 2000 . Markku Pukkila. Channel estimation modeling. Nokia Research Center, 2000."},{"key":"e_1_3_2_1_42_1","volume-title":"Network security: private communication in a public world","author":"Kaufman Charlie","year":"2002","unstructured":"Charlie Kaufman , Radia Perlman , and Mike Speciner . Network security: private communication in a public world . Prentice Hall Press , 2002 . Charlie Kaufman, Radia Perlman, and Mike Speciner. Network security: private communication in a public world. Prentice Hall Press, 2002."},{"key":"e_1_3_2_1_43_1","volume-title":"A pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica (slovenia), 33(4):441--452","author":"Patidar Vinod","year":"2009","unstructured":"Vinod Patidar , Krishan K Sud , and Narendra K Pareek . A pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica (slovenia), 33(4):441--452 , 2009 . Vinod Patidar, Krishan K Sud, and Narendra K Pareek. A pseudo random bit generator based on chaotic logistic map and its statistical testing. Informatica (slovenia), 33(4):441--452, 2009."}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"acronym":"WiSec '22","name":"WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"San Antonio TX USA"},"container-title":["Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528550","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3507657.3528550","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528550","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3507657.3528550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:15Z","timestamp":1750183815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3507657.3528550"}},"subtitle":["Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security"],"short-title":[],"issued":{"date-parts":[[2022,5,16]]},"references-count":42,"alternative-id":["10.1145\/3507657.3528550","10.1145\/3507657"],"URL":"https:\/\/doi.org\/10.1145\/3507657.3528550","relation":{},"subject":[],"published":{"date-parts":[[2022,5,16]]},"assertion":[{"value":"2022-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}