[1] W. Saad, M. Bennis, and M. Chen, "A vision of 6G wireless systems: Applications, trends, technologies, and open research problems," IEEE network, vol. 34, no. 3, pp. 134-142, 2019.
[2] A. Chorti et al., "Context-aware security for 6G wireless: The role of physical layer security," IEEE Communications Standards Magazine, vol. 6, no. 1, pp. 102-108, 2022.
[3] J. Zhang, G. Li, A. Marshall, A. Hu, and L. Hanzo, "A new frontier for IoT security emerging from three decades of key generation relying on wireless channels," IEEE Access, vol. 8, pp. 138406-138446, 2020.
[4] J. Zhang, S. Rajendran, Z. Sun, R. Woods, and L. Hanzo, "Physical layer security for the Internet of Things: Authentication and key generation," IEEE Wireless Communications, vol. 26, no. 5, pp. 92-98, 2019.
[5] G. Li, C. Sun, J. Zhang, E. Jorswieck, B. Xiao, and A. Hu, "Physical layer key generation in 5G and beyond wireless communications: Challenges and opportunities," Entropy, vol. 21, no. 5, p. 497, 2019.
[6] J. Zhang, A. Marshall, and L. Hanzo, "Channel-envelope differencing eliminates secret key correlation: LoRa-based key generation in low power wide area networks," IEEE Transactions on Vehicular Technology, vol. 67, no. 12, pp. 12462-12466, 2018.
[7] C. Zenger, H. Vogt, J. Zimmer, A. Sezgin, and C. Paar, "The passive eavesdropper affects my channel: Secret-key rates under real-world conditions," in 2016 IEEE Globecom Workshops (GC Wkshps), 2016: IEEE, pp. 1-6.
[8] M. Letafati, A. Kuhestani, K.-K. Wong, and M. J. Piran, "A lightweight secure and resilient transmission scheme for the Internet of Things in the presence of a hostile jammer," IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4373-4388, 2020.
[9] M. Letafati, H. Behroozi, B. H. Khalaj, and E. A. Jorswieck, "Hardware-impaired PHY secret key generation with man-in-the-middle adversaries," IEEE Wireless Communications Letters, vol. 11, no. 4, pp. 856-860, 2022.
[10] G. Epiphaniou, P. Karadimas, D. K. B. Ismail, H. Al-Khateeb, A. Dehghantanha, and K.-K. R. Choo, "Nonreciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks," IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2496-2505, 2017.
[11] M. Edman, A. Kiayias, and B. Yener, "On passive inference attacks against physical-layer key extraction?," in Proceedings of the Fourth European Workshop on System Security, 2011, pp. 1-6.
[12] S. Eberz, M. Strohmeier, M. Wilhelm, and I. Martinovic, "A practical man-in-the-middle attack on signal-based key generation protocols," in Computer Security–ESORICS 2012: 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings 17, 2012: Springer, pp. 235-252.
[13] N. Patwari, J. Croft, S. Jana, and S. K. Kasera, "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements," IEEE Transactions on Mobile Computing, vol. 9, no. 1, pp. 17-30, 2009.
[14] O. A. Topal, G. K. Kurt, and H. Yanikomeroglu, "Securing the inter-spacecraft links: Physical layer key generation from Doppler frequency shift," IEEE Journal of Radio Frequency Identification, vol. 5, no. 3, pp. 232-243, 2021.
[15] M. Letafati, A. Kuhestani, H. Behroozi, and D. W. K. Ng, "Jamming-resilient frequency hopping-aided secure communication for Internet-of-Things in the presence of an untrusted relay," IEEE Transactions on Wireless Communications, vol. 19, no. 10, pp. 6771-6785, 2020.
[16] C. Feng and L. Sun, "Physical Layer Key Generation from Wireless Channels with Non-ideal Channel Reciprocity: A Deep Learning Based Approach," in 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring), 2022: IEEE, pp. 1-6.
[17] X. Guan, N. Ding, Y. Cai, and W. Yang, "Wireless key generation from imperfect channel state information: Performance analysis and improvements," in 2019 IEEE International Conference on Communications Workshops (ICC Workshops), 2019: IEEE, pp. 1-6.