[1] W. Saad, M. Bennis and M. Chen, "A vision of 6G wireless systems: Applications, trends, technologies, and open research problems," IEEE Network, vol. 34, no. 3, pp. 134–142, May/Jun. 2020.
[2] A. Chorti, A. N. Barreto, S. Kopsell, M. Zoli, M. Chafii, P. Sehier, G. Fettweis, and H. V. Poor, “Context-aware security for 6G wireless The role of physical layer security,” 2021, arXiv:2101.01536. [Online]. Available: https://arxiv.org/abs/2101.01536.
[3] J. Zhang, G. Li, A. Marshall, A. Hu and L. Hanzo, “A new frontier for IoT security emerging from three decades of key generation relying on wireless channels,” IEEE Access, vol. 8, pp. 138406–138446, Jul. 2020.
[4] J. Zhang, S. Rajendran, Z. Sun, R. Woods and L. Hanzo, “Physical layer security for the Internet of Things: Authentication and key generation,” IEEE Wireless Commun., vol. 26, no. 5, pp. 92–98, Oct. 2019.
[5] G. Li, C. Sun, J. Zhang, E. Jorswieck, B. Xiao, A. Hu, “Physical layer key generation in 5G and beyond wireless communications: Challenges and opportunities,” Entropy, vol. 21, no. 5, pp. 1–16, May. 2019.
[6] J. Zhang, A. Marshall and L. Hanzo, “Channel-envelope differencing eliminates secret key correlation: LoRa-based key generation in low power wide area networks,” IEEE Trans. Veh. Technol., vol. 67, no. 12, pp. 12462–12466, Dec. 2018.
[7] C. Zenger, H. Vogt, J. Zimmer, A. Sezgin and C. Paar, “The passive eavesdropper affects my channel: Secret-key rates under real-world conditions,” in 2016 IEEE GLOBECOM Workshops (GC Wkshps), Washington, DC, USA, Dec. 2016, pp. 1–6.
[8] M. Letafati, A. Kuhestani, K. -K. Wong, and M. J. Piran, “A lightweight secure and resilient transmission scheme for the Internet-of-Things in the presence of a hostile jammer,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4373–4388, Mar. 2021.
[9] M. Mitev, A. Chorti, M. Reed, and L. Musavian, “Authenticated secret key generation in delay-constrained wireless systems”, EURASIP J. Wireless Commun. Netw., pp. 1–29, Jun. 2020.
[10] M. Mitev, A. Chorti, E. V. Belmega and M. Reed, “Man-in-the-middle and denial of service attacks in wireless secret key generation,” in 2019 IEEE Global Communications Conference (GLOBECOM), 2019, pp. 1-6.
[11] M. Letafati, H. Behroozi, B. H. Khalaj and E. A. Jorswieck, “Hardware-impaired PHY secret key generation with man-in-the-middle adversaries,” IEEE Wireless Communications Letters, vol. 11, no. 4, pp. 856-860, Apr. 2022.
[12] M. Letafati, H. Behroozi, B. H. Khalaj and E. A. Jorswieck, “Deep learning for hardware-impaired wireless secret key generation with man-in-the-middle attacks,” in 2021 IEEE Global Communications Conference (GLOBECOM), 2021, pp. 1-6.
[13] G. Epiphaniou, P. Karadimas, D. Kbaier Ben Ismail, H. Al-Khateeb, A. Dehghantanha and K. -K. R. Choo, “Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad-hoc social IoT networks,” IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2496-2505, Aug. 2018.
[14] Z. Li, Q. Pei, I. Markwood, Y. Liu, and H. Zhu, “Secret key establishment via RSS trajectory matching between wearable devices,” IEEE Trans. Inf. Foren. Sec., vol. 13, no. 3, pp. 802–817, Mar. 2018.
[15] M. Edman and A. Kiayias, “On passive inference attacks against physical-layer key extraction?” in Proc. 4th Eur. Workshop Syst. Security, 2011, p. 8.
