{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:41:37Z","timestamp":1773326497065,"version":"3.50.1"},"reference-count":30,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"name":"Distinguished Young Scholars Fund of Fujian","award":["2016J06013"],"award-info":[{"award-number":["2016J06013"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472083"],"award-info":[{"award-number":["61472083"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402110"],"award-info":[{"award-number":["61402110"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CICAEET fund"},{"name":"PAPD fund"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672295"],"award-info":[{"award-number":["61672295"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1016\/j.future.2016.12.013","type":"journal-article","created":{"date-parts":[[2016,12,16]],"date-time":"2016-12-16T19:40:19Z","timestamp":1481917219000},"page":"284-294","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":14,"special_numbering":"P1","title":["An over-the-air key establishment protocol using keyless cryptography"],"prefix":"10.1016","volume":"79","author":[{"given":"Yuexin","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.future.2016.12.013_br000005","series-title":"Communications and Multimedia Security - 15th IFIP TC 6\/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25\u201326, 2014. Proceedings","first-page":"63","article-title":"A study on advanced persistent threats","volume":"vol. 8735","author":"Chen","year":"2014"},{"key":"10.1016\/j.future.2016.12.013_br000010","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1353-4858(14)70040-6","article-title":"Advanced persistent threats: Minimising the damage","volume":"2014","author":"Brewer","year":"2014","journal-title":"Netw. Secur."},{"key":"10.1016\/j.future.2016.12.013_br000015","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","article-title":"New directions in cryptography","volume":"22","author":"Diffie","year":"1976","journal-title":"IEEE Trans. Inf. Theory"},{"key":"10.1016\/j.future.2016.12.013_br000020","series-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18\u201322, 2002","first-page":"41","article-title":"A key-management scheme for distributed sensor networks","author":"Eschenauer","year":"2002"},{"key":"10.1016\/j.future.2016.12.013_br000025","series-title":"2003 IEEE Symposium on Security and Privacy (S&P 2003), 11\u201314 May 2003, Berkeley, CA, USA","first-page":"197","article-title":"Random key predistribution schemes for sensor networks","author":"Chan","year":"2003"},{"key":"10.1016\/j.future.2016.12.013_br000030","doi-asserted-by":"crossref","first-page":"1835","DOI":"10.1007\/s11276-014-0841-8","article-title":"Survey on channel reciprocity based key establishment techniques for wireless systems","volume":"21","author":"Wang","year":"2015","journal-title":"Wirel. Netw."},{"key":"10.1016\/j.future.2016.12.013_br000035","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1109\/ACCESS.2016.2521718","article-title":"Key generation from wireless channels: A review","volume":"4","author":"Zhang","year":"2016","journal-title":"IEEE Access"},{"key":"10.1016\/j.future.2016.12.013_br000040","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1016\/0020-0190(83)90029-7","article-title":"Key exchange using \u2018keyless cryptography\u2019","volume":"16","author":"Alpern","year":"1983","journal-title":"Inform. Process. Lett."},{"key":"10.1016\/j.future.2016.12.013_br000045","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/0020-0190(85)90106-1","article-title":"A secure and useful keyless cryptosystem","volume":"21","author":"Yung","year":"1985","journal-title":"Inform. Process. Lett."},{"key":"10.1016\/j.future.2016.12.013_br000050","series-title":"Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, MobiSys 2005, Seattle, Washington, USA, June 6\u20138, 2005","first-page":"51","article-title":"Shake them up!: A movement-based pairing protocol for CPU-constrained devices","author":"Castelluccia","year":"2005"},{"key":"10.1016\/j.future.2016.12.013_br000055","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/TIFS.2012.2226718","article-title":"COKE crypto-less over-the-air key establishment","volume":"8","author":"Pietro","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2016.12.013_br000060","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.comnet.2015.04.006","article-title":"ESC: An efficient, scalable, and crypto-less solution to secure wireless networks","volume":"84","author":"Pietro","year":"2015","journal-title":"Comput. Netw."},{"key":"10.1016\/j.future.2016.12.013_br000065","unstructured":"E. Haselsteiner, K. Breitfu\u00df, Security in near field communication (NFC), in: Workshop on RFID Security RFIDSec."},{"key":"10.1016\/j.future.2016.12.013_br000070","article-title":"Strengths and weaknesses of near field communication (NFC) technology","volume":"11","author":"Allah","year":"2011","journal-title":"Glob. J. Comput. Sci. Technol."