{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:32:59Z","timestamp":1767706379674},"reference-count":163,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,6,5]],"date-time":"2020-06-05T00:00:00Z","timestamp":1591315200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,6,5]],"date-time":"2020-06-05T00:00:00Z","timestamp":1591315200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The motivation for this study about Physical Layer Security comes from bridging the gap between the vast theory and a feasible implementation. We propose a Physical-Layer-Security Box as a system-level Box is a system-level solution, named PLS-Box, to solve the key exchange between two wireless communicating parties. The PLS-Box performs a novel key generation method named time-frequency filter-bank. The entropy of the radio channel is harvested via a filter-bank processing, and then turned into a reciprocal security key, at both ends. In this concept work, we also focus on several PLS open issues, such as radio-frequency imperfections and accessibility to the baseband communication modem. The goal is to show a wide applicability of our PLS-Box to actual wireless systems, paving the way for an evolution of existing schemes.<\/jats:p>","DOI":"10.1186\/s13638-020-01712-6","type":"journal-article","created":{"date-parts":[[2020,6,5]],"date-time":"2020-06-05T12:02:43Z","timestamp":1591358563000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Physical-Layer-Security Box: a concept for time-frequency channel-reciprocity key generation"],"prefix":"10.1186","volume":"2020","author":[{"given":"Marco","family":"Zoli","sequence":"first","affiliation":[]},{"given":"Andr\u00e9 Noll","family":"Barreto","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"K\u00f6psell","sequence":"additional","affiliation":[]},{"given":"Padmanava","family":"Sen","sequence":"additional","affiliation":[]},{"given":"Gerhard","family":"Fettweis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,5]]},"reference":[{"key":"1712_CR1","unstructured":"Accenture: Ninth Annual Cost of Cybercrime Study. https:\/\/www.accenture.com\/us-en\/insights\/security\/cost-cybercrime-study. Online; Accessed 2019."},{"key":"1712_CR2","unstructured":"IDC: Worldwide Internet of Things Spending Guide. https:\/\/www.idc.com\/getdoc.jsp?containerId=IDCP29475. Online; Accessed 2019."},{"key":"1712_CR3","doi-asserted-by":"publisher","unstructured":"L. Chen, et al., Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey. IEEE Access. 5: (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2695525.","DOI":"10.1109\/ACCESS.2017.2695525"},{"key":"1712_CR4","doi-asserted-by":"publisher","unstructured":"I. Andrea, C. Chrysostomou, G. Hadjichristofi, Internet of Things: security vulnerabilities and challenges. IEEE Symp. Comput. Commun., 180\u2013187 (2015). https:\/\/doi.org\/10.1109\/ISCC.2015.7405513.","DOI":"10.1109\/ISCC.2015.7405513"},{"key":"1712_CR5","doi-asserted-by":"crossref","unstructured":"M. Liyanage, et al., A Comprehensive Guide to 5G Security (Wiley, 2018). isbn:9781119293071.","DOI":"10.1002\/9781119293071"},{"issue":"1","key":"1712_CR6","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1109\/SURV.2012.013012.00028","volume":"15","author":"M. La Polla","year":"2013","unstructured":"M. La Polla, F. Martinelli, D. Sgandurra, A survey on security for mobile devices. IEEE Commun. Surv. Tutor.15(1), 446\u2013471 (2013). https:\/\/doi.org\/10.1109\/SURV.2012.013012.00028.","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1712_CR7","unstructured":"(2019). https:\/\/www.theverge.com\/2019\/4\/4\/18293817\/cybersecurity-hospitals-health-care-scan-simulation. Accessed 2019."},{"issue":"3","key":"1712_CR8","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1016\/j.jestch.2019.01.006","volume":"22","author":"V. Alc\u00e1cer","year":"2019","unstructured":"V. Alc\u00e1cer, V. Cruz-Machado, Scanning the Industry 4.0: A Literature Review on Technologies for Manufacturing Systems. Eng. Sci. Technol. Int. J.22(3), 899\u2013919 (2019). https:\/\/doi.org\/10.1016\/j.jestch.2019.01.006.","journal-title":"Eng. Sci. Technol. Int. J."},{"issue":"XX","key":"1712_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIE.2019.2907451","volume":"PP","author":"K. Huang","year":"2019","unstructured":"K. Huang, C. Zhou, Y. Qin, W. Tu, A Game-Theoretic Approach to Cross-Layer Security Decision-Making in Industrial Cyber-Physical Systems. IEEE Trans. Ind. Electron.PP(XX), 1\u20131 (2019). https:\/\/doi.org\/10.1109\/TIE.2019.2907451.","journal-title":"IEEE Trans. Ind. Electron."},{"key":"1712_CR10","doi-asserted-by":"crossref","unstructured":"A. Al-Dulaimi, et al., 5G Networks: fundamental requirements, enabling technologies and operations management (Wiley, 2018). isbn:978-1-119-33273-2.","DOI":"10.1002\/9781119333142.ch0"},{"key":"1712_CR11","doi-asserted-by":"publisher","unstructured":"D. Basin, J. Dreier, L. Hirschi, S. Radomirovic, R. Sasse, V. Stettler, in Proc. 2018 ACM SIGSAC Conf. Comput. Commun. Secur. - CCS \u201918. A Formal Analysis of 5G Authentication, (2018), pp. 1383\u20131396. https:\/\/doi.org\/10.1145\/3243734.3243846. arXiv:1806.10360v3.","DOI":"10.1145\/3243734.3243846"},{"key":"1712_CR12","unstructured":"European Telecommunications Standards Institute ETSI, Mobile Edge Computing Introductory Technical White Paper. https:\/\/portal.etsi.org\/TBSiteMap\/MEC\/MECWhitePapers.aspx. Online 2018; Accessed 2019."},{"key":"1712_CR13","doi-asserted-by":"publisher","first-page":"54508","DOI":"10.1109\/ACCESS.2019.2913438","volume":"7","author":"D. Wang","year":"2019","unstructured":"D. Wang, B. Bai, K. Lei, W. Zhao, Y. Yang, Z. Han, Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT With Multiple Access Mobile Edge Computing in Smart City. IEEE Access. 7:, 54508\u201354521 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2913438.","journal-title":"IEEE Access"},{"key":"1712_CR14","unstructured":"Symantec, Internet Security Threat Report (ISTR), (2019). https:\/\/www.symantec.com\/security-center\/threat-report. Accessed 2019."},{"key":"1712_CR15","unstructured":"Cisco, 2018 Annual Cybersecurity Report, (2018). https:\/\/www.cisco.com\/c\/m\/enau\/products\/security\/offers\/annual-cybersecurity-report-2018.html. Accessed 2019."},{"key":"1712_CR16","unstructured":"WIRED, Security News This Week: \u2019Simjacker\u2019 Attack Can Track Phones Just by Sending a Text, (2019). https:\/\/www.wired.com\/story\/simjacker-attack-north-korea-security-news\/. Online; Accessed 2019."},{"key":"1712_CR17","unstructured":"Cisco, Cybersecurity Series 2019, Email Security, (2019). https:\/\/www.cisco.com\/c\/dam\/en\/us\/products\/collateral\/security\/email-security\/email-threat-report.pdf. Online 2019; Accessed 2019."},{"key":"1712_CR18","unstructured":"R. K. M. J. Chakraborty, Hand Book on Hardware Cryptography - Algorithms and Analysis (LAP LAMBERT Academic Publishing, 2018). isbn:978-6139841653."},{"key":"1712_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICAICTA.2015.7335349","volume":"16","author":"I. Setiadi","year":"2015","unstructured":"I. Setiadi, A. I. Kistijantoro, A. Miyaji, Elliptic curve cryptography: algorithms and implementation analysis over coordinate systems. 