Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios
暂无分享,去创建一个
Guihai Chen | Fengyuan Xu | Qun Li | Chiu Chiang Tan | Xiaojun Zhu | Edmund Novak | C. C. Tan | Qun A. Li | Guihai Chen | Fengyuan Xu | Ed Novak | Xiaojun Zhu
[1] Fengyuan Xu,et al. IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.
[2] Yang Wang,et al. Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.
[3] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[4] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[5] John Shawe-Taylor,et al. Canonical Correlation Analysis: An Overview with Application to Learning Methods , 2004, Neural Computation.
[6] Michael Rice,et al. Digital Communications: A Discrete-Time Approach , 2008 .
[7] Dong Xuan,et al. Link-layer protection in 802.11i WLANS with dummy authentication , 2009, WiSec '09.
[8] Jie Yang,et al. Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation , 2014, IEEE Transactions on Mobile Computing.
[9] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..
[10] Xudong Wang,et al. Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.
[11] Bo Sheng,et al. Privacy-aware routing in sensor networks , 2009, Comput. Networks.
[12] Suhas N. Diggavi,et al. Exchanging pairwise secrets efficiently , 2013, 2013 Proceedings IEEE INFOCOM.
[13] Bruce L. Brown,et al. Partial Correlation Coefficients , 2005 .
[14] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[15] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[16] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[17] Jie Yang,et al. Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[18] Aggelos Kiayias,et al. On passive inference attacks against physical-layer key extraction? , 2011, EUROSEC '11.
[19] Guihai Chen,et al. Extracting secret key from wireless link dynamics in vehicular environments , 2013, 2013 Proceedings IEEE INFOCOM.
[20] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[21] G. Terrell,et al. Iterated grid search algorithm on unimodal criteria , 1997 .
[22] Fang Liu,et al. SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks , 2008, IEEE Transactions on Mobile Computing.
[23] Yih-Chun Hu,et al. The impact of key assignment on VANET privacy , 2010, Secur. Commun. Networks.
[24] G. Schwarz. Estimating the Dimension of a Model , 1978 .
[25] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..
[26] Wen-Liang Hung. Partial Correlation Coefficients of Intuitionistic Fuzzy Sets , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[27] Manuel Blum. Independent unbiased coin flips from a correlated biased source—A finite state markov chain , 1986, Comb..
[28] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[29] Fan Bai,et al. Doppler Spread and Coherence Time of Rural and Highway Vehicle-to-Vehicle Channels at 5.9 GHz , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[30] Ronen Shaltiel,et al. Recent Developments in Explicit Constructions of Extractors , 2002, Bull. EATCS.
[31] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[32] P. Elias. The Efficient Construction of an Unbiased Random Sequence , 1972 .
[33] Ivan Martinovic,et al. A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.
[34] Edward W. Knightly,et al. Modulation rate adaptation in urban and vehicular environments: cross-layer implementation and experimental evaluation , 2010, TNET.
[35] Sneha Kumar Kasera,et al. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews , 2008, IEEE Transactions on Mobile Computing.
[36] I. Csiszar,et al. The consistency of the BIC Markov order estimator , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[37] Ivan Martinovic,et al. Secret keys from entangled sensor motes: implementation and analysis , 2010, WiSec '10.
[38] Dina Katabi,et al. Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.
[39] Ozan K. Tonguz,et al. Dynamics of Network Connectivity in Urban Vehicular Networks , 2011, IEEE Journal on Selected Areas in Communications.