{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:16:20Z","timestamp":1774455380064,"version":"3.50.1"},"reference-count":48,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T00:00:00Z","timestamp":1560384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>One solution to ensure secrecy in the Internet of Things (IoT) is cryptography. However, classical cryptographic systems require high computational complexity that is not appropriate for IoT devices with restricted computing resources, energy, and memory. Physical layer security that utilizes channel characteristics is an often used solution because it is simpler and more efficient than classical cryptographic systems. In this paper, we propose a signal strength exchange (SSE) system as an efficient key generation system and a synchronized quantization (SQ) method as a part of the SSE system that synchronizes data blocks in the quantization phase. The SQ method eliminates the signal pre-processing phase by performing a multi-bit conversion directly from the channel characteristics of the measurement results. Synchronization is carried out between the two authorized nodes to ensure sameness of the produced keys so it can eliminate the error-correcting phase. The test results at the IoT devices equipped with IEEE 802.11 radio show that SSE system is more efficient in terms of computing time and communication overhead than existing systems.<\/jats:p>","DOI":"10.3390\/s19122674","type":"journal-article","created":{"date-parts":[[2019,6,13]],"date-time":"2019-06-13T11:15:58Z","timestamp":1560424558000},"page":"2674","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["An Efficient Key Generation for the Internet of Things Based Synchronized Quantization"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8751-560X","authenticated-orcid":false,"given":"Mike","family":"Yuliana","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Electrical Technology, Institut Teknologi Sepuluh Nopember, Jalan Raya ITS, Keputih, Sukolilo, Surabaya 60111, Indonesia"},{"name":"Department of Electrical Engineering, Politeknik Elektronika Negeri Surabaya (PENS), Jalan Raya ITS, Keputih, Sukolilo, Surabaya 60111, Indonesia"}]},{"family":"Wirawan","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Electrical Technology, Institut Teknologi Sepuluh Nopember, Jalan Raya ITS, Keputih, Sukolilo, Surabaya 60111, Indonesia"}]},{"family":"Suwadi","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Faculty of Electrical Technology, Institut Teknologi Sepuluh Nopember, Jalan Raya ITS, Keputih, Sukolilo, Surabaya 60111, Indonesia"}]}],"member":"1968","published-online":{"date-parts":[[2019,6,13]]},"reference":[{"key":"ref_1","first-page":"8","article-title":"Internet of Things: A survey on the security of IoT frameworks","volume":"38","author":"Ammar","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_2","first-page":"291","article-title":"A survey on Internet of Things architectures","volume":"30","author":"Ray","year":"2018","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"El-hajj, M., Fadlallah, A., Chamoun, M., and Serhrouchni, A. (2019). A Survey of Internet of Things (IoT) Authentication Schemes. Sensors, 19.","DOI":"10.3390\/s19051141"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"02034","DOI":"10.1051\/matecconf\/201710002034","article-title":"Internet of Things: Application and Prospect","volume":"Volume 100","author":"Zhao","year":"2017","journal-title":"MATEC Web of Conferences"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Rajakumari, S., Azhagumeena, S., Devi, A.B., and Ananthi, M. (2017, January 23\u201324). Upgraded living think-IoT and big data. Proceedings of the 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), Chennai, India.","DOI":"10.1109\/ICCCT2.2017.7972272"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Zhang, J., Duong, T.Q., Woods, R., and Marshall, A. (2017). Securing wireless communications of the internet of things from the physical layer, an overview. Entropy, 19.","DOI":"10.3390\/e19080420"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1814","DOI":"10.1109\/JPROC.2015.2459592","article-title":"Wireless Physical-Layer Security: Lessons Learned from Information Theory","volume":"103","author":"Yener","year":"2015","journal-title":"Proc. IEEE"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/JPROC.2017.2780172","article-title":"Wireless Communication and Security Issues for Cyber\u2013Physical Systems and the Internet-of-Things","volume":"106","author":"Burg","year":"2017","journal-title":"Proc. IEEE"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1281","DOI":"10.1109\/TASE.2015.2497663","article-title":"On Secure Wireless Communications for IoT Under Eavesdropper Collusion","volume":"13","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref_10","unstructured":"Katz, J., Menezes, A.J., Van Oorschot, P.C., and Vanstone, S.A. (1996). Handbook of Applied Cryptography, CRC Press. [1st ed.]