2015 2nd Int. Conf. Adv. Inform. Concepts, Theory Appl.16:, 1\u20136 (2015). https:\/\/doi.org\/10.1109\/ICAICTA.2015.7335349.","journal-title":"2015 2nd Int. Conf. Adv. Inform. Concepts, Theory Appl."},{"key":"1712_CR20","doi-asserted-by":"publisher","unstructured":"K. Piotrowski, P. Langendoerfer, S. Peter, in Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks - SASN \u201906. How public key cryptography influences wireless sensor node lifetime, (2007), p. 169. https:\/\/doi.org\/10.1145\/1180345.1180366.","DOI":"10.1145\/1180345.1180366"},{"issue":"6","key":"1712_CR21","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1109\/MDT.2007.178","volume":"24","author":"T. Eisenbarth","year":"2007","unstructured":"T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, L. Uhsadel, A Survey of Lightweight-Cryptography Implementations. IEEE Des. Test Comput.24(6), 522\u2013533 (2007). https:\/\/doi.org\/10.1109\/MDT.2007.178.","journal-title":"IEEE Des. Test Comput."},{"key":"1712_CR22","volume-title":"Key Drivers and Research Challenges for 6G Ubiquitous Wireless Intelligence, 6G Flaship","author":"K. L. Matti Latva-aho","year":"2019","unstructured":"K. L. Matti Latva-aho, Key Drivers and Research Challenges for 6G Ubiquitous Wireless Intelligence, 6G Flaship (Technical Report September, University of Oulu, Finland, 2019)."},{"key":"1712_CR23","doi-asserted-by":"publisher","unstructured":"R. Roman, C. Alcaraz, J. Lopez, A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes. Mob. Netw. Appl.12(4), 231\u2013244 (2007). https:\/\/doi.org\/10.1007\/s11036-007-0024-2.","DOI":"10.1007\/s11036-007-0024-2"},{"key":"1712_CR24","doi-asserted-by":"publisher","unstructured":"S. B. Sadkhan, A. O. Salman, A survey on lightweight-cryptography status and future challenges, (2018). https:\/\/doi.org\/10.1109\/ICASEA.2018.8370965.","DOI":"10.1109\/ICASEA.2018.8370965"},{"key":"1712_CR25","unstructured":"A. Biryukov, L. P. Perrin, State of the Art in Lightweight Symmetric Cryptography, University of Luxemburg (University of Luxemburg, 2017)."},{"key":"1712_CR26","unstructured":"L. Chen, et al., NIST: Report on Post-Quantum Cryptography NIST. https:\/\/csrc.nist.gov\/publications\/detail\/nistir\/8105\/final. Online 2016; Accessed 2019."},{"key":"1712_CR27","unstructured":"Quantamagazine, Does nevens law describe quantum computings rise, (2019). https:\/\/www.quantamagazine.org\/does-nevens-law-describe-quantum-computings-rise-20190618. Accessed 2019."},{"key":"1712_CR28","unstructured":"IEEE Spectrum, What Google\u2019s Quantum Supremacy Claim Means for Quantum Computing, (2019). https:\/\/spectrum.ieee.org\/tech-talk\/computing\/hardware\/how-googles-quantum-supremacy-plays-into-quantum-computings-long-game. Accessed 2019."},{"key":"1712_CR29","unstructured":"ECRYPT CSA, D5.4: Algorithms, Key Size and Protocols Report, (2018). https:\/\/www.ecrypt.eu.org\/csa\/documents\/D5.4-FinalAlgKeySizeProt.pdf. Accessed 2019."},{"issue":"5","key":"1712_CR30","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MWC.2010.5601959","volume":"17","author":"K. Zeng","year":"2010","unstructured":"K. Zeng, K. Govindan, P. Mohapatra, Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks. IEEE Wirel. Commun.17(5), 56\u201362 (2010). https:\/\/doi.org\/10.1109\/mwc.2010.5601959.","journal-title":"IEEE Wirel. Commun."},{"key":"1712_CR31","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/ACCESS.2016.2521718","volume":"4","author":"J. Zhang","year":"2016","unstructured":"J. Zhang, T. Q. Duong, A. Marshall, R. Woods, Key Generation From Wireless Channels: A Review. IEEE Access. 4:, 614\u2013626 (2016). https:\/\/doi.org\/10.1109\/ACCESS.2016.2521718.","journal-title":"IEEE Access"},{"key":"1712_CR32","doi-asserted-by":"publisher","unstructured":"Li G., C. Sun, J. Zhang, E. Jorswieck, B. Xiao, A. Hu, Physical layer key generation in 5G and beyond wireless communications: challenges and opportunities. Entropy. 21(5) (2019). https:\/\/doi.org\/10.3390\/e21050497.","DOI":"10.3390\/e21050497"},{"issue":"3","key":"1712_CR33","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCAS.2017.2713305","volume":"17","author":"C. H. Chang","year":"2017","unstructured":"C. H. Chang, Y. Zheng, L. Zhang, A Retrospective and a Look Forward: Fifteen Years of Physical Unclonable Function Advancement. IEEE Circ. Syst. Mag.17(3), 32\u201362 (2017). https:\/\/doi.org\/10.1109\/MCAS.2017.2713305.","journal-title":"IEEE Circ. Syst. Mag."},{"key":"1712_CR34","doi-asserted-by":"publisher","unstructured":"J. Delvaux, D. Gu, D. Schellekens, I. Verbauwhede, Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?IEEE Trans. Inf. Forensic. Secur., 451\u2013475 (2014). https:\/\/doi.org\/10.1007\/978-3-662-44709-3.","DOI":"10.1007\/978-3-662-44709-3"},{"key":"1712_CR35","doi-asserted-by":"publisher","unstructured":"B. Gassend, D. Clarke, M. van Dijk, S. Devadas, in Proc. 9th ACM Conf. Comput. Commun. Secur. - CCS \u201902. Silicon physical random functions, (2002), p. 148. https:\/\/doi.org\/10.1145\/586110.586132.","DOI":"10.1145\/586110.586132"},{"key":"1712_CR36","doi-asserted-by":"publisher","unstructured":"R. Maes, Physically Unclonable Functions: Constructions, Properties and Applications, PhD Thesis, Technische Universit\u00e4t Darmstadt. https:\/\/doi.org\/10.1007\/978-3-642-41395-7_2.","DOI":"10.1007\/978-3-642-41395-7_2"},{"issue":"4","key":"1712_CR37","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"C. E. Shannon, Communication Theory of Secrecy Systems. Bell Syst. Tech. J.28(4), 656\u2013715 (1949). https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x.","journal-title":"Bell Syst. Tech. J."},{"issue":"8","key":"1712_CR38","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A. D. Wyner","year":"1975","unstructured":"A. D. Wyner, The Wire-Tap Channel. Bell Syst. Tech. J.54(8), 1355\u20131387 (1975). https:\/\/doi.org\/10.1002\/j.1538-7305.1975.tb02040.x.","journal-title":"Bell Syst. Tech. J."},{"issue":"4","key":"1712_CR39","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1109\/18.243431","volume":"39","author":"R. Ahlswede","year":"1993","unstructured":"R. Ahlswede, I. Csiszar, Common randomness in information theory and cryptography\u2014Part I: Secret sharing. IEEE Trans. Inf. Theory. 39(4), 1121\u20131132 (1993).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1712_CR40","doi-asserted-by":"publisher","unstructured":"S. Mathur, R. Miller, A. Varshavsky, W. Trappe, N. Mandayam, in Proc. 9th Int. Conf. Mob. Syst. Appl. Serv. - MobiSys \u201911. ProxiMate, (2011), p. 211. https:\/\/doi.org\/10.1145\/1999995.2000016.","DOI":"10.1145\/1999995.2000016"},{"key":"1712_CR41","doi-asserted-by":"publisher","unstructured":"F. Marino, E. Paolini, M. Chiani, in Proc. - IEEE Int. Conf.Secret key extraction from a UWB channel: analysis in a real environment (Ultra-Wideband, 2014), pp. 80\u201385. https:\/\/doi.org\/10.1109\/ICUWB.2014.6958955.","DOI":"10.1109\/ICUWB.2014.6958955"},{"key":"1712_CR42","doi-asserted-by":"publisher","unstructured":"H. Liu, Y. Wang, J. Yang, Y. Chen, in Proc. IEEE INFOCOM. Fast and practical secret key extraction by exploiting channel response, (2013), pp. 3048\u20133056. https:\/\/doi.org\/10.1109\/INFCOM.2013.6567117.","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"1712_CR43","doi-asserted-by":"publisher","unstructured":"S. N. Premnath, P. L. Gowda, S. K. Kasera, N. Patwari, R. Ricci, Secret key extraction using Bluetooth wireless signal strength measurements. Elev. Annu. IEEE Int. Conf. Sensing, Commun. Netw., 293\u2013301 (2014). https:\/\/doi.org\/10.1109\/SAHCN.2014.6990365.","DOI":"10.1109\/SAHCN.2014.6990365"},{"key":"1712_CR44","doi-asserted-by":"publisher","unstructured":"J. Wan, A. B. Lopez, M. A. Al Faruque, in ACM\/IEEE 7th Int. Conf. Cyber-Physical Syst. ICCPS 2016 - Proc.Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security, (2016), pp. 1\u201310. https:\/\/doi.org\/10.1109\/ICCPS.2016.7479103.","DOI":"10.1109\/ICCPS.2016.7479103"},{"issue":"8","key":"1712_CR45","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1049\/iet-com.2013.0472","volume":"8","author":"A. M. Tonello","year":"2014","unstructured":"A. M. Tonello, A. Pittolo, Physical layer security in power line communication networks: an emerging scenario, other than wireless. IET Commun.8(8), 1239\u20131247 (2014). https:\/\/doi.org\/10.1049\/iet-com.2013.0472.","journal-title":"IET Commun."},{"key":"1712_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICTON.2018.8473760","volume":"2018-July","author":"A. A. E. Hajomer","year":"2018","unstructured":"A. A. E. Hajomer, X. Yang, A. Sultan, W. Sun, W. Hu, Key Generation and Distribution Using Phase Fluctuation in Classical Fiber Channel. Int. Conf. Transparent Opt. Netw.2018-July:, 1\u20133 (2018). https:\/\/doi.org\/10.1109\/ICTON.2018.8473760.","journal-title":"Int. Conf. Transparent Opt. Netw."},{"issue":"4","key":"1712_CR47","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1109\/TIFS.2018.2868538","volume":"14","author":"A. Vazquez-Castro","year":"2019","unstructured":"A. Vazquez-Castro, M. Hayashi, Physical Layer Security for RF Satellite Channels in the Finite-Length Regime. IEEE Trans. Inf. Forensics Secur.14(4), 981\u2013993 (2019). https:\/\/doi.org\/10.1109\/TIFS.2018.2868538.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"1712_CR48","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MCOM.001.1900141","volume":"57","author":"B. M. ElHalawany","year":"2019","unstructured":"B. M. ElHalawany, A. A. A. El-Banna, K. Wu, Physical-Layer Security and Privacy for Vehicle-to-Everything. IEEE Commun. Mag.57(10), 84\u201390 (2019). https:\/\/doi.org\/10.1109\/MCOM.001.1900141.","journal-title":"IEEE Commun. Mag."},{"key":"1712_CR49","doi-asserted-by":"publisher","unstructured":"D. Tian, W. Zhang, J. Sun, C. -X. Wang, Physical-Layer Security of Visible Light Communications with Jamming, 512\u2013517 (2019). https:\/\/doi.org\/10.1109\/ICCChina.2019.8855859.","DOI":"10.1109\/ICCChina.2019.8855859"},{"issue":"2","key":"1712_CR50","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MCOM.2016.7402258","volume":"54","author":"Y. Luo","year":"2016","unstructured":"Y. Luo, L. Pu, Z. Peng, Z. Shi, RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements. IEEE Commun. Mag.54(2), 32\u201338 (2016). https:\/\/doi.org\/10.1109\/MCOM.2016.7402258.","journal-title":"IEEE Commun. Mag."},{"key":"1712_CR51","doi-asserted-by":"publisher","unstructured":"B. Halak, M. Zwolinski, M. S. Mispan, in 2016 IEEE 59th Int. Midwest Symp. Circuits Syst. (October). Overview of PUF-based hardware security solutions for the internet of things, (2016), pp. 1\u20134. https:\/\/doi.org\/10.1109\/MWSCAS.2016.7870046.","DOI":"10.1109\/MWSCAS.2016.7870046"},{"key":"1712_CR52","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-642-14452-32","volume":"9783642143120","author":"D. N. Ahmad-Reza Sadeghi","year":"2010","unstructured":"D. N. Ahmad-Reza Sadeghi, Hardware Intrinsic Security from Physically Unclonable Functions. Inf. Secur. Cryptogr.9783642143120:, 39\u201353 (2010). https:\/\/doi.org\/10.1007\/978-3-642-14452-32.","journal-title":"Inf. Secur. Cryptogr."},{"key":"1712_CR53","doi-asserted-by":"publisher","unstructured":"Q. Xu, R. Zheng, W. Saad, Z. Han, Device fingerprinting in wireless networks: challenges and opportunities. IEEE Commun. Surv. Tutorials (2016). https:\/\/doi.org\/10.1109\/COMST.2015.2476338.","DOI":"10.1109\/COMST.2015.2476338"},{"key":"1712_CR54","unstructured":"PHYLAWS Project, PHYsical LAyer Wireless Security, (2019). www.phylaws-ict.org\/. Accessed 2019."},{"key":"1712_CR55","unstructured":"PROPHYLAXE Project 2013-2015, PROPHYLAXE, (2019). www.forschung-it-sicherheit-kommunikationssysteme.de\/projekte\/prophylaxe. Accessed 2019."},{"issue":"3","key":"1712_CR56","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1109\/COMST.2017.2694487","volume":"19","author":"G. Baldini","year":"2017","unstructured":"G. Baldini, G. Steri, A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components. IEEE Commun. Surv. Tutor.19(3), 1761\u20131789 (2017). https:\/\/doi.org\/10.1109\/COMST.2017.2694487. Accessed 2020-02-11.","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1712_CR57","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1109\/PRIMEASIA.2009.5397353","volume":"09706201102","author":"Q. Xu","year":"2009","unstructured":"Q. Xu, Y. Zhou, J. Mao, Configurable secure ECC hardware module for resource constrained device. 1st Asia Pacific Conf. Postgrad. Res. Microelectron. Electron. PrimeAsia. 09706201102:, 424\u2013427 (2009). https:\/\/doi.org\/10.1109\/PRIMEASIA.2009.5397353.","journal-title":"1st Asia Pacific Conf. Postgrad. Res. Microelectron. Electron. PrimeAsia"},{"key":"1712_CR58","doi-asserted-by":"publisher","unstructured":"H. Ju, Y. Jeon, J. Kim, in Proc. - 2015 Int. Conf. Comput. Sci. Comput. Intell. CSCI. A study on the hardware-based security solutions for smart devices, (2016), pp. 833\u2013834. https:\/\/doi.org\/10.1109\/CSCI.2015.105.","DOI":"10.1109\/CSCI.2015.105"},{"issue":"1","key":"1712_CR59","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2004\/wjst.v12i1.864","volume":"12","author":"S. Vongsingthong","year":"2015","unstructured":"S. Vongsingthong, S. Boonkrong, A survey on smartphone authentication. Walailak J. Sci. Technol.12(1), 1\u201319 (2015). https:\/\/doi.org\/10.2004\/wjst.v12i1.864.","journal-title":"Walailak J. Sci. Technol."},{"key":"1712_CR60","doi-asserted-by":"publisher","unstructured":"B. Chatterjee, D. Das, S. Sen, RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning, (2018). https:\/\/doi.org\/10.1109\/HST.2018.8383916.","DOI":"10.1109\/HST.2018.8383916"},{"key":"1712_CR61","unstructured":"C. Zenger, Physical-layer security for the Internet of Things, PhD Thesis (University of Bochum, 2017)."},{"key":"1712_CR62","doi-asserted-by":"crossref","unstructured":"M. Bloch, J. Barros, Physical-Layer Security: From Information Theory to Security Engineering (Cambridge Press, 2011). isbn:978-0521516501.","DOI":"10.1017\/CBO9780511977985"},{"key":"1712_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.phycom.2015.11.005","volume":"19","author":"A. Badawy","year":"2016","unstructured":"A. Badawy, T. Elfouly, T. Khattab, A. Mohamed, M. Guizani, Unleashing the secure potential of the wireless physical layer: secret key generation methods. Phys. Commun.19:, 1\u201310 (2016). https:\/\/doi.org\/10.1016\/j.phycom.2015.11.005.","journal-title":"Phys. Commun."