{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T10:35:47Z","timestamp":1717756547277},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,8,29]],"date-time":"2010-08-29T00:00:00Z","timestamp":1283040000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1155\/2011\/628747","type":"journal-article","created":{"date-parts":[[2010,9,30]],"date-time":"2010-09-30T18:37:07Z","timestamp":1285871827000},"source":"Crossref","is-referenced-by-count":5,"title":["Wireless Information-Theoretic Security in an Outdoor Topology with Obstacles: Theoretical Analysis and Experimental Measurements"],"prefix":"10.1186","volume":"2011","author":[{"given":"Theofilos","family":"Chrysikos","sequence":"first","affiliation":[]},{"given":"Tasos","family":"Dagiuklas","sequence":"additional","affiliation":[]},{"given":"Stavros","family":"Kotsopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,29]]},"reference":[{"key":"2127_CR1","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"29","author":"CE Shannon","year":"1949","unstructured":"Shannon CE: Communication theory of secrecy systems. Bell Systems Technical Journal 1949, 29: 656-715.","journal-title":"Bell Systems Technical Journal"},{"issue":"8","key":"2127_CR2","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"AD Wyner","year":"1975","unstructured":"Wyner AD: The wire-tap channel. Bell Systems Technical Journal 1975, 54(8):1355-1387.","journal-title":"Bell Systems Technical Journal"},{"issue":"3","key":"2127_CR3","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csiszar","year":"1978","unstructured":"Csiszar I, Korner J: Broadcast channels with confidential messages. IEEE Transactions on Information Theory 1978, 24(3):339-348. 10.1109\/TIT.1978.1055892","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"2127_CR4","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TIT.1978.1055917","volume":"24","author":"SK Leung-Yan-Cheong","year":"1978","unstructured":"Leung-Yan-Cheong SK, Hellman ME: The Gaussian wiretap channel. IEEE Transactions on Information Theory 1978, 24(4):451-456. 10.1109\/TIT.1978.1055917","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"2127_CR5","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"UM Maurer","year":"1993","unstructured":"Maurer UM: Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory 1993, 39(3):733-742.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2127_CR6","first-page":"209","volume-title":"Advances in Cryptology\u2014EUROCRYPT '97, Lecture Notes in Computer Science","author":"UM Maurer","year":"1997","unstructured":"Maurer UM: Information-theoretically secure secret-key agreement by NOT authenticated public discussion. In Advances in Cryptology\u2014EUROCRYPT '97, Lecture Notes in Computer Science. Volume 1233. Springer, Heidelberg, Germany; 1997:209-225."},{"key":"2127_CR7","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-45539-6_24","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2000, Lecture Notes in Computer Science","author":"UM Maurer","year":"2000","unstructured":"Maurer UM: Information-theoretic key agreement: from weak to strong secrecy for free. In Advances in Cryptology\u2014EUROCRYPT 2000, Lecture Notes in Computer Science. Volume 1807. Springer, Heidelberg, Germany; 2000:351-368."},{"issue":"4","key":"2127_CR8","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1109\/TIT.2003.809563","volume":"49","author":"U Maurer","year":"2003","unstructured":"Maurer U, Wolf S: Secret-key agreement over unauthenticated public channels\u2014part I: definitions and a completeness result. IEEE Transactions on Information Theory 2003, 49(4):822-831. 10.1109\/TIT.2003.809563","journal-title":"IEEE Transactions on Information Theory"},{"key":"2127_CR9","first-page":"356","volume-title":"Proceedings of IEEE International Symposium on Information Theory (ISIT '06)","author":"J Barros","year":"2006","unstructured":"Barros J, Rodrigues MRD: Secrecy capacity of wireless channels. In Proceedings of IEEE International Symposium on Information Theory (ISIT '06), July 2006. IEEE Press; 356-360."},{"issue":"6","key":"2127_CR10","doi-asserted-by":"publisher","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","volume":"54","author":"M Bloch","year":"2008","unstructured":"Bloch M, Barros J, Rodrigues MRD, McLaughlin SW: Wireless information-theoretic security. IEEE Transactions on Information Theory 2008, 54(6):2515-2534.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2127_CR11","first-page":"116","volume-title":"Proceedings of IEEE Information Theory Workshop (ITW '06)","author":"M Bloch","year":"2006","unstructured":"Bloch M, Thangaraj A, McLaughlin SW, Merolla J-M: LDPC-based Gaussian key reconciliation. In Proceedings of IEEE Information Theory Workshop (ITW '06), March 2006. IEEE Press; 116-120."},{"issue":"2","key":"2127_CR12","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/18.910578","volume":"47","author":"TJ Richardson","year":"2001","unstructured":"Richardson TJ, Shokrollahi MA, Urbanke RL: Design of capacity-approaching irregular low-density parity-check codes. IEEE Transactions on Information Theory 2001, 47(2):619-637. 