."},{"key":"ref_11","unstructured":"Stallings, W. (2013). Cryptography and Network Security: Principles and Practice, Prentice Hall Press. [6th ed.]."},{"key":"ref_12","unstructured":"Carbajal-Gomez, V.H., Tlelo-Cuautle, E., Mu, J.M., Gerardo, L., Fraga, D., Sanchez-Lopez, C., and Fernandez-Fernandez, F.V. (2018). Optimization and CMOS design of chaotic oscillators robust to PVT variations: INVITED. Integration, in press."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Carbajal-gomez, V.H., Tlelo-cuautle, E., and Sanchez-lopez, C. (2018). PVT-Robust CMOS Programmable Chaotic Oscillator: Synchronization of Two 7-Scroll Attractors. Electronics, 7.","DOI":"10.3390\/electronics7100252"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"11374","DOI":"10.1109\/ACCESS.2018.2806423","article-title":"A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks","volume":"6","author":"Shi","year":"2018","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3140257","article-title":"Physical Layer Key Generation","volume":"3","author":"Wan","year":"2018","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Sun, L., and Du, Q.A. (2018). Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions. Entropy, 20.","DOI":"10.3390\/e20100730"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Pecorella, T., Brilli, L., and Mucchi, L. (2016). The Role of Physical Layer Security in IoT: A Novel Perspective. Information, 7.","DOI":"10.3390\/info7030049"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Margelis, G., Fafoutis, X., Piechocki, R.J., Oikonomou, G., Tryfonas, T., and Thomas, P. (2016, January 12\u201314). Practical limits of the secret key-capacity for IoT physical layer security. Proceedings of the IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA.","DOI":"10.1109\/WF-IoT.2016.7845415"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"79010","DOI":"10.1109\/ACCESS.2017.2748182","article-title":"On Wireless Channel Parameters for Key Generation in Industrial Environments","volume":"6","author":"Kreiser","year":"2017","journal-title":"IEEE Access"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Van Torre, P. (2016). Channel-Based Key Generation for Encrypted Body-Worn Wireless Sensor Networks. Sensors, 16.","DOI":"10.3390\/s16091453"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1109\/TIFS.2017.2768020","article-title":"Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices","volume":"13","author":"Li","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Wang, Q. (2017). A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks. Sensors, 17.","DOI":"10.3390\/s17020289"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Yuliana, M. (2017, January 16\u201318). Performance evaluation of the key extraction schemes in wireless indoor environment. Proceedings of the 2017 International Conference on Signals and Systems (ICSigSys), Sanur, Indonesia.","DOI":"10.1109\/ICSIGSYS.2017.7967029"},{"key":"ref_24","unstructured":"Ambekar, A., Kuruvatti, N., and Schotten, H.D. (2012, January 11\u201313). Improved method of secret key generation based on variations in wireless channel. Proceedings of the International Conference on Systems, Signals and Image Processing (IWSSIP), Vienna, Austria."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.jnca.2017.11.014","article-title":"Efficient key generation leveraging wireless channel reciprocity for MANETs","volume":"103","author":"Zhan","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_26","first-page":"2701","article-title":"Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform","volume":"11","author":"Zhan","year":"2017","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"McGuire, M. (2014, January 13\u201316). Channel Estimation for Secret Key Generation. Proceedings of the International Conference on Advanced Information Networking and Applications, Victoria, BC, Canada.","DOI":"10.1109\/AINA.2014.60"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Ali, S.T., Sivaraman, V., and Ostry, D. (2010, January 11\u201313). Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks. Proceedings of the IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing, Hong Kong, China.","DOI":"10.1109\/EUC.2010.103"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Yuliana, M. (2018, January 16\u201318). Improving performance of secret key generation from wireless channel using filtering techniques. Proceedings of the Tenth International Conference on Signal Processing Systems, Singapore.","DOI":"10.1117\/12.2521870"},{"key":"ref_30","first-page":"474","article-title":"Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment","volume":"9","author":"Yuliana","year":"2017","journal-title":"Int. J. Commun. Netw. Inf. Secur."