},{"issue":"2","key":"1712_CR64","doi-asserted-by":"publisher","first-page":"1878","DOI":"10.1109\/COMST.2018.2883144","volume":"21","author":"D. Wang","year":"2019","unstructured":"D. Wang, B. Bai, W. Zhao, Z. Han, A Survey of Optimization Approaches for Wireless Physical Layer Security. IEEE Commun. Surv. Tutor.21(2), 1878\u20131911 (2019). https:\/\/doi.org\/10.1109\/COMST.2018.2883144.","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"1712_CR65","doi-asserted-by":"publisher","first-page":"1773","DOI":"10.1109\/COMST.2018.2878035","volume":"21","author":"J. M. Hamamreh","year":"2019","unstructured":"J. M. Hamamreh, H. M. Furqan, H. Arslan, Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey. IEEE Commun. Surv. Tutor.21(2), 1773\u20131828 (2019). https:\/\/doi.org\/10.1109\/COMST.2018.2878035.","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"1712_CR66","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1073\/pnas.1618130114","volume":"114","author":"H. V. Poor","year":"2017","unstructured":"H. V. Poor, R. F. Schaefer, Wireless physical layer security. Proc. Natl. Acad. Sci.114(1), 19\u201326 (2017). https:\/\/doi.org\/10.1073\/pnas.1618130114.","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"3","key":"1712_CR67","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1109\/SURV.2014.012314.00178","volume":"16","author":"A. Mukherjee","year":"2014","unstructured":"A. Mukherjee, S. A. A. Fakoorian, J. Huang, A. L. Swindlehurst, Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Commun. Surv. Tutor.16(3), 1550\u20131573 (2014). https:\/\/doi.org\/10.1109\/SURV.2014.012314.00178.","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"1712_CR68","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1109\/COMST.2016.2598968","volume":"19","author":"Y. Liu","year":"2017","unstructured":"Y. Liu, H. -H. Chen, L. Wang, Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges. IEEE Commun. Surv. Tutor.19(1), 347\u2013376 (2017). https:\/\/doi.org\/10.1109\/COMST.2016.2598968.","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1712_CR69","doi-asserted-by":"publisher","unstructured":"R. Negi, S. Goel, Secret communication using artificial noise, vol. 3, (2005). https:\/\/doi.org\/10.1109\/VETECF.2005.1558439.","DOI":"10.1109\/VETECF.2005.1558439"},{"issue":"6","key":"1712_CR70","doi-asserted-by":"publisher","first-page":"2180","DOI":"10.1109\/TWC.2008.060848","volume":"7","author":"S. Goel","year":"2008","unstructured":"S. Goel, R. Negi, Guaranteeing Secrecy using Artificial Noise. IEEE Trans. Wirel. Commun.7(6), 2180\u20132189 (2008). https:\/\/doi.org\/10.1109\/TWC.2008.060848.","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"1712_CR71","doi-asserted-by":"publisher","unstructured":"S. Goekceli, O. Cepheli, S. T. Basaran, G. K. Kurt, G. Dartmann, G. Ascheid, in 2017 IEEE Globecom Work. (GC Wkshps). How Effective is the Artificial Noise? Real-Time Analysis of a PHY Security Scenario, (2017), pp. 1\u20137. https:\/\/doi.org\/10.1109\/GLOCOMW.2017.8269228.","DOI":"10.1109\/GLOCOMW.2017.8269228"},{"key":"1712_CR72","unstructured":"Y. Z. Xiangyun Zhou, Lingyang Song, Physical Layer Security in Wireless Communications (CRC Press, 2005). isbn:9781466567009."},{"issue":"3","key":"1712_CR73","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"U. Maurer","year":"1993","unstructured":"U. Maurer, Secret key agreement by public discussion. IEEE Trans. Inf. Theory. 39(3), 733\u2013742 (1993).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1712_CR74","doi-asserted-by":"publisher","unstructured":"X. He, H. Dai, W. Shen, P. Ning, in 2013 Proc. IEEE INFOCOM. Is link signature dependable for wireless security? (2013), pp. 200\u2013204. https:\/\/doi.org\/10.1109\/INFCOM.2013.6566763.","DOI":"10.1109\/INFCOM.2013.6566763"},{"key":"1712_CR75","doi-asserted-by":"publisher","first-page":"4464","DOI":"10.1109\/ACCESS.2016.2604618","volume":"4","author":"J. Zhang","year":"2016","unstructured":"J. Zhang, R. Woods, T. Q. Duong, A. Marshall, Y. Ding, Y. Huang, Q. Xu, Experimental Study on Key Generation for Physical Layer Security in Wireless Communications. IEEE Access. 4:, 4464\u20134477 (2016). https:\/\/doi.org\/10.1109\/ACCESS.2016.2604618.","journal-title":"IEEE Access"},{"key":"1712_CR76","doi-asserted-by":"publisher","unstructured":"S. N. Premnath, P. L. Gowda, S. K. Kasera, N. Patwari, R. Ricci, Secret key extraction using Bluetooth wireless signal strength measurements. Elev. Annu. IEEE Int. Conf. Sensing, Commun. Netw., 293\u2013301 (2014). https:\/\/doi.org\/10.1109\/SAHCN.2014.6990365.","DOI":"10.1109\/SAHCN.2014.6990365"},{"key":"1712_CR77","doi-asserted-by":"publisher","unstructured":"G. Revadigar, C. Javali, H. J. Asghar, K. B. Rasmussen, S. Jha, Mobility Independent Secret Key Generation for Wearable Health-care Devices. Proc. 10th EAI Int. Conf. Body Area Netw. (2015). https:\/\/doi.org\/10.4108\/eai.28-9-2015.2261446.","DOI":"10.4108\/eai.28-9-2015.2261446"},{"key":"1712_CR78","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-33167-114","volume":"7459 LNCS","author":"S. Eberz","year":"2012","unstructured":"S. Eberz, M. Strohmeier, M. Wilhelm, I. Martinovic, A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols. Lect. Notes Comput. Sci. including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinforma.7459 LNCS:, 235\u2013252 (2012). https:\/\/doi.org\/10.1007\/978-3-642-33167-114.","journal-title":"Lect. Notes Comput. Sci. including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinforma."},{"key":"1712_CR79","doi-asserted-by":"publisher","unstructured":"S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik, in Proc. 14th ACM Int. Conf. Mob. Comput. Netw. - MobiCom \u201908. Radio-telepathy, (2008), p. 128. https:\/\/doi.org\/10.1145\/1409944.1409960.","DOI":"10.1145\/1409944.1409960"},{"issue":"12","key":"1712_CR80","doi-asserted-by":"publisher","first-page":"2164","DOI":"10.1109\/LAWP.2018.2869548","volume":"17","author":"M. I. AlHajri","year":"2018","unstructured":"M. I. AlHajri, N. T. Ali, R. M. Shubair, Classification of Indoor Environments for IoT Applications: A Machine Learning Approach. IEEE Antennas Wirel. Propag. Lett.17(12), 2164\u20132168 (2018). https:\/\/doi.org\/10.1109\/LAWP.2018.2869548.","journal-title":"IEEE Antennas Wirel. Propag. Lett."},{"key":"1712_CR81","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/ISVLSI.2017.69","volume-title":"2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI)","author":"A. P. Fournaris","year":"2017","unstructured":"A. P. Fournaris, K. Lampropoulos, O. Koufopavlou, in 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). Hardware Security for Critical Infrastructures - The CIPSEC Project Approach (IEEEBochum, Germany, 2017), pp. 356\u2013361. https:\/\/doi.org\/10.1109\/ISVLSI.2017.69."},{"key":"1712_CR82","doi-asserted-by":"publisher","unstructured":"H. Ju, Y. Jeon, J. Kim, in 2015 International Conference on Computational Science and Computational Intelligence (CSCI). A Study on the Hardware-Based Security Solutions for Smart Devices (IEEE, 2015), pp. 833\u2013834. https:\/\/doi.org\/10.1109\/CSCI.2015.105.","DOI":"10.1109\/CSCI.2015.105"},{"key":"1712_CR83","doi-asserted-by":"publisher","first-page":"1272","DOI":"10.1109\/SAI.2015.7237307","volume-title":"2015 Science and Information Conference (SAI)","author":"L. Karter","year":"2015","unstructured":"L. Karter, L. Ferhati, I. Tafa, D. Saatciu, J. Fejzaj, in 2015 Science and Information Conference (SAI). Security evaluation of embedded hardware implementation (IEEELondon, United Kingdom, 2015), pp. 1272\u20131276. https:\/\/doi.org\/10.1109\/SAI.2015.7237307."