{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T20:59:14Z","timestamp":1720472354998},"reference-count":34,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T00:00:00Z","timestamp":1666224000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1016\/j.future.2022.10.018","type":"journal-article","created":{"date-parts":[[2022,10,23]],"date-time":"2022-10-23T13:31:11Z","timestamp":1666531871000},"page":"253-265","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN"],"prefix":"10.1016","volume":"140","author":[{"given":"Biao","family":"Han","sequence":"first","affiliation":[]},{"given":"Yahui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hanxun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jinsen","family":"Huang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.future.2022.10.018_b1","unstructured":". Iot Analytics, LPWAN Market Report 2021\u20132026. https:\/\/iot-analytics.com\/product\/lpwan-market-report-2021-2026\/."},{"key":"10.1016\/j.future.2022.10.018_b2","series-title":"NB-IoT and LTE-M issues to boost LoRa and sigfox near and long-term lead in LPW A network connections","author":"Research","year":"2020"},{"key":"10.1016\/j.future.2022.10.018_b3","series-title":"A technical overview of LoRa and LoRaWAN","author":"LoRa Alliance","year":"2020"},{"key":"10.1016\/j.future.2022.10.018_b4","series-title":"Line spacing in LaTeX documents","author":"Murphy","year":"2018"},{"issue":"3","key":"10.1016\/j.future.2022.10.018_b5","doi-asserted-by":"crossref","first-page":"46","DOI":"10.3390\/fi12030046","article-title":"LPWAN technologies: Emerging application characteristics, requirements, and design considerations","volume":"12","author":"Chaudhari","year":"2020","journal-title":"Future Internet"},{"issue":"4","key":"10.1016\/j.future.2022.10.018_b6","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1109\/TCCN.2020.3002253","article-title":"Collaborative learning of communication routes in edge-enabled multi-access vehicular environment","volume":"6","author":"Wu","year":"2020","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"issue":"10","key":"10.1016\/j.future.2022.10.018_b7","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MCOM.2018.1800089","article-title":"Spatial intelligence toward trustworthy vehicular IoT","volume":"56","author":"Wu","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.future.2022.10.018_b8","first-page":"8887","article-title":"Internet of things (iot) protocols: a brief exploration of mqtt and coap","volume":"975","author":"Ansari","year":"2018","journal-title":"Int. J. Comput. Appl."},{"key":"10.1016\/j.future.2022.10.018_b9","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2020.100303","article-title":"LoRaWAN security survey: Issues, threats and possible mitigation techniques","author":"Noura","year":"2020","journal-title":"Internet Things"},{"issue":"7","key":"10.1016\/j.future.2022.10.018_b10","doi-asserted-by":"crossref","first-page":"3176","DOI":"10.3390\/app11073176","article-title":"Security vulnerabilities in LPWANs\u2014An attack vector analysis for the IoT ecosystem","volume":"11","author":"Torres","year":"2021","journal-title":"Appl. Sci."},{"key":"10.1016\/j.future.2022.10.018_b11","series-title":"Security issues of low power wide area networks in the context of lora networks","author":"Basu","year":"2020"},{"key":"10.1016\/j.future.2022.10.018_b12","series-title":"Research on Physical Layer Security Protocol in Wireless Network","author":"Chen","year":"2014"},{"issue":"2","key":"10.1016\/j.future.2022.10.018_b13","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MWC.001.2000296","article-title":"Computation offloading in beyond 5G networks: A distributed learning framework and applications","volume":"28","author":"Chen","year":"2021","journal-title":"IEEE Wirel. Commun."},{"issue":"1","key":"10.1016\/j.future.2022.10.018_b14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-019-1634-7","article-title":"Efficient physical layer key generation technique in wireless communications","volume":"2020","author":"Lin","year":"2020","journal-title":"EURASIP J. Wireless Commun. Networking"},{"issue":"3","key":"10.1016\/j.future.2022.10.018_b15","doi-asserted-by":"crossref","first-page":"682","DOI":"10.3390\/s20030682","article-title":"Lora-based physical layer key generation for secure v2v\/v2i communications","volume":"20","author":"Han","year":"2020","journal-title":"Sensors"},{"key":"10.1016\/j.future.2022.10.018_b16","article-title":"A physical layer key generation approach based on received signal strength in smart homes","author":"Zhao","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.future.2022.10.018_b17","doi-asserted-by":"crossref","first-page":"5281","DOI":"10.1109\/ACCESS.2017.2685627","article-title":"Efficient and consistent key extraction based on received signal strength for vehicular ad hoc networks","volume":"5","author":"Li","year":"2017","journal-title":"IEEE Access"},{"key":"10.1016\/j.future.2022.10.018_b18","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.phycom.2019.01.013","article-title":"Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging","volume":"33","author":"Soni","year":"2019","journal-title":"Phys. Commun."