{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:13:39Z","timestamp":1760242419694,"version":"build-2065373602"},"reference-count":37,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T00:00:00Z","timestamp":1498608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the PhD Start-up Funds of Northwest A&amp;F University","award":["Z109021613"],"award-info":[{"award-number":["Z109021613"]}]},{"name":"the Fundamental Research Funds for the Central Universities, Northwest A&amp;F University","award":["2014YB068"],"award-info":[{"award-number":["2014YB068"]}]},{"name":"the major agricultural science and technology extension service project of Shaanxi Province","award":["2016XXPT-00"],"award-info":[{"award-number":["2016XXPT-00"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.<\/jats:p>","DOI":"10.3390\/s17071524","type":"journal-article","created":{"date-parts":[[2017,6,28]],"date-time":"2017-06-28T10:25:56Z","timestamp":1498645556000},"page":"1524","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network"],"prefix":"10.3390","volume":"17","author":[{"given":"Bin","family":"Yang","sequence":"first","affiliation":[{"name":"College of Information Engineering, Northwest A&amp;F University, Xianyang 712100, China"}]},{"given":"Jianfeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Information Engineering, Northwest A&amp;F University, Xianyang 712100, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,6,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Sa, J., Choi, Y., Chung, Y., Kim, H.-Y., Park, D., and Yoon, S. (2017). Replacement condition detection of railway point machines using an electric current sensor. Sensors, 17.","DOI":"10.3390\/s17020263"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Li, J., Dridi, M., and El-Moudni, A. (2016). A cooperative traffic control of vehicle-intersection (CTCVI) for the reduction of traffic delays and fuel consumption. Sensors, 16.","DOI":"10.3390\/s16122175"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"3942","DOI":"10.1109\/TVT.2010.2060504","article-title":"An open-system transportation security sensor network: Field-trial experiences","volume":"59","author":"Fokm","year":"2010","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Jung, J., Kim, J., Choi, Y., and Won, D. (2016). An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks. Sensors, 16.","DOI":"10.3390\/s16081299"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Elgenaidi, W., Newe, T., O\u2019Connell, E., Toal, D., and Dooly, G. (2016). Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks. Sensors, 16.","DOI":"10.3390\/s16122204"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/18.256484","article-title":"Secret key agreement by public discussion from common information","volume":"39","author":"Maurer","year":"1993","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.1109\/18.243431","article-title":"Common randomness in information theory and cryptography part I: Secret sharing","volume":"39","author":"Ahlswede","year":"1993","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2515","DOI":"10.1109\/TIT.2008.921908","article-title":"Wireless information-theoretic security","volume":"54","author":"Bloch","year":"2008","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2455","DOI":"10.1109\/TIT.2011.2176311","article-title":"Key generation using external source excitation: Capacity, reliability, and secrecy exponent","volume":"58","author":"Chou","year":"2012","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1976","DOI":"10.1587\/transfun.E93.A.1976","article-title":"Secret key agreement from correlated gaussian sources by rate limited public communication","volume":"93","author":"Watanabe","year":"2010","journal-title":"IEICE Trans. Fundam."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TIFS.2011.2132130","article-title":"Secret key Agreement from Vector Gaussian Sources by Rate Limited Public Communication","volume":"6","author":"Watanabe","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"3373","DOI":"10.1109\/TIT.2012.2184075","article-title":"Secret key generation for correlated gaussian sources","volume":"58","author":"Nitinawarat","year":"2012","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"650","DOI":"10.1109\/TIFS.2011.2147314","article-title":"Physical-layer secret key agreement in two-way wireless relaying systems","volume":"6","author":"Shimizu","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/TIFS.2014.2301233","article-title":"Secret key generation in the two-way relay channel with active attackers","volume":"9","author":"Zhou","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1751","DOI":"10.1109\/JSAC.2013.130909","article-title":"Secret key generation from sparse wireless channels: Ergodic capacity and secrecy outage","volume":"31","author":"Chou","year":"2013","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1779","DOI":"10.1109\/JSAC.2013.130911","article-title":"Secure key generation in sensor networks based on frequency-selective channels","volume":"31","author":"Wilhelm","year":"2013","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"6747","DOI":"10.1109\/TIT.2012.2208579","article-title":"Secrecy via sources and channels","volume":"58","author":"Prabhakaran","year":"2012","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Prabhakaran, V.M., Eswaran, K., and Ramchandran, K. (2008, January 6\u201311). Secrecy via sources and channels\u2014A secret key-Secret message rate tradeoff region. Proceedings of the IEEE International Symposium on Information Theory, Toronto, ON, Canada.","DOI":"10.1109\/ISIT.2008.4595139"},{"key":"ref_19","unstructured":"Khisti, A., Diggavi, S., and Wornell, G. (July, January 28). Secret key agreement using asymmetry in channel state knowledge. Proceedings of the IEEE International Symposium on Information Theory, Seoul, Korea."