},{"key":"1712_CR84","unstructured":", in Presented as Part of the 6th USENIX Workshop on Offensive Technologies. Baseband attacks: remote exploitation of memory corruptions in cellular protocol stacks (USENIXBellevue, WA, 2012). https:\/\/www.usenix.org\/conference\/woot12\/workshop-program\/presentation\/Weinmann."},{"key":"1712_CR85","doi-asserted-by":"publisher","unstructured":"Y. Zou, J. Zhu, X. Wang, L. Hanzo, A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends, vol. 104, (2016). https:\/\/doi.org\/10.1109\/JPROC.2016.2558521.","DOI":"10.1109\/JPROC.2016.2558521"},{"issue":"10","key":"1712_CR86","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1109\/JPROC.2015.2466548","volume":"103","author":"A. Mukherjee","year":"2015","unstructured":"A. Mukherjee, Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints. Proc. IEEE. 103(10), 1747\u20131761 (2015). https:\/\/doi.org\/10.1109\/JPROC.2015.2466548.","journal-title":"Proc. IEEE"},{"issue":"3","key":"1712_CR87","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MSSC.2019.2923503","volume":"11","author":"M. Alioto","year":"2019","unstructured":"M. Alioto, Trends in Hardware Security: From basics to ASICs. IEEE Solid-State Circ. Mag.11(3), 56\u201374 (2019). https:\/\/doi.org\/10.1109\/MSSC.2019.2923503.","journal-title":"IEEE Solid-State Circ. Mag."},{"issue":"7","key":"1712_CR88","doi-asserted-by":"publisher","first-page":"2571","DOI":"10.1109\/TWC.2008.070194","volume":"7","author":"L. Xiao","year":"2008","unstructured":"L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, Using the physical layer for wireless authentication in time-variant channels. IEEE Trans. Wirel. Commun.7(7), 2571\u20132579 (2008). https:\/\/doi.org\/10.1109\/TWC.2008.070194.","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"1712_CR89","doi-asserted-by":"publisher","unstructured":"P. L. Yu, J. S. Baras, B. M. Sadler, Physical-layer authentication. IEEE Trans. Inf. Forensics Secur. (2008). https:\/\/doi.org\/10.1109\/TIFS.2007.916273.","DOI":"10.1109\/TIFS.2007.916273"},{"issue":"2","key":"1712_CR90","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1109\/TNET.2015.2391300","volume":"24","author":"J. Han","year":"2016","unstructured":"J. Han, C. Qian, P. Yang, D. Ma, Z. Jiang, W. Xi, J. Zhao, GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags. IEEE\/ACM Trans. Netw.24(2), 846\u2013858 (2016). https:\/\/doi.org\/10.1109\/TNET.2015.2391300.","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"1712_CR91","doi-asserted-by":"publisher","unstructured":"C. Pei, N. Zhang, X. S. Shen, J. W. Mark, Channel-based physical layer authentication, (2014). https:\/\/doi.org\/10.1109\/GLOCOM.2014.7037452.","DOI":"10.1109\/GLOCOM.2014.7037452"},{"issue":"1","key":"1712_CR92","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/TIFS.2011.2160170","volume":"7","author":"W. E. Cobb","year":"2012","unstructured":"W. E. Cobb, E. D. Laspe, R. O. Baldwin, M. A. Temple, Y. C. Kim, Intrinsic Physical-Layer Authentication of Integrated Circuits. IEEE Trans. Inf. Forensics Secur.7(1), 14\u201324 (2012). https:\/\/doi.org\/10.1109\/TIFS.2011.2160170.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"1712_CR93","doi-asserted-by":"publisher","first-page":"1658","DOI":"10.1109\/TCOMM.2014.032914.120921","volume":"62","author":"W. Hou","year":"2014","unstructured":"W. Hou, X. Wang, J. -Y. Chouinard, A. Refaey, Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets. IEEE Trans. Commun.62(5), 1658\u20131667 (2014). https:\/\/doi.org\/10.1109\/TCOMM.2014.032914.120921.","journal-title":"IEEE Trans. Commun."},{"issue":"6","key":"1712_CR94","doi-asserted-by":"publisher","first-page":"1180","DOI":"10.1109\/TIFS.2015.2400426","volume":"10","author":"D. R. Reising","year":"2015","unstructured":"D. R. Reising, M. A. Temple, J. A. Jackson, Authorized and Rogue Device Discrimination Using Dimensionally Reduced RF-DNA Fingerprints. IEEE Trans. Inf. Forensics Secur.10(6), 1180\u20131192 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2400426.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1712_CR95","doi-asserted-by":"publisher","first-page":"50524","DOI":"10.1109\/ACCESS.2019.2911452","volume":"7","author":"A. M. Ali","year":"2019","unstructured":"A. M. Ali, E. Uzundurukan, A. Kara, Assessment of Features and Classifiers for Bluetooth RF Fingerprinting. IEEE Access. 7:, 50524\u201350535 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2911452.","journal-title":"IEEE Access"},{"key":"1712_CR96","doi-asserted-by":"crossref","unstructured":"J. Jagannath, N. Polosky, A. Jagannath, F. Restuccia, T. Melodia, Machine Learning for Wireless Communications in the Internet of Things: A Comprehensive Survey, (2019). 1901.07947. https:\/\/doi.org\/10.1016\/j.adhoc.2019.101913.","DOI":"10.1016\/j.adhoc.2019.101913"},{"key":"1712_CR97","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/5629572","volume":"2019","author":"X. Li","year":"2019","unstructured":"X. Li, F. Dong, S. Zhang, W. Guo, A Survey on Deep Learning Techniques in Wireless Signal Recognition. Wirel. Commun. Mob. Comput.2019:, 1\u201312 (2019). https:\/\/doi.org\/10.1155\/2019\/5629572.","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"1712_CR98","unstructured":"C. Zhang, P. Patras, H. Haddadi, Deep learning in mobile and wireless networking: a survey. CoRR. abs\/1803.04311: (2018)."},{"issue":"6","key":"1712_CR99","doi-asserted-by":"publisher","first-page":"2578","DOI":"10.1109\/TCOMM.2016.2552165","volume":"64","author":"J. Zhang","year":"2016","unstructured":"J. Zhang, A. Marshall, R. Woods, T. Q. Duong, Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers. IEEE Trans. Commun.64(6), 2578\u20132588 (2016). https:\/\/doi.org\/10.1109\/TCOMM.2016.2552165.","journal-title":"IEEE Trans. Commun."},{"issue":"6","key":"1712_CR100","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MCOM.2015.7120011","volume":"53","author":"W. Trappe","year":"2015","unstructured":"W. Trappe, The challenges facing physical layer security. IEEE Commun. Mag.53(6), 16\u201320 (2015). https:\/\/doi.org\/10.1109\/MCOM.2015.7120011.","journal-title":"IEEE Commun. Mag."},{"key":"1712_CR101","doi-asserted-by":"publisher","unstructured":"P. Walther, C. Janda, E. Franz, M. Pelka, H. Hellbruck, T. Strufe, E. Jorswieck, in 2018 IEEE 43rd Conf. Local Comput. Networks, vol. 2018-Octob. Improving Quantization for Channel Reciprocity Based Key Generation, (2018), pp. 545\u2013552. https:\/\/doi.org\/10.1109\/LCN.2018.8638248.","DOI":"10.1109\/LCN.2018.8638248"},{"key":"1712_CR102","unstructured":"Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Cryptology ePrint Archive, Report 2003\/235, (2003). https:\/\/eprint.iacr.org\/2003\/235."},{"key":"1712_CR103","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.comnet.2016.06.014","volume":"109","author":"C. Huth","year":"2016","unstructured":"C. Huth, R. Guillaume, T. Strohm, P. Duplys, I. A. Samuel, T. G\u00fcneysu, Information reconciliation schemes in physical-layer security: a survey. Comput. Netw.109:, 84\u2013104 (2016). https:\/\/doi.org\/10.1016\/j.comnet.2016.06.014.","journal-title":"Comput. Netw."