{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T19:19:35Z","timestamp":1769023175074,"version":"3.49.0"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CISTER Research Unit","award":["CEC\/04234"],"award-info":[{"award-number":["CEC\/04234"]}]},{"name":"CMU Portugal partnership","award":["CMU\/TIC\/0022\/2019"],"award-info":[{"award-number":["CMU\/TIC\/0022\/2019"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2021,7,31]]},"abstract":"<jats:p>\n            Thanks to flexible deployment and excellent maneuverability, autonomous drones have been recently considered as an effective means to act as aerial data relays for wireless ground devices with limited or no cellular infrastructure, e.g., smart farming in a remote area. Due to the broadcast nature of wireless channels, data communications between the drones and the ground devices are vulnerable to eavesdropping attacks. This article develops BloothAir, which is a secure multi-hop aerial relay system based on\n            <jats:bold>Bluetooth Low Energy<\/jats:bold>\n            (\n            <jats:italic>BLE<\/jats:italic>\n            ) connected autonomous drones. For encrypting the BLE communications in BloothAir, a channel-based secret key generation is proposed, where received signal strength at the drones and the ground devices is quantized to generate the secret keys. Moreover, a dynamic programming-based channel quantization scheme is studied to minimize the secret key bit mismatch rate of the drones and the ground devices by recursively adjusting the quantization intervals. To validate the design of BloothAir, we build a multi-hop aerial relay testbed by using the MX400 drone platform and the Gust radio transceiver, which is a new lightweight onboard BLE communicator specially developed for the drone. Extensive real-world experiments demonstrate that the BloothAir system achieves a significantly lower secret key bit mismatch rate than the key generation benchmarks, which use the static quantization intervals. In addition, the high randomness of the generated secret keys is verified by the standard NIST test, thereby effectively protecting the BLE communications in BloothAir from the eavesdropping attacks.\n          <\/jats:p>","DOI":"10.1145\/3448254","type":"journal-article","created":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T10:58:46Z","timestamp":1618484326000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["BloothAir"],"prefix":"10.1145","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0517-2392","authenticated-orcid":false,"given":"Kai","family":"Li","sequence":"first","affiliation":[{"name":"Real-Time and Embedded Computing Systems Research Centre (CISTER), Portugal"}]},{"given":"Ning","family":"Lu","sequence":"additional","affiliation":[{"name":"AirMind LLC., China"}]},{"given":"Jingjing","family":"Zheng","sequence":"additional","affiliation":[{"name":"CISTER, Portugal"}]},{"given":"Pei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Michigan, USA"}]},{"given":"Wei","family":"Ni","sequence":"additional","affiliation":[{"name":"Data61, Commonwealth Scientific and Industrial Research Organization (CSIRO), Australia"}]},{"given":"Eduardo","family":"Tovar","sequence":"additional","affiliation":[{"name":"CISTER, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2021,4,15]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2924143"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201917)","author":"Vasisht Deepak","year":"2017","unstructured":"Deepak Vasisht , Zerina Kapetanovic , Jongho Won , Xinxin Jin , Ranveer Chandra , Sudipta Sinha , Ashish Kapoor , Madhusudhan Sudarshan , and Sean Stratman . 2017 . Farmbeats: An IoT platform for data-driven agriculture . In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201917) . 515--529. Deepak Vasisht, Zerina Kapetanovic, Jongho Won, Xinxin Jin, Ranveer Chandra, Sudipta Sinha, Ashish Kapoor, Madhusudhan Sudarshan, and Sean Stratman. 2017. Farmbeats: An IoT platform for data-driven agriculture. In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201917). 515--529."},{"key":"e_1_2_1_3_1","volume-title":"Fundamental concepts of reactive control for autonomous drones. Commun ications of the ACM 61, 10","author":"Mottola Luca","year":"2018","unstructured":"Luca Mottola and Kamin Whitehouse . 2018. Fundamental concepts of reactive control for autonomous drones. Commun ications of the ACM 61, 10 ( 2018 ), 96--104. Luca Mottola and Kamin Whitehouse. 