{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T18:12:34Z","timestamp":1762020754825,"version":"build-2065373602"},"reference-count":43,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2020,2,1]]},"DOI":"10.1587\/transinf.2019ini0001","type":"journal-article","created":{"date-parts":[[2020,1,31]],"date-time":"2020-01-31T22:09:57Z","timestamp":1580508597000},"page":"230-238","source":"Crossref","is-referenced-by-count":5,"title":["A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks"],"prefix":"10.1587","volume":"E103.D","author":[{"given":"Qiuhua","family":"WANG","sequence":"first","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University"}]},{"given":"Mingyang","family":"KANG","sequence":"additional","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University"}]},{"given":"Guohua","family":"WU","sequence":"additional","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University"}]},{"given":"Yizhi","family":"REN","sequence":"additional","affiliation":[{"name":"School of Cyberspace, Hangzhou Dianzi University"}]},{"given":"Chunhua","family":"SU","sequence":"additional","affiliation":[{"name":"Division of Computer Science, University of Aizu"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] A. Mazin, K. Davaslioglu, and R.D. Gitlin, \u201cSecure key management for 5G physical layer security,\u201d in proc. of IEEE 18th Wireless &amp; Microwave Technology Conference, pp.1-5, 2017. 10.1109\/wamicon.2017.7930246","DOI":"10.1109\/WAMICON.2017.7930246"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, \u201cRadio-telepathy: extracting a secret key from an unauthenticated wireless channel,\u201d in Proc. of 14th ACM international conference on Mobile computing and networking (MobiCom), pp.128-139, 2008. 10.1145\/1409944.1409960","DOI":"10.1145\/1409944.1409960"},{"key":"3","unstructured":"[3] Y.E.H. Shehadeh, O. Alfandi, K. Tout, and D. Hogrefe, \u201cIntelligent mechanisms for key generation from multipath wireless channels,\u201d in proc. of IEEE Wireless Telecommunications Symposium (WTS), pp.1-6, 2011. 10.1109\/wts.2011.5960848"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] S. Mathur, R. Miller, A. Varshavsky, W. Trappe, and N. Mandayam, \u201cProximate: proximity-based secure pairing using ambient wireless signals,\u201d in Proc. of the 9th ACM international conference on Mobile systems, applications, and services (MobiSys), pp.211-224, 2011. 10.1145\/1999995.2000016","DOI":"10.1145\/1999995.2000016"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] Q. Wang, K. Xu, and K. Ren, \u201cCooperative secret key generation from phase estimation in narrowband fading channels,\u201d IEEE J. Sel. Areas Commun., vol.30, no.9, pp.1666-1674, Sept. 2012. 10.1109\/jsac.2012.121010","DOI":"10.1109\/JSAC.2012.121010"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] F. Marino, E. Paolini, and M. Chiani, \u201cSecret key extraction from a UWB channel: analysis in a real environment,\u201d in proc. of IEEE International Conference on Ultra-WideBand (ICUWB), pp.80-85, 2014. 10.1109\/icuwb.2014.6958955","DOI":"10.1109\/ICUWB.2014.6958955"},{"key":"7","unstructured":"[7] M.G. Madiseh, S. He, M.L. Mcguire, S.W. Neville, and X. Dong, \u201cVerification of secret key generation from UWB channel observations,\u201d in Proc. of IEEE International Conference on Communications (ICC), pp.1-5, 2009. 10.1109\/icc.2009.5199564"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] S.T.B. Hamida, J.-B. Pierrot, and C. Castelluccia, \u201cAn Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements,\u201d in Proc. of 3rd International Conference on New Technologies, Mobility and Security (NTMS), pp.1-5, 2009. 10.1109\/ntms.2009.5384826","DOI":"10.1109\/NTMS.2009.5384826"},{"key":"9","unstructured":"[9] J. Huang and T. Jiang, \u201cDynamic secret key generation exploiting Ultra-wideband wireless channel characteristics,\u201d in Proc. of IEEE Wireless Commun. and Networking Conference (WCNC), pp.1701-1706, 2015. 