},{"key":"1712_CR104","doi-asserted-by":"publisher","unstructured":"U. Gustavsson, C. Sanchez-Perez, T. Eriksson, F. Athley, G. Durisi, P. Landin, K. Hausmair, C. Fager, L. Svensson, On the impact of hardware impairments on massive MIMO. 1:, 294\u2013300 (2014). https:\/\/doi.org\/10.1109\/GLOCOMW.2014.7063447.","DOI":"10.1109\/GLOCOMW.2014.7063447"},{"key":"1712_CR105","doi-asserted-by":"publisher","unstructured":"J. Samuel, P. Rosson, L. Maret, C. Dehos, A. Valkanas, in 2008 IEEE 10th Int. Symp. Spread Spectr. Tech. Appl.Impact of RF Impairments in Cellular Wireless Metropolitan Area Networks, (2008), pp. 766\u2013769. https:\/\/doi.org\/10.1109\/ISSSTA.2008.149.","DOI":"10.1109\/ISSSTA.2008.149"},{"key":"1712_CR106","doi-asserted-by":"publisher","unstructured":"Y. Zou, P. Zetterberg, U. Gustavsson, T. Svensson, A. Zaidi, T. Kadur, W. Rave, G. Fettweis, in 2016 IEEE Globecom Work. (GC Wkshps) (Ici). Impact of Major RF Impairments on mm-Wave Communications Using OFDM Waveforms, (2016), pp. 1\u20137. https:\/\/doi.org\/10.1109\/GLOCOMW.2016.7848927.","DOI":"10.1109\/GLOCOMW.2016.7848927"},{"key":"1712_CR107","doi-asserted-by":"publisher","unstructured":"A. C. Polak, S. Dolatshahi, D. L. Goeckel, Identifying wireless users via transmitter imperfections. IEEE J. Sel. Areas Commun. (2011). https:\/\/doi.org\/10.1109\/JSAC.2011.110812.","DOI":"10.1109\/JSAC.2011.110812"},{"key":"1712_CR108","doi-asserted-by":"publisher","unstructured":"Z. Li, L. Sun, L. Zhang, Y. Wang, Z. Yu, in 2014 IEEE Int. Conf. Electron Devices Solid-State Circuits. Effects of RF impairments on EVM performance of 802.11ac WLAN transmitters, (2014), pp. 1\u20132. https:\/\/doi.org\/10.1109\/EDSSC.2014.7061173.","DOI":"10.1109\/EDSSC.2014.7061173"},{"key":"1712_CR109","doi-asserted-by":"publisher","unstructured":"R. Stuhlberger, R. Krueger, B. Adler, J. Kissing, L. Maurer, G. Hueber, A. Springer, in 2007 Eur. Conf. Wirel. Technol. (October). LTE-Downlink Performance in the Presence of RF-Impairments, (2007), pp. 189\u2013192. https:\/\/doi.org\/10.1109\/ECWT.2007.4403978.","DOI":"10.1109\/ECWT.2007.4403978"},{"key":"1712_CR110","doi-asserted-by":"crossref","unstructured":"S. Salous, Radio propagation measurement and channel modelling (Wiley, 2013). isbn:978-0-470-75184-8.","DOI":"10.1002\/9781118502280"},{"key":"1712_CR111","unstructured":"B. Sklar, Digital Communications: Fundamentals and Applications, (Prentice Hall, 2017). isbn:978-0134724058."},{"key":"1712_CR112","doi-asserted-by":"publisher","first-page":"28137","DOI":"10.1109\/ACCESS.2018.2827925","volume":"6","author":"A. Albehadili","year":"2018","unstructured":"A. Albehadili, K. Al Shamaileh, A. Javaid, J. Oluoch, V. Devabhaktuni, An Upper Bound on PHY-Layer Key Generation for Secure Communications Over a Nakagami-M Fading Channel With Asymmetric Additive Noise. IEEE Access. 6:, 28137\u201328149 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2827925. Accessed 13 Jan 2020.","journal-title":"IEEE Access"},{"key":"1712_CR113","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1109\/ISCC.2015.7405513","volume":"48","author":"M. Patzold","year":"1999","unstructured":"M. Patzold, F. Laue, Level-Crossing Rate and Average Duration of Fades of Deterministic Simulation Models for Rice Fading Channels. IEEE Symp. Comput. Commun.48:, 272\u2013276 (1999). https:\/\/doi.org\/10.1109\/ISCC.2015.7405513.","journal-title":"IEEE Symp. Comput. Commun."},{"key":"1712_CR114","doi-asserted-by":"publisher","unstructured":"A. Abdi, K. Wills, H. A. Barger, M. -S. Alouini, M. Kaveh, Comparison of the level crossing rate and average fade duration of Rayleigh, Rice and Nakagami fading models with mobile channel data, 1850\u20131857 (2002). https:\/\/doi.org\/10.1109\/vetecf.2000.886139.","DOI":"10.1109\/vetecf.2000.886139"},{"issue":"4","key":"1712_CR115","doi-asserted-by":"publisher","first-page":"3142","DOI":"10.1109\/COMST.2018.2862141","volume":"20","author":"C. -X. Wang","year":"2018","unstructured":"C. -X. Wang, J. Bian, J. Sun, W. Zhang, M. Zhang, A Survey of 5G Channel Measurements and Models. IEEE Commun. Surv. Tutorials. 20(4), 3142\u20133168 (2018). https:\/\/doi.org\/10.1109\/COMST.2018.2862141.","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"9","key":"1712_CR116","doi-asserted-by":"publisher","first-page":"4780","DOI":"10.1109\/TAP.2014.2335812","volume":"62","author":"A. Meijerink","year":"2014","unstructured":"A. Meijerink, A. Molisch, On the physical interpretation of the Saleh-Valenzuela model and the definition of its power delay profiles. IEEE Trans. Antennas Propag.62(9), 4780\u20134793 (2014). https:\/\/doi.org\/10.1109\/TAP.2014.2335812.","journal-title":"IEEE Trans. Antennas Propag."},{"issue":"1","key":"1712_CR117","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/TVT.2013.2271956","volume":"63","author":"L. Bernado","year":"2014","unstructured":"L. Bernado, T. Zemen, F. Tufvesson, A. F. Molisch, C. F. Mecklenbrauker, Delay and doppler spreads of nonstationary vehicular channels for safety-relevant scenarios. IEEE Trans. Veh. Technol.63(1), 82\u201393 (2014). https:\/\/doi.org\/10.1109\/TVT.2013.2271956. 1305.3376.","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1712_CR118","doi-asserted-by":"publisher","unstructured":"G. Matz, F. Hlawatsch, Fundamentals of Time-Varying Communication Channels (Elsevier, 2011). isbn:9780123744838. https:\/\/doi.org\/10.1016\/B978-0-12-374483-8.00001-7. https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/B9780123744838000017.","DOI":"10.1016\/B978-0-12-374483-8.00001-7"},{"issue":"7","key":"1712_CR119","doi-asserted-by":"publisher","first-page":"1846","DOI":"10.1109\/TIT.2003.813507","volume":"49","author":"Y. C. Eldar","year":"2003","unstructured":"Y. C. Eldar, A. V. Oppenheim, MMSE whitening and subspace whitening. IEEE Trans. Inf. Theory. 49(7), 1846\u20131851 (2003). https:\/\/doi.org\/10.1109\/TIT.2003.813507.","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"12","key":"1712_CR120","doi-asserted-by":"publisher","first-page":"12462","DOI":"10.1109\/TVT.2018.2877201","volume":"67","author":"J. Zhang","year":"2018","unstructured":"J. Zhang, A. Marshall, L. Hanzo, Channel-Envelope Differencing Eliminates Secret Key Correlation: LoRa-Based Key Generation in Low Power Wide Area Networks. IEEE Trans. Veh. Technol.67(12), 12462\u201312466 (2018). https:\/\/doi.org\/10.1109\/TVT.2018.2877201.","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1712_CR121","doi-asserted-by":"publisher","unstructured":"Y. Huang, A. Rajkotia, S. Soliman, UWB Channel Estimation: Design and Performance Evaluation, vol. 4, (2006). https:\/\/doi.org\/10.1109\/VETECS.2006.1683189.","DOI":"10.1109\/VETECS.2006.1683189"},{"key":"1712_CR122","doi-asserted-by":"publisher","first-page":"10392","DOI":"10.1109\/ACCESS.2019.2891218","volume":"7","author":"V. Raghavan","year":"2019","unstructured":"V. Raghavan, J. Li, Evolution of Physical-Layer Communications Research in the Post-5G Era. IEEE Access. 7:, 10392\u201310401 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2891218.","journal-title":"IEEE Access"},{"issue":"4","key":"1712_CR123","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2015.7081071","volume":"53","author":"N. Yang","year":"2015","unstructured":"N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, M. D. Renzo, Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag.53(4), 20\u201327 (2015). https:\/\/doi.org\/10.1109\/MCOM.2015.7081071.","journal-title":"IEEE Commun. Mag."