},{"key":"10.1016\/j.future.2022.10.018_b19","series-title":"IEEE INFOCOM 2021-IEEE Conference on Computer Communications","first-page":"1","article-title":"Bipartite graph matching based secret key generation","author":"Liu","year":"2021"},{"issue":"4","key":"10.1016\/j.future.2022.10.018_b20","doi-asserted-by":"crossref","first-page":"6404","DOI":"10.1109\/JIOT.2018.2888553","article-title":"Lora-key: Secure key generation system for lora-based network","volume":"6","author":"Xu","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.future.2022.10.018_b21","series-title":"International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"523","article-title":"Fuzzy extractors: How to generate strong keys from biometrics and other noisy data","author":"Dodis","year":"2004"},{"key":"10.1016\/j.future.2022.10.018_b22","series-title":"International Conference on Cyber Security Cryptography and Machine Learning","first-page":"1","article-title":"Efficient, reusable fuzzy extractors from LWE","author":"Apon","year":"2017"},{"key":"10.1016\/j.future.2022.10.018_b23","series-title":"Australasian Conference on Information Security and Privacy","first-page":"13","article-title":"Reusable fuzzy extractor from LWE","author":"Wen","year":"2018"},{"key":"10.1016\/j.future.2022.10.018_b24","series-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"147","article-title":"Secure remote authentication using biometric data","author":"Boyen","year":"2005"},{"issue":"12","key":"10.1016\/j.future.2022.10.018_b25","doi-asserted-by":"crossref","first-page":"1794","DOI":"10.1093\/comjnl\/bxy072","article-title":"Computational robust fuzzy extractor","volume":"61","author":"Wen","year":"2018","journal-title":"Comput. J."},{"key":"10.1016\/j.future.2022.10.018_b26","series-title":"International Conference on the Theory and Application of Cryptology and Information Security","first-page":"459","article-title":"Robustly reusable fuzzy extractor from standard assumptions","author":"Wen","year":"2018"},{"key":"10.1016\/j.future.2022.10.018_b27","series-title":"IACR International Workshop on Public Key Cryptography","first-page":"349","article-title":"Generic constructions of robustly reusable fuzzy extractor","author":"Wen","year":"2019"},{"key":"10.1016\/j.future.2022.10.018_b28","series-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"117","article-title":"Reusable fuzzy extractors for low-entropy distributions","author":"Canetti","year":"2016"},{"issue":"4","key":"10.1016\/j.future.2022.10.018_b29","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1109\/TDSC.2018.2878697","article-title":"Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2","volume":"17","author":"Visconti","year":"2018","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.future.2022.10.018_b30","doi-asserted-by":"crossref","unstructured":"S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik, Radio-telepathy: extracting a secret key from an unauthenticated wireless channel, in: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, 2008, pp. 128\u2013139.","DOI":"10.1145\/1409944.1409960"},{"issue":"1","key":"10.1016\/j.future.2022.10.018_b31","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/TMC.2009.88","article-title":"High-rate uncorrelated bit extraction for shared secret key generation from channel measurements","volume":"9","author":"Patwari","year":"2009","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.future.2022.10.018_b32","doi-asserted-by":"crossref","unstructured":"S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, On the effectiveness of secret key extraction from wireless signal strength in real environments, in: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, 2009, pp. 321\u2013332.","DOI":"10.1145\/1614320.1614356"},{"key":"10.1016\/j.future.2022.10.018_b33","doi-asserted-by":"crossref","unstructured":"J. Croft, N. Patwari, S.K. Kasera, Robust uncorrelated bit extraction methodologies for wireless sensors, in: Proceedings of the 9th ACM\/IEEE International Conference on Information Processing in Sensor Networks, 2010, pp. 70\u201381.","DOI":"10.1145\/1791212.1791222"},{"key":"10.1016\/j.future.2022.10.018_b34","series-title":"2012 Proceedings IEEE INFOCOM","first-page":"927","article-title":"Collaborative secret key extraction leveraging received signal strength in mobile wireless networks","author":"Liu","year":"2012"}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X22003284?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X22003284?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T15:36:26Z","timestamp":1711985786000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X22003284"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3]]},"references-count":34,"alternative-id":["S0167739X22003284"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2022.10.018","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2023,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2022.10.018","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}