[16] S. Eberz, M. Strohmeier, M. Wilhelm, and I. Martinovic, “A practical man-in-the-middle attack on signal-based key generation protocols,” in Proc. Eur. Symp. Res. Comput. Security, 2012, pp. 235–252.
[17] N. Patwari, J. Croft, S. Jana, and S. K. Kasera, “High-rate uncorrelated bit extraction for shared secret key generation from channel measurements,” IEEE Trans. Mobile Comput., vol. 9, no. 1, pp. 17–30, Jan. 2010.
[18] S. Jana, S. Premnath, M. Clark, S. Kasera, and N. Patwari, “On the effectiveness of secret key extraction from wireless signal strength in real environments,” in Proc. ACM MOBICOM, 2009, pp. 321–332.
[19] Y. Liu, S. C. Draper, and A. M. Sayeed, “Exploiting channel diversity in secret key generation from multipath fading randomness,” IEEE Trans. Inf. Foren. Sec., vol. 7, no. 5, pp. 1484–1497, Oct. 2012.
[20] H. Liu, W. Yang, Y. Jie, and Y. Chen, “Fast and practical secret key extraction by exploiting channel response,” in Proc. IEEE INFOCOM, 2013, pp. 3048–3056.
[21] X. Wei, X. Y. Li, Q. Chen, J. Han, and K. Zhao, “Keep: Fast secret key extraction protocol for D2D communication,” in Proc. IEEE Int. Workshop Qual. Service (IWQoS), 2014, pp. 350–359.
[22] O. A. Topal and G. K. Kurt, “Physical layer authentication for LEO satellite constellations,” in 2022 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1952-1957.
[23] K. Lin, Z. Ji, Y. Zhang, G. Chen, P. L. Yeoh and Z. He, “Secret key generation based on 3D spatial angles for UAV communications,” in 2021 IEEE Wireless Communications and Networking Conference (WCNC), 2021, pp. 1-6.
[24] O. A. Topal, G. K. Kurt and H. Yanikomeroglu, “Securing the inter-spacecraft links: Physical layer key generation from doppler frequency shift,” IEEE Journal of Radio Frequency Identification, vol. 5, no. 3, pp. 232-243, Sept. 2021.
[26] G. Li, H. Yang, J. Zhang, H. Liu and A. Hu, “Fast and secure key generation with channel obfuscation in slowly varying environments,” in 2022 IEEE INFOCOM, IEEE Conference on Computer Communications, pp. 1-10.
[27] C. D. T. Thai, J. Lee and T. Q. S. Quek, “Physical-layer secret key generation with colluding untrusted relays,” IEEE Trans. Wireless Commun., vol. 15, no. 2, pp. 1517-1530, Feb. 2016.
[28] M. Letafati, A. Kuhestani, H. Behroozi, and D. W. K. Ng, “Jammingresilient frequency hopping-aided secure communication for Internet-of-Things in the presence of an untrusted relay,” IEEE Trans. Wireless Commun., vol. 19, no. 10, pp. 6771–6785, Oct. 2020.
[29] Y. Peng, P. Wang, W. Xiang, and Y. Li, “Secret key generation based on estimated channel state information for TDD-OFDM systems over fading channels,” IEEE Trans. Wireless Commun., 2017.
[30] Y. Shehadeh, O. Alfandi, and D. Hogrefe, “Towards robust key extraction from multipath wireless channels,” J. Commun. Net., vol. 14, no. 4, Aug. 2012.
[31] C. Feng and L. Sun, “Physical layer key generation from wireless channels with non-ideal channel reciprocity: A deep learning based approach,” in IEEE 95th Vehicular Technology Conference: (VTC2022-Spring), Helsinki, Finland, 2022, pp. 1-6.
[32] X. Guan, N. Ding, Y. Cai and W. Yang, “Wireless key generation from imperfect channel state information: Performance analysis and improvements,” in IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China, 2019, pp. 1-6.
[33] J. Zhang, B. He, T. Q. Duong, and R. Woods, On the Key Generation from Correlated Wireless Channels, IEEE Commun., Lett., 2007.