10.1109\/18.910578","journal-title":"IEEE Transactions on Information Theory"},{"key":"2127_CR13","volume-title":"Wireless Communications: Principles and Practice","author":"T Rappaport","year":"2001","unstructured":"Rappaport T: Wireless Communications: Principles and Practice. Prentice Hall, Upper Saddle River, NJ, USA; 2001."},{"key":"2127_CR14","doi-asserted-by":"publisher","DOI":"10.1002\/0470841524","volume-title":"The Mobile Radio Propagation Channel","author":"JD Parsons","year":"2000","unstructured":"Parsons JD: The Mobile Radio Propagation Channel. Wiley Interscience, Hoboken, NJ, USA; 2000."},{"issue":"10","key":"2127_CR15","doi-asserted-by":"publisher","first-page":"3573","DOI":"10.1109\/TIT.2007.904979","volume":"53","author":"A \u00d6zg\u00fcr","year":"2007","unstructured":"\u00d6zg\u00fcr A, L\u00e9v\u00eaque O, Preissmann E: Scaling laws for one- and two-dimensional random wireless networks in the low-attenuation regime. IEEE Transactions on Information Theory 2007, 53(10):3573-3585.","journal-title":"IEEE Transactions on Information Theory"},{"key":"2127_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/0471743690","volume-title":"Introduction to RF Propagation","author":"J Seybold","year":"2005","unstructured":"Seybold J: Introduction to RF Propagation. Wiley Interscience, Hoboken, NJ, USA; 2005."},{"key":"2127_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/WTS.2009.5068993","volume-title":"Wireless Telecommunications Symposium 2009","author":"T Chrysikos","year":"2009","unstructured":"Chrysikos T, Kotsopoulos S: Impact of channel-dependent variation of path loss exponent on Wireless Information-Theoretic Security. In Wireless Telecommunications Symposium 2009. IEEE Press, Prague, Czech Republic; 2009:1-7."},{"key":"2127_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-11526-4_1","volume-title":"Proceedings of Security in Emerging Wireless Communication and Networking Systems (SEWCN '09)","author":"T Chrysikos","year":"2010","unstructured":"Chrysikos T, Dagiuklas T, Kotsopoulos S: A closed-form expression for outage secrecy capacity in Wireless Information-Theoretic Security. In Proceedings of Security in Emerging Wireless Communication and Networking Systems (SEWCN '09), 2010, Lecture Notes in Computer Science. Volume 42. Springer; 3-12."},{"key":"2127_CR19","first-page":"974","volume-title":"Proceedings of 11th IEEE Singapore International Conference on Communication Systems (ICCS '08)","author":"PC Pinto","year":"2008","unstructured":"Pinto PC, Barros J, Win MZ: Physical-layer security in stochastic wireless networks. In Proceedings of 11th IEEE Singapore International Conference on Communication Systems (ICCS '08), November 2008. IEEE Press; 974-979."},{"key":"2127_CR20","first-page":"2442","volume-title":"Proceedings of IEEE International Symposium on Information Theory (ISIT '09)","author":"PC Pinto","year":"2009","unstructured":"Pinto PC, Barros J, Win MZ: Wireless physical-layer security: the case of colluding eavesdroppers. In Proceedings of IEEE International Symposium on Information Theory (ISIT '09), July 2009. IEEE Press; 2442-2446."},{"key":"2127_CR21","volume-title":"IFIP Wireless Days (WD '10)","author":"T Chrysikos","year":"2010","unstructured":"Chrysikos T, Dagiuklas T, Kotsopoulos S: Wireless information-theoretic security for moving users in autonomic networks. IFIP Wireless Days (WD '10), 2010, Venice, Italy"},{"key":"2127_CR22","volume-title":"Proceedings of the 17th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS '09)","author":"C Papageorgiou","year":"2009","unstructured":"Papageorgiou C, Birkos K, Dagiuklas T, Kotsopoulos S: An obstacle-aware human mobility model for ad hoc networks. Proceedings of the 17th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS '09), September 2009, London, UK"},{"key":"2127_CR23","volume-title":"Proceedings of the 4th ACM International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks (PM2HW2N '09)","author":"C Papageorgiou","year":"2009","unstructured":"Papageorgiou C, Birkos K, Dagiuklas T, Kotsopoulos S: Simulating mission critical mobile ad hoc networks. Proceedings of the 4th ACM International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks (PM2HW2N '09), October 2009, Tenerife, Spain"},{"key":"2127_CR24","unstructured":"http:\/\/www.netstumbler.com\/"},{"key":"2127_CR25","first-page":"1","volume-title":"Proceedings of International Conference on Ultra Modern Telecommunications (ICUMT '09)","author":"T Chrysikos","year":"2009","unstructured":"Chrysikos T, Georgopoulos G, Kotsopoulos S: Empirical calculation of shadowing deviation for complex indoor propagation topologies at 2.4 GHz. In Proceedings of International Conference on Ultra Modern Telecommunications (ICUMT '09), October 2009, St. Petersburg, Russia. IEEE Press; 1-6."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1155\/2011\/628747.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1155\/2011\/628747\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1155\/2011\/628747.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T19:17:27Z","timestamp":1565205447000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1155\/2011\/628747"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,29]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["2127"],"URL":"https:\/\/doi.org\/10.1155\/2011\/628747","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8,29]]},"article-number":"628747"}}