LoRa-Key: Secure Key Generation System for LoRa-Based Network
暂无分享,去创建一个
Sanjay Jha | Wen Hu | Weitao Xu | Wen Hu | Weitao Xu | Sanjay Jha
[1] Y. Rachlin,et al. The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[2] Ueli Maurer,et al. Linking information reconciliation and privacy amplification , 1997, Journal of Cryptology.
[3] Neil W. Bergmann,et al. Gait-Key , 2017, ACM Trans. Sens. Networks.
[4] P. J. Marcelis,et al. DaRe: Data Recovery through Application Layer Coding for LoRaWAN , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).
[5] Prasant Mohapatra,et al. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[6] Henri Ruotsalainen,et al. Towards Wireless Secret key Agreement with LoRa Physical Layer , 2018, ARES.
[7] Sanjay Jha,et al. DLINK: Dual link based radio frequency fingerprinting for wearable devices , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).
[8] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[9] Jie Yang,et al. Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[10] Gang Wang,et al. Gaussian field consensus: A robust nonparametric matching method for outlier rejection , 2018, Pattern Recognit..
[11] Qian Zhang,et al. Secret from Muscle: Enabling Secure Pairing with Electromyography , 2016, SenSys.
[12] Sanjay Jha,et al. Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[13] Lajos Hanzo,et al. Channel-Envelope Differencing Eliminates Secret Key Correlation: LoRa-Based Key Generation in Low Power Wide Area Networks , 2018, IEEE Transactions on Vehicular Technology.
[14] Hideichi Sasaoka,et al. IEEE802.15.4 ESPARSKey (Encryption Scheme Parasite Array Radiator Secret Key) , 2006 .
[15] Massimo Fornasier,et al. Compressive Sensing , 2015, Handbook of Mathematical Methods in Imaging.
[16] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[17] Marco Gruteser,et al. Wireless device identification with radiometric signatures , 2008, MobiCom '08.
[18] S. Frick,et al. Compressed Sensing , 2014, Computer Vision, A Reference Guide.
[19] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[20] William H. Press,et al. Numerical recipes , 1990 .
[21] Wen Hu,et al. GaitLock: Protect Virtual and Augmented Reality Headsets Using Gait , 2019, IEEE Transactions on Dependable and Secure Computing.
[22] Neil W. Bergmann,et al. Walkie-Talkie: Motion-Assisted Automatic Key Generation for Secure On-Body Device Communication , 2016, 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[23] Huaxiang Zhang,et al. A Weighted Sparse Neighbourhood-Preserving Projections for Face Recognition , 2017 .
[24] Xudong Wang,et al. Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.
[25] Syed Taha Ali,et al. Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices , 2014, IEEE Transactions on Mobile Computing.
[26] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[27] Xiang-Yang Li,et al. Instant and Robust Authentication and Key Agreement among Mobile Devices , 2016, CCS.
[28] R.G. Baraniuk,et al. Compressive Sensing [Lecture Notes] , 2007, IEEE Signal Processing Magazine.
[29] Wayne E. Stark,et al. Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..
[30] Yang Wang,et al. Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.
[31] Ivan Martinovic,et al. Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis , 2010, ArXiv.
[32] Sanjay Jha,et al. Secure key generation and distribution protocol for wearable devices , 2016, 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[33] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[34] Jie Yang,et al. Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation , 2014, IEEE Transactions on Mobile Computing.
[35] Yong Xiang,et al. On the Security of Compressed Sensing-Based Signal Cryptosystem , 2015, IEEE Transactions on Emerging Topics in Computing.
[36] Yao Zhao,et al. Multiple Description Coding With Randomly and Uniformly Offset Quantizers , 2014, IEEE Transactions on Image Processing.
[37] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[38] Martin J. Wainwright,et al. Information-Theoretic Limits on Sparse Signal Recovery: Dense versus Sparse Measurement Matrices , 2008, IEEE Transactions on Information Theory.
[39] Panlong Yang,et al. SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference , 2013, IEEE Transactions on Information Forensics and Security.
[40] W. Press,et al. Savitzky-Golay Smoothing Filters , 2022 .
[41] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.