| Citation: | LIU Kexin, HUANG Kaizhi, PEI Xinglong, JIN Liang, CHEN Yajun. Physical Layer Key Generation Method for Integrated Sensing and Communication Systems[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT251034 |
| [1] |
LIU Fan, CUI Yuanhao, MASOUROS C, et al. Integrated sensing and communications: Toward dual-functional wireless networks for 6G and beyond[J]. IEEE Journal on Selected Areas in Communications, 2022, 40(6): 1728–1767. doi: 10.1109/JSAC.2022.3156632.
|
| [2] |
GHOSH A, WILD T, DU Jinfeng, et al. A unified future: Integrated sensing and communication (ISAC) in 6G[J]. IEEE Journal of Selected Topics in Electromagnetics, Antennas and Propagation, 2025, 1(1): 365–374. doi: 10.1109/JSTEAP.2025.3603540.
|
| [3] |
WEI Zhiqing, QU Hanyang, WANG Yuan, et al. Integrated sensing and communication signals toward 5G-A and 6G: A survey[J]. IEEE Internet of Things Journal, 2023, 10(13): 11068–11092. doi: 10.1109/JIOT.2023.3235618.
|
| [4] |
LU Shihang, LIU Fan, LI Yunxin, et al. Integrated sensing and communications: Recent advances and ten open challenges[J]. IEEE Internet of Things Journal, 2024, 11(11): 19094–19120. doi: 10.1109/JIOT.2024.3361173.
|
| [5] |
林粤伟, 张奇勋, 尉志青, 等. 通信感知一体化硬件设计——现状与展望[J]. 电子与信息学报, 2025, 47(1): 1–21. doi: 10.11999/JEIT240012.
LIN Yuewei, ZHANG Qixun, WEI Zhiqing, et al. Status and prospect of hardware design on integrated sensing and communication[J]. Journal of Electronics & Information Technology, 2025, 47(1): 1–21. doi: 10.11999/JEIT240012.
|
| [6] |
OSORIO D P M, BARUA B, BESSER K L, et al. The rise of networked ISAC: Emerging aspects and challenges[J]. IEEE Open Journal of the Communications Society, 2025, 6: 5072–5091. doi: 10.1109/OJCOMS.2025.3575729.
|
| [7] |
QU Kaiqian, YE Jia, LI Xuran, et al. Privacy and security in ubiquitous integrated sensing and communication: Threats, challenges and future directions[J]. IEEE Internet of Things Magazine, 2024, 7(4): 52–58. doi: 10.1109/IOTM.001.2300180.
|
| [8] |
MELKI R, NOURA H N, MANSOUR M M, et al. A survey on OFDM physical layer security[J]. Physical Communication, 2019, 32: 1–30. doi: 10.1016/j.phycom.2018.10.008.
|
| [9] |
MATSUMINE T, OCHIAI H, and SHIKATA J. Physical layer security for integrated sensing and communication: A survey[J]. IEEE Open Journal of the Communications Society, 2025, 6: 6690–6743. doi: 10.1109/OJCOMS.2025.3598312.
|
| [10] |
KIHERO A B, FURQAN H M, SAHIN M M, et al. 6G and beyond wireless channel characteristics for physical layer security: Opportunities and challenges[J]. IEEE Wireless Communications, 2024, 31(3): 295–301. doi: 10.1109/MWC.002.2300002.
|
| [11] |
ILLI E, QARAQE M, ALTHUNIBAT S, et al. Physical layer security for authentication, confidentiality, and malicious node detection: A paradigm shift in securing IoT networks[J]. IEEE Communications Surveys & Tutorials, 2024, 26(1): 347–388. doi: 10.1109/COMST.2023.3327327.
|
| [12] |
ZHANG Wei, CHEN Jian, KUO Yonghong, et al. Artificial-noise-aided optimal beamforming in layered physical layer security[J]. IEEE Communications Letters, 2019, 23(1): 72–75. doi: 10.1109/LCOMM.2018.2881182.
|
| [13] |
LIU Peng, FEI Zesong, WANG Xinyi, et al. Outage constrained robust secure beamforming in integrated sensing and communication systems[J]. IEEE Wireless Communications Letters, 2022, 11(11): 2260–2264. doi: 10.1109/LWC.2022.3198683.
