{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T23:23:33Z","timestamp":1771457013567,"version":"3.50.1"},"reference-count":35,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T00:00:00Z","timestamp":1615248000000},"content-version":"vor","delay-in-days":67,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502085"],"award-info":[{"award-number":["61502085"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872059"],"award-info":[{"award-number":["61872059"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771417"],"award-info":[{"award-number":["61771417"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Key agreement is one the most essential steps when applying cryptographic techniques to secure device\u2010to\u2010device (D2D) communications. Recently, several PHY\u2010based solutions have been proposed by leveraging the channel gains as a common randomness source for key extraction in wireless networks. However, these schemes usually suffer a low rate of key generation and low entropy of generated key and rely on the mobility of devices. In this paper, a novel secret key extraction protocol is proposed by using interference in wireless D2D fading channel. It establishes symmetrical keys for two wireless devices by measuring channel gains and utilizing artificial jamming sent by the third party to change the measured value of channel gains. We give a theoretically reachable key rate of the proposed scheme from the viewpoint of the information theory. It shows that the proposed scheme can make hundred times performance gain than the existing approaches theoretically. Experimental results also demonstrate that the proposed scheme can achieve a secure key distribution with a higher key rate and key entropy compared with the existing schemes.<\/jats:p>","DOI":"10.1155\/2021\/6642605","type":"journal-article","created":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T22:20:08Z","timestamp":1615328408000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Lightweight Key Generation Scheme for Secure Device\u2010to\u2010Device (D2D) Communication"],"prefix":"10.1155","volume":"2021","author":[{"given":"Chunwei","family":"Lou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0691-2724","authenticated-orcid":false,"given":"Mingsheng","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Rongchun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Dajiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Xu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,3,9]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6747052"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700193"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8876807"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3045161"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9340808"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2846258"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_2_10_8_2","doi-asserted-by":"crossref","unstructured":"Azimi-SadjadiB. KiayiasA. MercadoA. andYenerB. Robust key generation from signal envelopes in wireless networks Proceedings of the 14th ACM conference on Computer and communications security - CCS \u203207 October 2007 New York NY USA 401\u2013410 https:\/\/doi.org\/10.1145\/1315245.1315295 2-s2.0-60149088258.","DOI":"10.1145\/1315245.1315295"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"e_1_2_10_10_2","doi-asserted-by":"crossref","unstructured":"ParadaP.andBlahutR. Secrecy capacity of simo and slow fading channels Proceedings. International Symposium on Information Theory 2005. ISIT 2005 September 2005 Adelaide SA Australia 2152\u20132155 https:\/\/doi.org\/10.1109\/isit.2005.1523727 2-s2.0-33749450172.","DOI":"10.1109\/ISIT.2005.1523727"},{"key":"e_1_2_10_11_2","doi-asserted-by":"crossref","unstructured":"MathurS. TrappeW. MandayamN. YeC. andReznikA. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel Proceedings of the 14th ACM international conference on Mobile computing and networking - MobiCom \u203208 September 2008 New York NY USA 128\u2013139 https:\/\/doi.org\/10.1145\/1409944.1409960 2-s2.0-60149097098.","DOI":"10.1145\/1409944.1409960"},{"key":"e_1_2_10_12_2","doi-asserted-by":"crossref","unstructured":"JanaS. PremnathS. ClarkM. KaseraS. K. PatwariN. andKrishnamurthyS. V. On the effectiveness of secret key extraction from wireless signal strength in real environments Proceedings of the 15th annual international conference on Mobile computing and networking September 2009 New York NY USA 321\u2013332 https:\/\/doi.org\/10.1145\/1614320.1614356 2-s2.0-70450242725.","DOI":"10.1145\/1614320.1614356"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.88"},{"key":"e_1_2_10_14_2","doi-asserted-by":"crossref","unstructured":"CroftJ. PatwariN. andKaseraS. K. Robust uncorrelated bit extraction methodologies for wireless sensors Proceedings of the 9th ACM\/IEEE International Conference on Information Processing in Sensor Networks April 2010 New York NY USA 70\u201381 https:\/\/doi.org\/10.1145\/1791212.1791222 2-s2.0-77954527646.","DOI":"10.1145\/1791212.1791222"},{"key":"e_1_2_10_15_2","doi-asserted-by":"crossref","unstructured":"GollskotaS.andKatabiD. Physical layer wireless security made fast and channel independent 2011 Proceedings IEEE INFOCOM April 2011 Shanghai China 1125\u20131133 https:\/\/doi.org\/10.1109\/infcom.2011.5934889 2-s2.0-79960857245.","DOI":"10.1109\/INFCOM.2011.5934889"},{"key":"e_1_2_10_16_2","doi-asserted-by":"crossref","unstructured":"ZengK. WuD. ChanA. andMohapatraP. Exploiting multipleantenna diversity for shared secret key generation in wireless networks 2010 Proceedings IEEE INFOCOM March 2010 San Diego CA USA 1\u20139 https:\/\/doi.org\/10.1109\/infcom.2010.5462004 2-s2.0-77953297543.","DOI":"10.1109\/INFCOM.2010.5462004"},{"key":"e_1_2_10_17_2","doi-asserted-by":"crossref","unstructured":"WangQ. SuH. RenK. andKimK. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks 2011 Proceedings IEEE INFOCOM April 2011 Shanghai China 1422\u20131430 https:\/\/doi.org\/10.1109\/infcom.2011.5934929 2-s2.0-79960885380.","DOI":"10.1109\/INFCOM.2011.5934929"},{"key":"e_1_2_10_18_2","doi-asserted-by":"crossref","unstructured":"LiuH. YangJ. WangY. andChenY. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks 2012 Proceedings IEEE INFOCOM March 2012 Orlando FL USA 927\u2013935 https:\/\/doi.org\/10.1109\/infcom.2012.6195843 2-s2.0-84861623350.","DOI":"10.1109\/INFCOM.2012.6195843"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2278834"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2248730"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2013.2278835"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2013.2269049"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2014.2369001"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2354635"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2391261"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2465301"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2015.2501288"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/364520.364540"},{"key":"e_1_2_10_30_2","first-page":"410","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201993. EUROCRYPT 1993. Lecture Notes in Computer Science, vol 765","author":"Brassard G.","year":"1993"},{"key":"e_1_2_10_31_2","first-page":"523","volume-title":"Advances in Cryptology - EUROCRYPT 2004. EUROCRYPT 2004. Lecture Notes in Computer Science, vol 3027","author":"Dodis Y."},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3174"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.809563"},{"key":"e_1_2_10_34_2","doi-asserted-by":"crossref","unstructured":"WallaceJ. Secure physical layer key generation schemes: Performance and information theoretic limits 2009 IEEE International Conference on Communications June 2009 Dresden Germany 1\u20135 https:\/\/doi.org\/10.1109\/icc.2009.5199440 2-s2.0-70449479022.","DOI":"10.1109\/ICC.2009.5199440"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/6642605.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/6642605.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/6642605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T12:31:22Z","timestamp":1723033882000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/6642605"}},"subtitle":[],"editor":[{"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/6642605"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6642605","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2020-12-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-02-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6642605"}}