},{"key":"1712_CR124","doi-asserted-by":"crossref","unstructured":"X. Lin, J. Li, R. Baldemair, T. Cheng, S. Parkvall, D. Larsson, H. Koorapaty, M. Frenne, S. Falahati, A. Gr\u00f6vlen, K. Werner, 5G New Radio: Unveiling the Essentials of the Next Generation Wireless Access Technology, (2018). 1806.06898.","DOI":"10.1109\/MCOMSTD.001.1800036"},{"issue":"2","key":"1712_CR125","doi-asserted-by":"publisher","first-page":"1","DOI":"10.12676\/j.cc.2019.02.001","volume":"16","author":"Z. Chen","year":"2019","unstructured":"Z. Chen, X. Ma, B. Zhang, Y. Zhang, Z. Niu, N. Kuang, W. Chen, L. Li, S. Li, A survey on terahertz communications. China Commun.16(2), 1\u201335 (2019). https:\/\/doi.org\/10.12676\/j.cc.2019.02.001.","journal-title":"China Commun."},{"key":"1712_CR126","unstructured":"Fraunhofer-HHI, QUAsi Deterministic RadIo channel GenerAtor, (2019). https:\/\/quadriga-channel-model.de. Accessed 2019."},{"key":"1712_CR127","unstructured":"3GPP, Release 14, TR 38.901, Study on channel model for frequencies from 0.5 to 100 GHz, (2017). https:\/\/portal.3gpp.org\/desktopmodules\/Specifications. Accessed 2019."},{"issue":"1","key":"1712_CR128","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/COMST.2017.2766698","volume":"20","author":"Y. Cai","year":"2018","unstructured":"Y. Cai, Z. Qin, F. Cui, G. Y. Li, J. A. McCann, Modulation and Multiple Access for 5G Networks. IEEE Commun. Surv. Tutor.20(1), 629\u2013646 (2018). https:\/\/doi.org\/10.1109\/COMST.2017.2766698.","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1712_CR129","unstructured":"Wired, The Biggest iPhone News Is a Tiny New Chip Inside It, (2019). https:\/\/www.wired.com\/story\/apple-u1-chip. Accessed 2019."},{"issue":"4","key":"1712_CR130","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/TVT.2008.2004555","volume":"58","author":"T. Hwang","year":"2008","unstructured":"T. Hwang, C. Yang, G. Wu, S. Li, Y. G. Li, OFDM and Its Wireless Applications: A Survey. IEEE Trans. Veh. Technol.58(4), 1673\u20131694 (2008). https:\/\/doi.org\/10.1109\/tvt.2008.2004555.","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"1712_CR131","doi-asserted-by":"publisher","first-page":"2114","DOI":"10.1109\/TVT.2016.2571264","volume":"66","author":"J. Zhang","year":"2017","unstructured":"J. Zhang, A. Marshall, R. Woods, T. Q. Duong, Design of an OFDM Physical Layer Encryption Scheme. IEEE Trans. Veh. Technol.66(3), 2114\u20132127 (2017). https:\/\/doi.org\/10.1109\/TVT.2016.2571264.","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1712_CR132","doi-asserted-by":"publisher","unstructured":"J. M. Hamamreh, H. M. Furqan, H. Arslan, in 2017 13th Int. Wirel. Commun. Mob. Comput. Conf.Secure pre-coding and post-coding for OFDM systems along with hardware implementation, (2017), pp. 1338\u20131343. https:\/\/doi.org\/10.1109\/IWCMC.2017.7986479.","DOI":"10.1109\/IWCMC.2017.7986479"},{"key":"1712_CR133","doi-asserted-by":"publisher","unstructured":"J. Zhang, T. Q. Duong, R. Woods, A. Marshall, Securing wireless communications of the internet of things from the physical layer, an overview, (2017). https:\/\/doi.org\/10.3390\/e19080420.","DOI":"10.3390\/e19080420"},{"key":"1712_CR134","doi-asserted-by":"publisher","unstructured":"H. Taha, E. Alsusa, in 2015 IEEE Glob. Commun. Conf.Physical Layer Secret Key Exchange Using Phase Randomization in MIMO-OFDM, (2015), pp. 1\u20136. https:\/\/doi.org\/10.1109\/GLOCOM.2015.7417210.","DOI":"10.1109\/GLOCOM.2015.7417210"},{"issue":"4","key":"1712_CR135","doi-asserted-by":"publisher","first-page":"1891","DOI":"10.1109\/COMST.2014.2320074","volume":"16","author":"Y. Liu","year":"2014","unstructured":"Y. Liu, Z. Tan, H. Hu, L. J. Cimini, G. Y. Li, Channel estimation for OFDM. IEEE Commun. Surv. Tutorials. 16(4), 1891\u20131908 (2014). https:\/\/doi.org\/10.1109\/COMST.2014.2320074.","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"1712_CR136","doi-asserted-by":"publisher","unstructured":"J. Hejselbaek, W. Fan, G. F. Pedersen, Ultrawideband VNA based channel sounding system for centimetre and millimetre wave bands. IEEE Int. Symp. Pers. Indoor Mob. Radio Commun. PIMRC (2016). https:\/\/doi.org\/10.1109\/PIMRC.2016.7794728.","DOI":"10.1109\/PIMRC.2016.7794728"},{"key":"1712_CR137","doi-asserted-by":"publisher","unstructured":"S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, S. V. Krishnamurthy, in Proc. 15th Annu. Int. Conf. Mob. Comput. Netw. - MobiCom \u201909. On the effectiveness of secret key extraction from wireless signal strength in real environments, (2009), p. 321. https:\/\/doi.org\/10.1145\/1614320.1614356.","DOI":"10.1145\/1614320.1614356"},{"key":"1712_CR138","doi-asserted-by":"publisher","unstructured":"Q. Wang, H. Su, K. Ren, K. Kim, in Proc. IEEE INFOCOM. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks, (2011), pp. 1422\u20131430. https:\/\/doi.org\/10.1109\/INFCOM.2011.5934929.","DOI":"10.1109\/INFCOM.2011.5934929"},{"issue":"4","key":"1712_CR139","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MWC.2011.5999759","volume":"18","author":"K. Ren","year":"2011","unstructured":"K. Ren, H. Su, Q. Wang, Secret key generation exploiting channel characteristics in wireless communications. IEEE Wirel. Commun.18(4), 6\u201312 (2011). https:\/\/doi.org\/10.1109\/MWC.2011.5999759.","journal-title":"IEEE Wirel. Commun."},{"key":"1712_CR140","doi-asserted-by":"publisher","unstructured":"S. M. MirhoseiniNejad, A. Rahmanpour, S. M. Razavizadeh, in 2018 15th Int. ISC (Iranian Soc. Cryptology) Conf. Inf. Secur. Cryptol.Phase Jamming Attack: A Practical Attack on Physical layer-Based Key Derivation, (2018), pp. 1\u20134. https:\/\/doi.org\/10.1109\/ISCISC.2018.8546920.","DOI":"10.1109\/ISCISC.2018.8546920"},{"key":"1712_CR141","unstructured":"E. M. Vitucci, F. Mani, T. Mazloum, A. Sibille, V. D. Esposti, Ray Tracing simulations of indoor channel spatial correlation for Physical Layer Security, (2015)."},{"key":"1712_CR142","doi-asserted-by":"publisher","unstructured":"J. Xiong, K. Jamieson, in Proc. 19th Annu. Int. Conf. Mob. Comput. Netw. - MobiCom \u201913. SecureArray, (2013), p. 441. https:\/\/doi.org\/10.1145\/2500423.2500444.","DOI":"10.1145\/2500423.2500444"},{"key":"1712_CR143","doi-asserted-by":"publisher","unstructured":"P. Sedlacek, M. Slanina, P. Masek, An Overview of the IEEE 802.15.4z Standard its Comparison and to the Existing UWB Standards, (2019). https:\/\/doi.org\/10.1109\/RADIOELEK.2019.8733537.","DOI":"10.1109\/RADIOELEK.2019.8733537"},{"issue":"2","key":"1712_CR144","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1109\/COMST.2016.2634593","volume":"19","author":"V. Niemela","year":"2017","unstructured":"V. Niemela, J. Haapola, M. Hamalainen, J. Iinatti, An Ultra Wideband Survey: Global Regulations and Impulse Radio Research Based on Standards. IEEE Commun. Surv. Tutor.19(2), 874\u2013890 (2017). https:\/\/doi.org\/10.1109\/COMST.2016.2634593.","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"8","key":"1712_CR145","doi-asserted-by":"publisher","first-page":"2106","DOI":"10.1109\/TIM.2017.2681398","volume":"66","author":"J. A. R. Ruiz","year":"2017","unstructured":"J. A. R. Ruiz, S. F. Granja, Comparing Ubisense, BeSpoon, and DecaWave UWB