10.1109\/wcnc.2015.7127724"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N. Patwari, and S.V. Krishnamurthy, \u201cOn the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments,\u201d in Proc. of 15th ACM international conference on Mobile computing and networking (MobiCom) MobiCom, pp.321-332, 2009. 10.1145\/1614320.1614356","DOI":"10.1145\/1614320.1614356"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] S.N. Premnath, S. Jana, J. Croft, P.L. Gowda, M. Clark, S.K. Kasera, N. Patwari, and S.V. Krishnamurthy, \u201cSecret key extraction from wireless signal strength in real environments,\u201d IEEE Trans. Mobile Comput., vol.12, no.5, pp.917-930, May 2013. 10.1109\/tmc.2012.63","DOI":"10.1109\/TMC.2012.63"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] R. Guillaume, F. Winzer, A. Czylwik, C.T. Zenger, and C. Paar, \u201cBringing PHY-based Key Generation into the Field: An Evaluation for Practical Scenarios,\u201d in Proc. of 82nd IEEE Vehicular Technology Conference (VTC Fall), Boston, MA, USA, pp.1-5, 2015. 10.1109\/vtcfall.2015.7390857","DOI":"10.1109\/VTCFall.2015.7390857"},{"key":"13","unstructured":"[13] H. Liu, J. Yang, Y. Wang, and Y. Chen, \u201cCollaborative secret key extraction leveraging received signal strength in mobile wireless networks,\u201d in Proc. of 31st IEEE International Conference on Computer Communications (INFOCOM), Orlando, FL, USA, pp.927-935, 2012. 10.1109\/infcom.2012.6195843"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] H. Liu, Y. Jie, W. Yan, Y.J. Chen, and C.E. Koksal, \u201cGroup secret key generation via received signal strength: Protocols, achievable rates, and implementation,\u201d IEEE Trans. Mobile Comput., vol.13, no.12, pp.2820-2835, 2014. 10.1109\/tmc.2014.2310747","DOI":"10.1109\/TMC.2014.2310747"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] Q. Dai, J. Liang, and K. Huang, \u201cAdaptive key generation based on quantization of channel characteristics\u201d in proc. of IEEE International Conference on Information Science and Technology (ICIST), pp.1512-1517, 2013. 10.1109\/icist.2013.6747824","DOI":"10.1109\/ICIST.2013.6747824"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] B. Zan, M. Gruteser, and F. Hu, \u201cImproving robustness of key extraction from wireless channels with differential techniques,\u201d in Proc. of International Conference on Computing, Networking and Communications (ICNC), pp.980-984, 2012. 10.1109\/iccnc.2012.6167572","DOI":"10.1109\/ICCNC.2012.6167572"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] R. Guillaume, S. Ludwig, A. Muller, and A. Czylwik, \u201cSecret key generation from static channels with untrusted relays,\u201d in proc. of IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp.635-642, 2015. 10.1109\/wimob.2015.7348022","DOI":"10.1109\/WiMOB.2015.7348022"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] H. Liu, Y. Wang, J. Yang, and Y. Chen, \u201cFast and practical secret key extraction by exploiting channel response,\u201d in Proc. of IEEE International Conference on Computer Communications (INFOCOM), pp.3048-3056, 2013. 10.1109\/infcom.2013.6567117","DOI":"10.1109\/INFCOM.2013.6567117"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] K. Zeng, D. Wu, A. Chan, and P. Mohapatra, \u201cExploiting multiple-antenna diversity for shared secret key generation in wireless networks,\u201d in Proc. of IEEE International Conference on Computer Communications (INFOCOM), pp.1-9, 2010. 10.1109\/infcom.2010.5462004","DOI":"10.1109\/INFCOM.2010.5462004"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] C. Zenger, J. Zimmer, and C. Paar, \u201cSecurity Analysis of Quantization Schemes for Channel-based Key Extraction,\u201d in Proc. of Workshop on wireless communication security at the physical layer (WiComSec-Phy), Coimbra, Portugal, pp.267-272, 2015. 