{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T17:28:22Z","timestamp":1771003702628,"version":"3.50.1"},"reference-count":22,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computational Methods in Sciences and Engineering"],"published-print":{"date-parts":[[2023,7]]},"abstract":"<jats:p>Third-party eavesdropping is a unsolved problem in the process of data transmission in the physical layer of IoT (Internet of Things) in Power Systems. The security encryption effect is affected by channel noise and the half-duplex nature of the wireless channel, which leads to low key consistency and key generation rate. To address this problem, a reliable solution for physical layer communication security is proposed in this paper. First, the solution improved the key consistency by dynamically adjusting the length of the training sequence during feature extraction; Second, using an iterative quantization method to quantify the RSS (Received Signal Strength) measurements to improve generation rate of the key. Finally, based on the short-time energy method for the extraction of wireless frame interval features, by monitoring the change of inter-frame interval features, we can quickly determine whether there is an eavesdropping device into the link. Simulation results show that the reciprocity of legitimate channels R (R will be explained in detail in the following) is improved by 0.1, the key generation rate is increased by about 70%, and the beacon frames are extracted from the wireless link with good results compared to the methods that do not use dynamic adjustment of the pilot signal during the channel probing phase. The result shows that this method can effectively prevents third-party eavesdropping, effectively improves the key consistency and generation rate, and effectively implements beacon frame detection.<\/jats:p>","DOI":"10.3233\/jcm-226746","type":"journal-article","created":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T13:32:09Z","timestamp":1683898329000},"page":"1883-1895","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Research on security encryption mechanism of physical Layer based on iterative quantization method"],"prefix":"10.1177","volume":"23","author":[{"given":"Weizhe","family":"Jing","sequence":"first","affiliation":[{"name":"State Grid Shanxi Electric Power Research Institute, Taiyuan, Shanxi, China"}]},{"given":"Dongjuan","family":"Ma","sequence":"additional","affiliation":[{"name":"State Grid Shanxi Electric Power Research Institute, Taiyuan, Shanxi, China"}]},{"given":"Hua","family":"Yang","sequence":"additional","affiliation":[{"name":"State Grid Shanxi Electric Power Research Institute, Taiyuan, Shanxi, China"}]},{"given":"Min","family":"Guo","sequence":"additional","affiliation":[{"name":"State Grid Shanxi Electric Power Research Institute, Taiyuan, Shanxi, China"}]},{"given":"Qiang","family":"Xue","sequence":"additional","affiliation":[{"name":"State Grid Shanxi Electric Power Research Institute, Taiyuan, Shanxi, China"}]},{"given":"Wenqing","family":"Liu","sequence":"additional","affiliation":[{"name":"North China Electric Power University, Beijing, China"}]},{"given":"Yanyan","family":"Zhang","sequence":"additional","affiliation":[{"name":"North China Electric Power University, Beijing, China"}]},{"given":"Yun","family":"Ju","sequence":"additional","affiliation":[{"name":"North China Electric Power University, Beijing, China"}]}],"member":"179","published-online":{"date-parts":[[2023,7]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"crossref","unstructured":"YuanX JiangY AiqunH GuoC. Wireless Channel Key Generation for Multi-User Access Scenarios. IEEE\/CIC International Conference on Communications in China (ICCC). 2022. pp. 179-184.","DOI":"10.1109\/ICCC55456.2022.9880811"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904330"},{"key":"e_1_3_2_4_2","unstructured":"YongjianL LinningP ShenH YeT. Remote secure communication system based on wireless channel key generations. IEEE 6th International Conference on Signal and Image Processing (ICSIP). 2021. pp. 69-74."},{"issue":"2","key":"e_1_3_2_5_2","first-page":"230","article-title":"A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks","volume":"103","author":"Qiuhua W","year":"2020","unstructured":"QiuhuaW MingyangK GuohuaW YizhiR ChunhuaS. A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks. IEICE Transactions on Information and Systems. 