2018. Fundamental concepts of reactive control for autonomous drones. Commun ications of the ACM 61, 10 (2018), 96--104."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2017.11"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2467381"},{"key":"e_1_2_1_6_1","volume-title":"Wood","author":"Floreano Dario","year":"2015","unstructured":"Dario Floreano and Robert J . Wood . 2015 . Science, technology and the future of small autonomous drones. Nature 521, 7553 (2015), 460. Dario Floreano and Robert J. Wood. 2015. Science, technology and the future of small autonomous drones. Nature 521, 7553 (2015), 460."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795496"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2855211"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1800161"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/s120911734"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3001836"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/MCOM.2017.1600522CM","article-title":"Securing the Internet of Things in a quantum world","volume":"55","author":"Cheng Chi","year":"2017","unstructured":"Chi Cheng , Rongxing Lu , Albrecht Petzoldt , and Tsuyoshi Takagi . 2017 . Securing the Internet of Things in a quantum world . IEEE Communications Magazine 55 , 2 (2017), 116 -- 120 . Chi Cheng, Rongxing Lu, Albrecht Petzoldt, and Tsuyoshi Takagi. 2017. Securing the Internet of Things in a quantum world. IEEE Communications Magazine 55, 2 (2017), 116--120.","journal-title":"IEEE Communications Magazine"},{"key":"e_1_2_1_13_1","volume-title":"Fast and practical secret key extraction by exploiting channel response","author":"Liu Hongbo","unstructured":"Hongbo Liu , Yang Wang , Jie Yang , and Yingying Chen . 2013. Fast and practical secret key extraction by exploiting channel response . In IEEE INFOCOM. IEEE , 3048--3056. Hongbo Liu, Yang Wang, Jie Yang, and Yingying Chen. 2013. Fast and practical secret key extraction by exploiting channel response. In IEEE INFOCOM. IEEE, 3048--3056."},{"key":"e_1_2_1_14_1","volume-title":"Fast and scalable secret key generation exploiting channel phase randomness in wireless networks","author":"Wang Qian","unstructured":"Qian Wang , Hai Su , Kui Ren , and Kwangjo Kim . 2011. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks . In IEEE INFOCOM. IEEE , 1422--1430. Qian Wang, Hai Su, Kui Ren, and Kwangjo Kim. 2011. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In IEEE INFOCOM. IEEE, 1422--1430."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098847"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2988249"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382094"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2668332.2668353"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2017.7991464"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.200"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS\u201916)","author":"Xie Yao","unstructured":"Yao Xie , Xiao-Yang Liu , Linghe Kong , Fan Wu , Guihai Chen , and Athanasios V. Vasilakos . 2016. Drone-based wireless relay using online tensor update . In Proceedings of the 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS\u201916) . IEEE, 48--55. Yao Xie, Xiao-Yang Liu, Linghe Kong, Fan Wu, Guihai Chen, and Athanasios V. Vasilakos. 2016. Drone-based wireless relay using online tensor update. In Proceedings of the 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS\u201916). IEEE, 48--55."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700390"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2681698"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700916"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2935620.2935629"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-015-0284-1"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2890999"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766696"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155473"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394497"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176945"},{"key":"e_1_2_1_32_1","volume-title":"Retrieved","year":"2019","unstructured":"2019. MX400 Hardware. Retrieved August 2019 from http:\/\/www.mindpx.net\/assets\/accessories\/MX400usermanual_v12.pdf. 2019. MX400 Hardware. Retrieved August 2019 from http:\/\/www.mindpx.net\/assets\/accessories\/MX400usermanual_v12.pdf."