{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T07:20:58Z","timestamp":1767165658104,"version":"build-2238731810"},"reference-count":42,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T00:00:00Z","timestamp":1620086400000},"content-version":"vor","delay-in-days":123,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Hubei Province Colleges and Universities","award":["T201512"],"award-info":[{"award-number":["T201512"]}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Aiming at the problems of poor adaptability and low secret key generation rate of secret key generation scheme based on single characteristic parameter of wireless channel, a secret key generation method based on joint characteristic parameters of amplitude and phase of wireless channel is proposed. This method is based on the single\u2010eavesdropping wireless fading channel model; the joint characteristic model of amplitude and phase of wireless fading channel is established; it detects and extracts the joint characteristic parameters of amplitude and phase of channel, and then the proposed characteristics are quantified by using the equal probability joint quantization strategy of amplitude and phase to generate the secret key random parameters. In this paper, the amplitude and phase joint feature parameter detection method of wireless channel can not only improve the generation rate of random secret key parameters but also make the eavesdropping party\u2019s eavesdropping error rate closer to 0.5. The test results show that the proposed scheme can significantly improve the rate, reliability, and security of generating key random parameters.<\/jats:p>","DOI":"10.1155\/2021\/9951742","type":"journal-article","created":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T15:21:57Z","timestamp":1620141717000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["[Retracted] A Method for Detecting Amplitude\u2010Phase Joint Characteristic Parameters of Wireless Channel for Generating Key Parameters"],"prefix":"10.1155","volume":"2021","author":[{"given":"Qiongying","family":"Tan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6860-6848","authenticated-orcid":false,"given":"Shuanglin","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Sanjun","family":"Liu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,5,4]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1145\/3029589"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2020.3023788"},{"key":"e_1_2_10_3_2","doi-asserted-by":"crossref","unstructured":"SahinC. KatzB. andDandekarK. R. Secure and robust symmetric key generation using physical layer techniques under various wireless environments Proceedings of the 2016 IEEE Radio and Wireless Symposium (RWS) March 2016 Austin TX USA 211\u2013214.","DOI":"10.1109\/RWS.2016.7444407"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/3425725"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2019.2939424"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcsi.2020.3028508"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6673386"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2980570"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081071"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.01.008"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-map.2020.0090"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.23919\/jcc.2020.03.011"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1121\/10.0001678"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-020-0350-4"},{"key":"e_1_2_10_15_2","first-page":"1115","article-title":"Efficient deployment with geometric analysis for mmWave UAV communications","volume":"9","author":"Zhao J.","year":"2020","journal-title":"IEEE Wireless Communications Letters"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/18.243431"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/26.385951"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2017.2761700"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2043187"},{"key":"e_1_2_10_20_2","doi-asserted-by":"crossref","unstructured":"MathurS. TrappeW. MandayamN. B.et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel Proceedings of the 14th ACM International Conference on Mobile Computing and Networking September 2008 San Francisco CA USA ACM 128\u2013139.","DOI":"10.1145\/1409944.1409960"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2017.2706657"},{"key":"e_1_2_10_22_2","unstructured":"HuangJ.andJiangT. Dynamic secret key generation exploiting ultra-wideband wireless channel characteristics Proceedings of the 2015 IEEE Wireless Communications and Networking Conference (WCNC) March 2015 New Orleans LA USA 1701\u20131706."},{"key":"e_1_2_10_23_2","doi-asserted-by":"crossref","unstructured":"LiuH. WangY. JieY.et al. Fast and practical secret key extraction by exploiting channel response Proceedings of the 2013 IEEE INFOCOM April 2013 Turin Italy IEEE 3048\u20133056.","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"e_1_2_10_24_2","unstructured":"XiW. LiX. QianC.et al. KEEP: fast secret key extraction protocol for D2D communication Proceedings of the 22nd IEEE\/ACM International Symposium on Quality of Service(IWQoS) May 2014 Hong Kong China 350\u2013359."},{"key":"e_1_2_10_25_2","doi-asserted-by":"crossref","unstructured":"ZhangJ. MarshallA. WoodsR.et al. Secure key generation from OFDM subcarriers\u2019 channel response Proceedings of the 2014 IEEE Globecom Workshops (GC Wkshps) December 2014 Austin TX USA 1302\u20131307.","DOI":"10.1109\/GLOCOMW.2014.7063613"},{"key":"e_1_2_10_26_2","doi-asserted-by":"crossref","unstructured":"HuangL. GuoD. XiongJ.et al. An improved CQA quantization algorithm for physical layer secret key extraction Proceedings of the 2020 International Conference on Wireless Communications and Signal Processing (WCSP) October 2020 Nanjing China 829\u2013834.","DOI":"10.1109\/WCSP49889.2020.9299743"},{"key":"e_1_2_10_27_2","doi-asserted-by":"crossref","unstructured":"ZengK. WuD. ChanA.et al. Exploiting multipleantenna diversity for shared secret key generation in wireless networks \u201c Proceedings of 29th IEEE International Conference on Computer Communications (INFOCOM) March 2010 San Diego CA USA 1\u20139.","DOI":"10.1109\/INFCOM.2010.5462004"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.114"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2009.88"},{"key":"e_1_2_10_30_2","doi-asserted-by":"crossref","unstructured":"JanaS. PremnathS. N. ClarkM.et al. On the effectiveness of secret key extract-ion from wireless signal strength in real environments Proceedings of the 15th Annual International Conference on Mobile Computing and Networking September 2009 Beijing China ACM 321\u2013332.","DOI":"10.1145\/1614320.1614356"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2012.63"},{"key":"e_1_2_10_32_2","doi-asserted-by":"crossref","unstructured":"Ben HamidaS. T. PierrotJ. andCastellucciaC. An adaptive quantization algorithm for secret key generation using radio channel measurements Proceedings of 3rd IEEE International Conference on New Technologies Mobility and Security December 2009 Cairo Egypt 1\u20135.","DOI":"10.1109\/NTMS.2009.5384826"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2979515"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2016.2611581"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2015.2491935"},{"key":"e_1_2_10_36_2","doi-asserted-by":"crossref","unstructured":"XuP. HuD. andChenG. Physical-layer cooperative key generation with correlated eavesdropping channels in IoT Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics) November 2020 Rhodes Greece 29\u201336.","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00025"},{"key":"e_1_2_10_37_2","doi-asserted-by":"crossref","unstructured":"WangQ. SuH. RenK. andKimK. Fast and scalable secret key generation exploiting channel phase randomness in wirelesss networks Proceedings of the 2011 Proceedings IEEE INFOCOM April 2011 Shanghai China IEEE 1422\u20131430.","DOI":"10.1109\/INFCOM.2011.5934929"},{"key":"e_1_2_10_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2016.2552165"},{"key":"e_1_2_10_39_2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224"},{"key":"e_1_2_10_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2012.121010"},{"key":"e_1_2_10_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/2541289"},{"key":"e_1_2_10_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2016.2521718"}],"updated-by":[{"DOI":"10.1155\/2024\/9858056","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T00:00:00Z","timestamp":1706054400000},"record-id":"56753"},{"DOI":"10.1155\/2024\/9858056","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T00:00:00Z","timestamp":1706054400000}}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/9951742.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/9951742.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/9951742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T17:22:16Z","timestamp":1723224136000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/9951742"}},"subtitle":[],"editor":[{"given":"Zhihan","family":"Lv","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/9951742"],"URL":"https:\/\/doi.org\/10.1155\/2021\/9951742","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-03-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"9951742"}}