Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security
暂无分享,去创建一个
Mohammad Abdullah Al Faruque | Jiang Wan | Anthony Bahadir Lopez | M. A. Faruque | Jiang Wan | A. Lopez
[1] Pascal Lorenz,et al. Wireless communication technologies for ITS applications [Topics in Automotive Networking] , 2010, IEEE Communications Magazine.
[2] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[3] Marco Gruteser,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 Key Agreement Algorithms for Vehicular Communicatio , 2022 .
[4] Daniel E. Holcomb,et al. Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers , 2009, IEEE Transactions on Computers.
[5] Ludovic Apvrille,et al. Car2X Communication: Securing the Last Meter - A Cost-Effective Approach for Ensuring Trust in Car2X Applications Using In-Vehicle Symmetric Cryptography , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).
[6] Arquimedes Canedo,et al. Functional Model-Based Design Methodology for Automotive Cyber-Physical Systems , 2017, IEEE Systems Journal.
[7] J. Rodgers,et al. Thirteen ways to look at the correlation coefficient , 1988 .
[8] Prasant Mohapatra,et al. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[9] Srivaths Ravi,et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.
[10] Elaine B. Barker,et al. Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths , 2011 .
[11] Elaine B. Barker,et al. SP 800-57. Recommendation for Key Management, Part 1: General (revised) , 2007 .
[12] G. Edward Suh,et al. Physical Unclonable Functions for Device Authentication and Secret Key Generation , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[13] Lingyang Song,et al. Physical Layer Security in Wireless Communications , 2013 .
[14] Sneha Kumar Kasera,et al. Efficient High-Rate Secret Key Extraction in Wireless Sensor Networks Using Collaboration , 2014, TOSN.
[15] Nader Moayeri,et al. Design of Secure and Application-Oriented VANETs , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[16] Aggelos Kiayias,et al. On passive inference attacks against physical-layer key extraction? , 2011, EUROSEC '11.
[17] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[18] William E. Burr,et al. Recommendation for Key Management, Part 1: General , 2005 .
[19] Christian Weií,et al. V2X communication in Europe - From research projects towards standardization and field testing of vehicle communication technology , 2011 .
[20] Ahmad Al-Daraiseh,et al. Toward Secure Vehicular Ad-hoc Networks: A Survey , 2012 .
[21] Torsten Schütze,et al. Automotive Security : Cryptography for Car 2 X Communication , 2011 .
[22] Mohamed-Slim Alouini,et al. Digital Communication over Fading Channels: Simon/Digital Communications 2e , 2004 .
[23] Mike Lukuc,et al. Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application , 2014 .
[24] Matthew Green,et al. Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.
[25] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[26] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[27] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[28] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.
[29] Alberto L. Sangiovanni-Vincentelli,et al. An efficient wire routing and wire sizing algorithm for weight minimization of automotive systems , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[30] S. Devadas,et al. PUF-Based Random Number Generation , 2004 .
[31] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[32] Miodrag Potkonjak,et al. Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[33] William E. Burr,et al. Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .
[34] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[35] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[36] Eike Kiltz,et al. Secure Hybrid Encryption from Weakened Key Encapsulation , 2007, CRYPTO.
[37] T. ElBatt,et al. Potential for Intra-Vehicle Wireless Automotive Sensor Networks , 2006, 2006 IEEE Sarnoff Symposium.
[38] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[39] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[40] van den,et al. Entropy analysis of physical unclonable functions , 2012 .