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"672","DOI":"10.1109\/TIFS.2011.2151188","article-title":"Secret-key agreement with channel state information at the transmitter","volume":"6","author":"Khisti","year":"2011","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1109\/TIFS.2007.902666","article-title":"Channel identification: Secret sharing using reciprocity in ultrawideband channels","volume":"2","author":"Wilson","year":"2007","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/TIFS.2010.2043187","article-title":"Information-theoretically secret key generation for fading wireless channels","volume":"5","author":"Ye","year":"2010","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"ref_23","unstructured":"Wallace, J.W., Chen, C., and Jensen, M.A. (2009, January 23\u201327). Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits. Proceedings of the 3rd European Conference on Antennas and Propagation, Berlin, Germany."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/TMC.2009.88","article-title":"High-rate uncorrelated bit extraction for shared secret key generation from channel measurements","volume":"9","author":"Patwari","year":"2010","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"3776","DOI":"10.1109\/TAP.2005.858853","article-title":"Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels","volume":"53","author":"Aono","year":"2005","journal-title":"IEEE Trans. Antennas Propag."},{"key":"ref_26","unstructured":"Sayeed, A., and Perrig, A. (April, January 31). Secure wireless communications: Secret keys through multipath. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, USA."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1578","DOI":"10.1109\/JSAC.2012.120924","article-title":"Cooperative key generation in wireless networks","volume":"30","author":"Lai","year":"2012","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Zeng, K., Wu, D., Chan, A., and Mohapatra, P. (2010, January 15\u201319). Exploiting multipleantenna diversity for shared key generation in wireless networks. Proceedings of the IEEE Conference on Computer Communications (INFOCOM), San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462004"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1109\/TIFS.2012.2206385","article-title":"Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness","volume":"7","author":"Liu","year":"2012","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"4020","DOI":"10.1109\/TVT.2013.2254507","article-title":"Key agreement algorithms for vehicular communication networks based on reciprocity and diversity theorems","volume":"62","author":"Zan","year":"2013","journal-title":"IEEE Trans. Veh. Tech."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Primak, S., Liu, K., and Wang, X. (2014, January 14\u201317). Secret key generation using physical channels with imperfect CSI. Proceedings of the IEEE 80th Vehicular Technology Conference, Vancouver, BC, Canada.","DOI":"10.1109\/VTCFall.2014.6966172"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"2214","DOI":"10.1109\/TVT.2014.2342714","article-title":"Secret key generation via localization and mobility","volume":"64","author":"Gungor","year":"2015","journal-title":"IEEE Trans. Veh. Tech."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1666","DOI":"10.1109\/JSAC.2012.121010","article-title":"Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels","volume":"30","author":"Wang","year":"2012","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Yang, B., Wang, W., and Yin, Q. (2014, January 4\u20139). Secret key generation from multiple cooperative helpers by rate unlimited public communication. Proceedings of the 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy.","DOI":"10.1109\/ICASSP.2014.6855196"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Bloch, M., and Barros, J. (2011). Physical-Layer Security: From Information Theory to Security Engineering, Cambridge University Press.","DOI":"10.1017\/CBO9780511977985"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MCOM.2015.7120014","article-title":"Physical layer key generation in wireless networks: Challenges and opportunities","volume":"53","author":"Zeng","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Eberz, S., Strohmeler, M., Wilhelm, M., and Martinovie, I. (2012, January 10\u201314). A practical man-in-the-middle attack on signal-based key generation protocols. Proceedings of the European Symposium on Research in Computer Security, Pisa, Italy.","DOI":"10.1007\/978-3-642-33167-1_14"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/7\/1524\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:40:39Z","timestamp":1760208039000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/7\/1524"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,28]]},"references-count":37,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2017,7]]}},"alternative-id":["s17071524"],"URL":"https:\/\/doi.org\/10.3390\/s17071524","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2017,6,28]]}}}