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN48710.2020.00-14"},{"key":"e_1_2_1_34_1","volume-title":"Retrieved","author":"PX.","year":"2019","unstructured":"2019. Mind PX. Retrieved August 2019 from http:\/\/www.mindpx.net\/. 2019. MindPX. Retrieved August 2019 from http:\/\/www.mindpx.net\/."},{"key":"e_1_2_1_35_1","volume-title":"Dynamic Programming and Optimal Control","author":"Bertsekas Dimitri P.","unstructured":"Dimitri P. Bertsekas . 1995. Dynamic Programming and Optimal Control . Vol. 1 . Athena Scientific , Belmont, MA . Dimitri P. Bertsekas. 1995. Dynamic Programming and Optimal Control. Vol. 1. Athena Scientific, Belmont, MA."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.144"},{"key":"e_1_2_1_37_1","unstructured":"Michael Hoeberl Ihtesham Haider and Bernhard Rinner. 2016. Towards a secure key generation and storage framework on resource-constrained sensor nodes. In EWSN. 313--318.  Michael Hoeberl Ihtesham Haider and Bernhard Rinner. 2016. Towards a secure key generation and storage framework on resource-constrained sensor nodes. In EWSN. 313--318."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2764384"},{"key":"e_1_2_1_39_1","volume-title":"Retrieved","year":"2019","unstructured":"2019. AirMind. Retrieved August 2019 from www.airmind.co. 2019. AirMind. Retrieved August 2019 from www.airmind.co."},{"key":"e_1_2_1_40_1","volume-title":"Retrieved","author":"Woolley Martin","year":"2019","unstructured":"Martin Woolley and Sarah Schmidt . 2019. Bluetooth 5. Go Faster . Go Further . Retrieved March 2019 from https:\/\/www.bluetooth.com\/wp-content\/uploads\/2019\/03\/Bluetooth_5-FINAL.pdf. Martin Woolley and Sarah Schmidt. 2019. Bluetooth 5. Go Faster. Go Further. Retrieved March 2019 from https:\/\/www.bluetooth.com\/wp-content\/uploads\/2019\/03\/Bluetooth_5-FINAL.pdf."},{"key":"e_1_2_1_41_1","volume-title":"Product Overview: Gust Dual-Band Extended Range Radio. Retrieved","year":"2020","unstructured":"Airmind. 2020 . Product Overview: Gust Dual-Band Extended Range Radio. Retrieved November 2020 from http:\/\/www.mindpx.net\/assets\/accessories\/Gust_product_overview_v1.1.pdf. Airmind. 2020. Product Overview: Gust Dual-Band Extended Range Radio. Retrieved November 2020 from http:\/\/www.mindpx.net\/assets\/accessories\/Gust_product_overview_v1.1.pdf."},{"key":"e_1_2_1_42_1","volume-title":"IEEE International Symposium on Information Theory (ISIT\u201908)","author":"Yasukawa Shimpei","year":"2008","unstructured":"Shimpei Yasukawa , Hisato Iwai , and Hideichi Sasaoka . 2008 . A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property . In IEEE International Symposium on Information Theory (ISIT\u201908) . IEEE, 732--736. Shimpei Yasukawa, Hisato Iwai, and Hideichi Sasaoka. 2008. A secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property. In IEEE International Symposium on Information Theory (ISIT\u201908). IEEE, 732--736."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2005.858853"},{"key":"e_1_2_1_44_1","volume-title":"et\u00a0al","author":"Lawrence E.","year":"2010","unstructured":"Lawrence E. Bassham III, Andrew L. Rukhin , Juan Soto , James R. Nechvatal , Miles E. Smid , Elaine B. Barker , Stefan D. Leigh , Mark Levenson , Mark Vangel , David L. Banks , et\u00a0al . 2010 . Sp 800-22 rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. National Institute of Standards and Technology . Lawrence E. Bassham III, Andrew L. Rukhin, Juan Soto, James R. Nechvatal, Miles E. Smid, Elaine B. Barker, Stefan D. Leigh, Mark Levenson, Mark Vangel, David L. Banks, et\u00a0al. 2010. Sp 800-22 rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. National Institute of Standards and Technology."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-90B"}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448254","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:41Z","timestamp":1750193261000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448254"}},"subtitle":["A Secure Aerial Relay System Using Bluetooth Connected Autonomous Drones"],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":45,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,7,31]]}},"alternative-id":["10.1145\/3448254"],"URL":"https:\/\/doi.org\/10.1145\/3448254","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"value":"2378-962X","type":"print"},{"value":"2378-9638","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,15]]},"assertion":[{"value":"2020-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}