10.4108\/eai.22-7-2015.2260194","DOI":"10.4108\/eai.22-7-2015.2260194"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin. \u201cExperimental quantum cryptography,\u201d Journal of cryptology, vol.5, no.1, pp.3-28, 1992. 10.1007\/bf00191318","DOI":"10.1007\/BF00191318"},{"key":"22","unstructured":"[22] T. Sugimoto and K. Yamazaki, \u201cA study on secret key reconciliation protocol \u201cCascade\u201d,\u201d IEICE Trans. Fundamentals, vol.83, no.10, pp.1987-1991, Oct. 2000."},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] W.T. Buttler, S.K. Lamoreaux, J.R. Torgerson, G.H. Nickel, C.H. Donahue, and C.G. Peterson, \u201cFast, efficient error reconciliation for quantum cryptography,\u201d Physical Review A, vol.67, no.5, pp.125-128, May 2003. 10.1103\/physreva.67.052303","DOI":"10.1103\/PhysRevA.67.052303"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] Q. Wang, X. Wang, Q. Lv, X. Ye, Y. Luo, and L. You, \u201cAnalysis of the information theoretically secret key agreement by public discussion,\u201d Security and Communication Networks, vol.8, no.15, pp.2507-2523, Oct. 2015. 10.1002\/sec.1192","DOI":"10.1002\/sec.1192"},{"key":"25","unstructured":"[25] Q. Wang, X. Wang, Q. Lv, X. Ye, L. You, and R. Zeng, \u201cA new information reconciliation protocol in information theoretically secret key agreement,\u201d Journal of Computational Information Systems, vol.10, no.21, pp.9413-9420, Nov. 2014."},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] C.H. Bennett, G. Brassard, C. Cr\u00e9peau, and U. Maurer, \u201cGeneralized privacy amplification,\u201d IEEE Trans. Inf. Theory, vol.41, no.6, pp.1915-1923, June 1995. 10.1109\/18.476316","DOI":"10.1109\/18.476316"},{"key":"27","doi-asserted-by":"publisher","unstructured":"[27] J.E. Hershey, A.A. Hassan, and R. Yarlagadda, \u201cUnconventional cryptographic keying variable management,\u201d IEEE Trans. Commun., vol.43, no.1. pp.3-6, 1995. 10.1109\/26.385951","DOI":"10.1109\/26.385951"},{"key":"28","doi-asserted-by":"publisher","unstructured":"[28] J. Zhang, T.Q. Duong, A. Marshall, and R. Woods, \u201cKey Generation from Wireless Channels: A Review,\u201d IEEE Access, vol.4, pp.614-626, 2016. 10.1109\/access.2016.2521718","DOI":"10.1109\/ACCESS.2016.2521718"},{"key":"29","doi-asserted-by":"crossref","unstructured":"[29] J. Zhang, A. Marshall, R. Woods, and T.Q. Duong, \u201cSecure key generation from OFDM subcarriers&apos; channel responses,\u201d in proc. of IEEE Globecom Workshops, pp.1302-1307, 2014. 10.1109\/glocomw.2014.7063613","DOI":"10.1109\/GLOCOMW.2014.7063613"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] J. Zhang, R. Woods, A. Marshall, and T.Q. Duong, \u201cVerification of Key Generation from Individual OFDM Subcarrier&apos;s Channel Response,\u201d in proc. of IEEE Globecom Workshops, pp.1-6, 2016. 10.1109\/glocomw.2015.7414111","DOI":"10.1109\/GLOCOMW.2015.7414111"},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] A. Kitaura, H. Iwai, and H. Sasaoka, \u201cA scheme of secret key agreement based on received signal strength variation by antenna switching in land mobile radio,\u201d in proc. of the 9th International Conference on Advanced Communication Technology, pp.1763-1767, 2007. 10.1109\/icact.2007.358712","DOI":"10.1109\/ICACT.2007.358712"},{"key":"32","doi-asserted-by":"publisher","unstructured":"[32] M. Wilhelm, I. Martinovic, and J.B. Schmitt, \u201cSecure key generation in sensor networks based on frequency-selective channels,\u201d IEEE J. Sel. Areas Commun., vol.31, no.9, pp.1779-1790, 2013. 10.1109\/jsac.2013.130911","DOI":"10.1109\/JSAC.2013.130911"},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] P. Huang and X. Wang, \u201cFast secret key generation in static wireless networks: A virtual channel approach,\u201d in Proc. of 32nd IEEE Int. Conf. Comput. Commun. (INFOCOM), Turin, Italy, pp.2292-2300, April 2013. 