2020; 103(2): 230-238.","journal-title":"IEICE Transactions on Information and Systems."},{"key":"e_1_3_2_6_2","doi-asserted-by":"crossref","unstructured":"TanQ HuangS LiuS. A Method for Detecting Amplitude-Phase Joint Characteristic Parameters of Wireless Channel for Generating Key Parameters. Complexity. 2021.","DOI":"10.1155\/2021\/9951742"},{"key":"e_1_3_2_7_2","unstructured":"MingmingZ ChaoX MengL FeiX RanZ. Research on consistency enhancement of wireless channel key against RF fingerprint. Journal of Physics: Conference Series. 2020."},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2022.3198521"},{"key":"e_1_3_2_9_2","doi-asserted-by":"crossref","unstructured":"NguyenC GeorgiouO SuppakitpaisarnV. Improved Localization Accuracy Using Machine Learning: Predicting and Refining RSS Measurements. IEEE Globecom Workshops (GC Wkshps). 2018. pp. 1-7.","DOI":"10.1109\/GLOCOMW.2018.8644270"},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","unstructured":"HongboL JieY YanW YingyingC. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. Proc.31st IEEE Int.Conf.on Computer Communications. 2012. pp. 927-935.","DOI":"10.1109\/INFCOM.2012.6195843"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1049\/el.2017.2346"},{"key":"e_1_3_2_12_2","unstructured":"ChenY KimM VishwanathS. On the Key Generation Rate of Physically Unclonable Functions. 2018."},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2019.0956"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000143"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2939529"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3224852"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2021EBP3075"},{"key":"e_1_3_2_18_2","doi-asserted-by":"crossref","unstructured":"UsmanM AlthunibatS QaraqeM. A Channel State Information-Based Key Generation Scheme for Internet of Things. Security and Communication Networks. 2022.","DOI":"10.1155\/2022\/7976319"},{"key":"e_1_3_2_19_2","doi-asserted-by":"crossref","unstructured":"LiG YangH ZhangJ LiuH HuA. Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments. Proceedings \u2013 IEEE INFOCOM 2022 \u2013 IEEE Conference on Computer Communications. 2022. pp. 1-10.","DOI":"10.1109\/INFOCOM48880.2022.9796694"},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","unstructured":"ChowdhuryM SelouaniS O\u2019ShaughnessyD. Bayesian on-line spectral change point detection: a soft computing approach for on-line ASR. Int J Speech Technol 15. 2012; 5-23.","DOI":"10.1007\/s10772-011-9116-2"},{"issue":"1","key":"e_1_3_2_21_2","first-page":"143","article-title":"Performance analysis of wireless key generation with multi-bit quantization under imperfect channel estimation condition","volume":"40","author":"Ding N","year":"2020","unstructured":"DingN GuanX YangW LiT WangJ. Performance analysis of wireless key generation with multi-bit quantization under imperfect channel estimation condition. Journal of Computer Applications. 2020; 40(1): 143-147.","journal-title":"Journal of Computer Applications."},{"key":"e_1_3_2_22_2","unstructured":"DongE LiuG ZhouY CaiY. Voice activity detection based on short-time energy and noise spectrum adaptation. 6th International Conference on Signal Processing. Vol. 1. 2002. pp. 464-467."},{"key":"e_1_3_2_23_2","doi-asserted-by":"crossref","unstructured":"LimmaneeA. Improper Quantization Decision and Key Entropy Loss in Wireless Physical-Layer Security with False Channel Statistics Knowledge. 2022 IEEE 33rd Annual International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC). 2022. pp. 1139-1145.","DOI":"10.1109\/PIMRC54779.2022.9977952"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCM-226746","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JCM-226746","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCM-226746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T16:32:32Z","timestamp":1771000352000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCM-226746"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,7]]}},"alternative-id":["10.3233\/JCM-226746"],"URL":"https:\/\/doi.org\/10.3233\/jcm-226746","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7]]}}}