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"100","DOI":"10.18517\/ijaseit.9.1.7583","article-title":"Performance Analysis of Loss Multilevel Quantization on the Secret Key Generation Scheme in Indoor Wireless Environment","volume":"9","author":"Yuliana","year":"2019","journal-title":"Int. J. Adv. Sci. Eng. Inf. Technol."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Yuliana, M. (2019). A Simple Secret Key Generation by Using a Combination of Pre-Processing Method with a Multilevel Quantization. Entropy, 21.","DOI":"10.3390\/e21020192"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Guillaume, R., Winzer, F., Zenger, C.T., Paar, C., and Czylwik, A. (2015, January 6\u20139). Bringing PHY-based key generation into the field: An evaluation for practical scenarios. Proceedings of the 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), Boston, MA, USA.","DOI":"10.1109\/VTCFall.2015.7390857"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Sudarsono, A., Yuliana, M., Kristalina, P., and Barakbah, A.R. (2018, January 23\u201327). An Implementation of Shared Key Generation Extracted from Received Signal Strength in Vehicular Ad-Hoc Communication. Proceedings of the 2018 Sixth International Symposium on Computing and Networking (CANDAR), Takayama, Japan.","DOI":"10.1109\/CANDAR.2018.00015"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1109\/ACCESS.2016.2521718","article-title":"Key Generation from Wireless Channels: A Review","volume":"4","author":"Zhang","year":"2016","journal-title":"IEEE Access"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"4464","DOI":"10.1109\/ACCESS.2016.2604618","article-title":"Experimental Study on Key Generation for Physical Layer Security in Wireless Communications","volume":"4","author":"Zhang","year":"2016","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2763","DOI":"10.1109\/TMC.2013.71","article-title":"Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices","volume":"13","author":"Ali","year":"2014","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1109\/TMC.2012.63","article-title":"Secret key extraction from wireless signal strength in real environments","volume":"12","author":"Premnath","year":"2013","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_39","unstructured":"Ambekar, A. (2015). Exploiting Radio Channel Aware Physical Layer Concepts. [Ph.D. Thesis, Ruhr-University Bochum]."},{"key":"ref_40","first-page":"611","article-title":"Efficient key generation leveraging channel reciprocity and balanced gray code","volume":"25","author":"Zhan","year":"2019","journal-title":"Wirel. Netw."},{"key":"ref_41","first-page":"7393526","article-title":"Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase","volume":"2017","author":"Cheng","year":"2017","journal-title":"Mob. Inf. Syst."},{"key":"ref_42","unstructured":"Jiang, Y., Hu, A., and Huang, J. (2018). A lightweight physical-layer based security strategy for Internet of things. Clust. Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","article-title":"Universal Classes of Hash Functions","volume":"18","author":"Carter","year":"1979","journal-title":"J. Comput. Syst. Sci."},{"key":"ref_44","first-page":"100","article-title":"Archived Publication Secure Hash Standard","volume":"2","author":"Publication","year":"1987","journal-title":"Public Law"},{"key":"ref_45","unstructured":"(2019, May 06). NIST, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, Available online: http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-22\/sp-800-22-051501."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Zenger, C.T., Zimmer, J., Pietersz, M., Posielek, J.-F., and Paar, C. (2015, January 8\u201311). Exploiting the Physical Environment for Securing the Internet of Things. Proceedings of the New Security Paradigms Workshop (NSPW), Twente, The Netherlands.","DOI":"10.1145\/2841113.2841117"},{"key":"ref_47","unstructured":"Moore, T. (2001). IEEE 802.11-01\/610r02: 802.1.x and 802.11 Key Interactions, Microsoft Research. Technical Report."},{"key":"ref_48","unstructured":"Margelis, G., Fafoutis, X., Oikonomou, G., Piechocki, R., Tryfonas, R., and Thomas, P. (2018). Efficient DCT-based secret key generation for the Internet of Things. Ad Hoc Netw., in press."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/12\/2674\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:58:10Z","timestamp":1760187490000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/12\/2674"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,13]]},"references-count":48,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2019,6]]}},"alternative-id":["s19122674"],"URL":"https:\/\/doi.org\/10.3390\/s19122674","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,13]]}}}