|
| [14] |
SU Nanchi, LIU Fan, and MASOUROS C. Sensing-assisted eavesdropper estimation: An ISAC breakthrough in physical layer security[J]. IEEE Transactions on Wireless Communications, 2024, 23(4): 3162–3174. doi: 10.1109/TWC.2023.3306029.
|
| [15] |
LIU Yuemin, LIU Xin, LIU Zechen, et al. Secure rate maximization for ISAC-UAV assisted communication amidst multiple eavesdroppers[J]. IEEE Transactions on Vehicular Technology, 2024, 73(10): 15843–15847. doi: 10.1109/TVT.2024.3412805.
|
| [16] |
YE Chunxuan, MATHUR S, REZNIK A, et al. Information-theoretically secret key generation for fading wireless channels[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2): 240–254. doi: 10.1109/TIFS.2010.2043187.
|
| [17] |
CHEN Chan and JENSEN M A. Secret key establishment using temporally and spatially correlated wireless channel coefficients[J]. IEEE Transactions on Mobile Computing, 2011, 10(2): 205–215. doi: 10.1109/TMC.2010.114.
|
| [18] |
JORSWIECK E A, WOLF A, and ENGELMANN S. Secret key generation from reciprocal spatially correlated MIMO channels[C]. 2013 IEEE Globecom Workshops (GC Wkshps), Atlanta, USA, 2013: 1245–1250. doi: 10.1109/GLOCOMW.2013.6825164.
|
| [19] |
ZHANG Junqing, MARSHALL A, WOODS R, et al. Efficient key generation by exploiting randomness from channel responses of individual OFDM subcarriers[J]. IEEE Transactions on Communications, 2016, 64(6): 2578–2588. doi: 10.1109/TCOMM.2016.2552165.
|
| [20] |
DWIVEDI S, ZOLI M, BARRETO A N, et al. Secure joint communications and sensing using chirp modulation[C]. 2020 2nd 6G Wireless Summit (6G SUMMIT). Levi, Finland, 2020: 1–5. doi: 10.1109/6GSUMMIT49458.2020.9083884.
|
| [21] |
MITEV M, MAYYA A, and CHORTI A. Joint secure communication and sensing in 6G networks[M]. MOHAPATRA P, PAPPAS N, CHORTI A, et al. Physical-layer Security for 6G. Electrical and Electronics Engineers, Inc. , 2024: 203–220. doi: 10.1002/9781394170944.ch10.
|
| [22] |
REN Zixiang, ZHANG Siyao, LI Xinmin, et al. Secure communications in near-field ISCAP systems with extremely large-scale antenna arrays[C]. 2024 19th International Symposium on Wireless Communication Systems (ISWCS), Rio de Janeiro, Brazil, 2024: 1–6. doi: 10.1109/ISWCS61526.2024.10639091.
|
| [23] |
PHAN A H, TUAN H D, KHA H H, et al. Nonsmooth optimization for efficient beamforming in cognitive radio multicast transmission[J]. IEEE Transactions on Signal Processing, 2012, 60(6): 2941–2951. doi: 10.1109/TSP.2012.2189857.
|
| [24] |
WU Huici, FANG Yi, LI Na, et al. Secret key generation with untrusted internal eavesdropper: Token-based anti-eavesdropping[J]. IEEE Transactions on Information Forensics and Security, 2025, 20: 2523–2537. doi: 10.1109/TIFS.2025.3542959.
|
| [25] |
QIN Dongrun and DING Zhi. Exploiting multi-antenna non-reciprocal channels for shared secret key generation[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2693–2705. doi: 10.1109/TIFS.2016.2594143.
|
| [26] |
QU Guanjin, WU Huaming, LI Ruidong, et al. DMRO: A deep meta reinforcement learning-based task offloading framework for edge-cloud computing[J]. IEEE Transactions on Network and Service Management, 2021, 18(3): 3448–3459. doi: 10.1109/TNSM.2021.3087258.
|
| [27] |
FUJIMOTO S, HOOF H, and MEGER D. Addressing function approximation error in actor-critic methods[C]. The 35th International Conference on Machine Learning, Stockholm, Sweden, 2018: 1587–1596.
|