Towards an Effective Secret Key Generation Scheme for Imperfect Channel State Information
暂无分享,去创建一个
Li Zhou | Chunsheng Zhu | Dongtang Ma | Jibo Wei | Wei Li | Longwang Cheng
[1] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[2] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[3] C. Burrus,et al. Optimal wavelet representation of signals and the wavelet sampling theorem , 1994 .
[4] Jie Yang,et al. Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation , 2014, IEEE Transactions on Mobile Computing.
[5] Mounir Ghogho,et al. Secure communications via sending artificial noise by both transmitter and receiver: optimum power allocation to minimise the insecure region , 2014, IET Commun..
[6] A. Ambekar,et al. Improving channel reciprocity for effective key management systems , 2012, 2012 International Symposium on Signals, Systems, and Electronics (ISSSE).
[7] C. Burrus,et al. Introduction to Wavelets and Wavelet Transforms: A Primer , 1997 .
[8] Victor C. M. Leung,et al. Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper , 2016, IEEE Access.
[9] Victor C. M. Leung,et al. Radiated Power Scaling Factor and Its Effect on The Secrecy Performance of Multi-user Massive MIMO System , 2015, MSCC '15.
[10] Takahiro Hara,et al. A survey on communication and data management issues in mobile sensor networks , 2014, Wirel. Commun. Mob. Comput..
[11] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[12] Hans D. Schotten,et al. Enhancing Channel Reciprocity for Effective Key Management in Wireless Ad-Hoc Networks , 2014, 2014 IEEE 79th Vehicular Technology Conference (VTC Spring).
[13] Dongtang Ma,et al. Secret key generation via random beamforming in stationary environment , 2015, 2015 International Conference on Wireless Communications & Signal Processing (WCSP).
[14] Junqing Zhang,et al. An effective key generation system using improved channel reciprocity , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[15] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[16] A. Ambekar,et al. Improved method of secret key generation based on variations in wireless channel , 2012, 2012 19th International Conference on Systems, Signals and Image Processing (IWSSIP).
[17] Xianbin Wang,et al. Secret Key Generation Using Physical Channels with Imperfect CSI , 2014, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall).
[18] W. C. Jakes,et al. Microwave Mobile Communications , 1974 .