},{"key":"10.1016\/j.future.2016.12.013_br000075","series-title":"Proceedings of the 16th Annual International Conference on Mobile Computing and Networking, MOBICOM 2010, Chicago, Illinois, USA, September 20\u201324, 2010","first-page":"1","article-title":"Achieving single channel, full duplex wireless communication","author":"Choi","year":"2010"},{"key":"10.1016\/j.future.2016.12.013_br000080","series-title":"Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, MOBICOM 2011, Las Vegas, Nevada, USA, September 19\u201323, 2011","first-page":"301","article-title":"Practical, real-time, full duplex wireless","author":"Jain","year":"2011"},{"key":"10.1016\/j.future.2016.12.013_br000085","series-title":"9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS \u201914, Kyoto, Japan - June 03\u201306, 2014","first-page":"217","article-title":"Practical secret key agreement for full-duplex near field communications","author":"Jin","year":"2014"},{"key":"10.1016\/j.future.2016.12.013_br000090","series-title":"ACM SIGCOMM 2013 Conference, SIGCOMM\u201913, Hong Kong, China, August 12\u201316, 2013","first-page":"375","article-title":"Full duplex radios","author":"Bharadia","year":"2013"},{"key":"10.1016\/j.future.2016.12.013_br000095","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/MCOM.2015.7120014","article-title":"Physical layer key generation in wireless networks: Challenges and opportunities","volume":"53","author":"Zeng","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.future.2016.12.013_br000100","series-title":"Proceedings of the 13th Annual International Conference on Mobile Computing and Networking, MOBICOM 2007, Montr\u00e9al, Qu\u00e9bec, Canada, September 9\u201314, 2007","first-page":"111","article-title":"Robust location distinction using temporal link signatures","author":"Patwari","year":"2007"},{"key":"10.1016\/j.future.2016.12.013_br000105","series-title":"Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14\u201319, 2013","first-page":"200","article-title":"Is link signature dependable for wireless security?","author":"He","year":"2013"},{"key":"10.1016\/j.future.2016.12.013_br000110","series-title":"Proceedings of the Network and Distributed System Security Symposium","article-title":"Device identification via analog signal fingerprinting: A matched filter approach","author":"Gerdes","year":"2006"},{"key":"10.1016\/j.future.2016.12.013_br000115","series-title":"Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22\u201324, 2010","first-page":"89","article-title":"Attacks on physical-layer identification","author":"Danev","year":"2010"},{"key":"10.1016\/j.future.2016.12.013_br000120","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/2379776.2379782","article-title":"On physical-layer identification of wireless devices","volume":"45","author":"Danev","year":"2012","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.future.2016.12.013_br000125","unstructured":"IEEE standard for local and metropolitan area networks\u2013part 15.4: Low-rate wireless personal area networks (LR-WPANs), IEEE Std 802.15.4-2011 (Revision of IEEE Std 802.15.4-2006), 2011, pp. 1\u2013314."},{"key":"10.1016\/j.future.2016.12.013_br000130","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/SURV.2011.041110.00022","article-title":"Denial of service attacks in wireless networks: The case of jammers","volume":"13","author":"Pelechrinis","year":"2011","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.future.2016.12.013_br000135","series-title":"Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17\u201321 September, 2007","first-page":"331","article-title":"Implications of radio fingerprinting on the security of sensor networks","author":"Rasmussen","year":"2007"},{"key":"10.1016\/j.future.2016.12.013_br000140","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s11235-009-9220-7","article-title":"Performance analysis of unslotted CSMA\/CA in wireless networks","volume":"44","author":"Lauwens","year":"2010","journal-title":"Telecommun. Syst."},{"key":"10.1016\/j.future.2016.12.013_br000145","series-title":"Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, Baltimore, MD, USA, November 3\u20135, 2004","first-page":"162","article-title":"Tinysec: A link layer security architecture for wireless sensor networks","author":"Karlof","year":"2004"},{"key":"10.1016\/j.future.2016.12.013_br000150","series-title":"Handbook of Applied Cryptography","author":"Menezes","year":"1996"}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X1630752X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X1630752X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T16:59:18Z","timestamp":1536166758000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X1630752X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":30,"alternative-id":["S0167739X1630752X"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2016.12.013","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2018,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"An over-the-air key establishment protocol using keyless cryptography","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2016.12.013","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}