10.1109\/infcom.2013.6567033","DOI":"10.1109\/INFCOM.2013.6567033"},{"key":"34","doi-asserted-by":"publisher","unstructured":"[34] T. Shimizu, H. Iwai, and H. Sasaoka, \u201cPhysical-layer secret key agreement in two-way wireless relaying systems,\u201d IEEE Trans. Inf. Forensics Security, vol.6, no.3, pp.650-660, 2011. 10.1109\/tifs.2011.2147314","DOI":"10.1109\/TIFS.2011.2147314"},{"key":"35","doi-asserted-by":"publisher","unstructured":"[35] L. Lai, Y. Liang, and W. Du, \u201cCooperative key generation in wireless networks,\u201d IEEE J. Sel. Areas Commun., vol.30, no.8, pp.1578-1588, 2012. 10.1109\/jsac.2012.120924","DOI":"10.1109\/JSAC.2012.120924"},{"key":"36","unstructured":"[36] S. Yasukawa, H. Iwai, and H. Sasaoka, \u201cA secret key agreement scheme with multi-level quantization and parity check using fluctuation of radio channel property,\u201d in IEEE International Symposium on Information Theory, pp.732-736, 2008. 10.1109\/isit.2008.4595083"},{"key":"37","doi-asserted-by":"publisher","unstructured":"[37] U.M. Maurer, \u201cSecret key agreement by public discussion from common information,\u201d IEEE Trans. Inf. Theory, vol.39, no.3, pp.733-742, 1993. 10.1109\/18.256484","DOI":"10.1109\/18.256484"},{"key":"38","doi-asserted-by":"publisher","unstructured":"[38] M.G. Madiseh, S.W. Neville, and M.L. McGuire, \u201cApplying beamforming to address temporal correlation in wireless channel characterization-based secret key generation,\u201d IEEE Trans. Inf. Forensics Security, vol.7, no.4, pp.1278-1287, 2012. 10.1109\/tifs.2012.2195176","DOI":"10.1109\/TIFS.2012.2195176"},{"key":"39","doi-asserted-by":"crossref","unstructured":"[39] S. Gollakota and D. Katabi, \u201cPhysical layer wireless security made fast and channel independent,\u201d in Proc. of 30th IEEE Int. Conf. Comput. Commun. (INFOCOM), Shanghai, China, pp.1125-1133, April 2011. 10.1109\/infcom.2011.5934889","DOI":"10.1109\/INFCOM.2011.5934889"},{"key":"40","doi-asserted-by":"publisher","unstructured":"[40] D. Chen, Z. Qin, X. Mao, P. Yang, Z. Qin, and R. Wang, \u201cSmokegrenade: An efficient key generation protocol with artificial interference,\u201d IEEE Trans. Inf. Forensics Security, vol.8, no.11, pp.1731-1745, 2013. 10.1109\/tifs.2013.2278834","DOI":"10.1109\/TIFS.2013.2278834"},{"key":"41","doi-asserted-by":"publisher","unstructured":"[41] K. Zeng, \u201cPhysical layer key generation in wireless networks: challenges and opportunities,\u201d IEEE Commun. Mag., vol.53, no.6, pp.33-39, 2015. 10.1109\/mcom.2015.7120014","DOI":"10.1109\/MCOM.2015.7120014"},{"key":"42","doi-asserted-by":"publisher","unstructured":"[42] A. Khisti, \u201cSecret-Key Agreement Over Non-Coherent Block-Fading Channels With Public Discussion,\u201d IEEE Trans. Inf. Theory, vol.62, no.12, pp.7164-7178, 2016. 10.1109\/tit.2016.2618861","DOI":"10.1109\/TIT.2016.2618861"},{"key":"43","doi-asserted-by":"publisher","unstructured":"[43] S. Zhang, L. Jin, Y. Lou, and Z. Zhong, \u201cSecret key generation based on two-way randomness for TDD-SISO system,\u201d China Communications, vol.15, no.7, pp.202-216, 2018. 10.1109\/cc.2018.8424614","DOI":"10.1109\/CC.2018.8424614"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/2\/E103.D_2019INI0001\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T03:27:10Z","timestamp":1580527630000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E103.D\/2\/E103.D_2019INI0001\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,1]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2019ini0001","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"type":"print","value":"0916-8532"},{"type":"electronic","value":"1745-1361"}],"subject":[],"published":{"date-parts":[[2020,2,1]]}}}