Location Systems: Indoor Performance Analysis. IEEE Trans. Instrum. Meas.66(8), 2106\u20132117 (2017). https:\/\/doi.org\/10.1109\/TIM.2017.2681398.","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"2","key":"1712_CR146","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1109\/COMST.2016.2632427","volume":"19","author":"A. Yassin","year":"2017","unstructured":"A. Yassin, Y. Nasser, M. Awad, A. Al-Dubai, R. Liu, C. Yuen, R. Raulefs, E. Aboutanios, Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications. IEEE Commun. Surv. Tutor.19(2), 1327\u20131346 (2017). https:\/\/doi.org\/10.1109\/COMST.2016.2632427.","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1712_CR147","doi-asserted-by":"publisher","unstructured":"M. Ko, D. L. Goeckel, Wireless physical-layer security performance of UWB systems, (2010). https:\/\/doi.org\/10.1109\/MILCOM.2010.5680483.","DOI":"10.1109\/MILCOM.2010.5680483"},{"key":"1712_CR148","doi-asserted-by":"publisher","unstructured":"M. Singh, P. Leu, S. Capkun, UWB with Pulse Reordering: Securing Ranging against Relay and Physical-Layer Attacks. Proc. 2019 Netw. Distrib. Syst. Secur. Symp. (2019). https:\/\/doi.org\/10.14722\/ndss.2019.23109.","DOI":"10.14722\/ndss.2019.23109"},{"key":"1712_CR149","doi-asserted-by":"publisher","unstructured":"M. G. Madiseh, M. L. McGuire, S. W. Neville, A. A. B. Shirazi, in Proc. 6th Annu. Commun. Networks Serv. Res. Conf. CNSR 2008. Secret key extraction in ultra wideband channels for unsynchronized radios, (2008). https:\/\/doi.org\/10.1109\/CNSR.2008.52.","DOI":"10.1109\/CNSR.2008.52"},{"key":"1712_CR150","doi-asserted-by":"publisher","unstructured":"G. M. Madiseh, S. He, M. L. Mcguire, S. W. Neville, X. Dong, Verification of Secret Key Generation from UWB Channel Observations, (2009). https:\/\/doi.org\/10.1109\/ICC.2009.5199564.","DOI":"10.1109\/ICC.2009.5199564"},{"issue":"3","key":"1712_CR151","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1109\/TIFS.2007.902666","volume":"2","author":"R. Wilson","year":"2007","unstructured":"R. Wilson, D. Tse, R. A. Scholtz, Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels. IEEE Trans. Inf. Forensics Secur.2(3), 364\u2013375 (2007). https:\/\/doi.org\/10.1109\/TIFS.2007.902666.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1712_CR152","doi-asserted-by":"publisher","unstructured":"M. Bulenok, I. Tunaru, L. Biard, B. Denis, B. Uguen, Experimental channel-based secret key generation with integrated ultra wideband devices, (2016). https:\/\/doi.org\/10.1109\/PIMRC.2016.7794705.","DOI":"10.1109\/PIMRC.2016.7794705"},{"key":"1712_CR153","doi-asserted-by":"publisher","unstructured":"R. Muller, R. Herrmann, D. A. Dupleich, C. Schneider, R. S. Thoma, in 8th Eur. Conf. Antennas Propag. (EuCAP 2014). Ultrawideband multichannel sounding for mm-wave, (2014), pp. 817\u2013821. https:\/\/doi.org\/10.1109\/EuCAP.2014.6901887.","DOI":"10.1109\/EuCAP.2014.6901887"},{"key":"1712_CR154","first-page":"277","volume":"6","author":"T. Kuseler","year":"2012","unstructured":"T. Kuseler, I. A. Lami, Using Geographical Location as an Authentication Factor to Enhance mCommerce Applications on Smartphones. Int. J. Comput. Sci. Secur.6:, 277\u2013287 (2012).","journal-title":"Int. J. Comput. Sci. Secur."},{"key":"1712_CR155","doi-asserted-by":"publisher","unstructured":"S. T. -B. Hamida, J. -B. Pierrot, B. Denis, C. Castelluccia, B. Uguen, On the Security of UWB Secret Key Generation Methods against Deterministic Channel Prediction Attacks, (2012). https:\/\/doi.org\/10.1109\/VTCFall.2012.6399358.","DOI":"10.1109\/VTCFall.2012.6399358"},{"key":"1712_CR156","doi-asserted-by":"crossref","unstructured":"L. E. Bassham, et al., NIST. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22, (2010). https:\/\/www.nist.gov\/publications\/statistical-test-suite-random-and-pseudorandom-number-generators-cryptographic. Accessed 2019.","DOI":"10.6028\/NIST.SP.800-22r1a"},{"key":"1712_CR157","unstructured":"M. S. Turan, et al., NIST: Recommendation for the Entropy Sources Used for Random Bit Generation, NIST Special Publication 800-90B, (2018). https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-90b\/final. Accessed 2019."},{"issue":"5","key":"1712_CR158","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1109\/TIFS.2017.2656473","volume":"12","author":"H. Okada","year":"2017","unstructured":"H. Okada, K. Umeno, Randomness Evaluation With the Discrete Fourier Transform Test Based on Exact Analysis of the Reference Distribution. IEEE Trans. Inf. Forensics Secur.12(5), 1218\u20131226 (2017). https:\/\/doi.org\/10.1109\/TIFS.2017.2656473. arXiv:1701.01960v1.","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1712_CR159","unstructured":"J. Kelsey, K. A. McKay, M. S. Turan, Predictive Models for Min-Entropy Estimation. Cryptology ePrint Archive, Report 2015\/600, (2015). https:\/\/eprint.iacr.org\/2015\/600."},{"key":"1712_CR160","doi-asserted-by":"publisher","first-page":"151","DOI":"10.13154\/tosc.v2017.i3.151-168","volume":"3","author":"S. Zhu","year":"2017","unstructured":"S. Zhu, Y. Ma, T. Chen, J. Lin, J. Jing, Analysis and improvement of entropy estimators in NIST SP 800-90B for non-IID entropy sources. IACR Trans. Symmetric Cryptol.3:, 151\u2013168 (2017). https:\/\/doi.org\/10.13154\/tosc.v2017.i3.151-168.","journal-title":"IACR Trans. Symmetric Cryptol."},{"issue":"7","key":"1712_CR161","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1109\/JSAC.2015.2430191","volume":"33","author":"T. Van Nguyen","year":"2015","unstructured":"T. Van Nguyen, Y. Jeong, H. Shin, M. Z. Win, Machine Learning for Wideband Localization. IEEE J. Sel. Areas Commun.33(7), 1357\u20131380 (2015). https:\/\/doi.org\/10.1109\/JSAC.2015.2430191.","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"12","key":"1712_CR162","doi-asserted-by":"publisher","first-page":"2164","DOI":"10.1109\/LAWP.2018.2869548","volume":"17","author":"M. I. AlHajri","year":"2018","unstructured":"M. I. AlHajri, N. T. Ali, R. M. Shubair, Classification of Indoor Environments for IoT Applications: A Machine Learning Approach. IEEE Antennas Wirel. Propag. Lett.17(12), 2164\u20132168 (2018). https:\/\/doi.org\/10.1109\/LAWP.2018.2869548.","journal-title":"IEEE Antennas Wirel. Propag. Lett."},{"key":"1712_CR163","doi-asserted-by":"publisher","unstructured":"E. Kurniawan, L. Zhiwei, S. Sun, in 2017 IEEE Glob. Commun. Conf. GLOBECOM 2017 - Proc. vol. 2018-Janua. Machine Learning-Based Channel Classification and Its Application to IEEE 802.11ad Communications, (2018), pp. 1\u20136. https:\/\/doi.org\/10.1109\/GLOCOM.2017.8254052.","DOI":"10.1109\/GLOCOM.2017.8254052"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01712-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-020-01712-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01712-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T20:13:17Z","timestamp":1666815197000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-020-01712-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,5]]},"references-count":163,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["1712"],"URL":"https:\/\/doi.org\/10.1186\/s13638-020-01712-6","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,5]]},"assertion":[{"value":"6 November 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"114"}}