Physical layer secure key generation with nonlinear preprocessing of RSS for power constraint wireless networks

[1]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[2]  Li Yang,et al.  One-way information reconciliation schemes of quantum key distribution , 2019, Cybersecur..

[3]  Yuguang Fang,et al.  Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.

[4]  Chen Sun,et al.  High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing , 2018, IEEE Transactions on Communications.

[5]  Li Xu,et al.  Efficient physical layer key generation technique in wireless communications , 2020, EURASIP J. Wirel. Commun. Netw..

[6]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[7]  Abhay Kumar,et al.  AvDR-Based Wireless Secure Key Generation with Colored Noise for IoT , 2020 .

[8]  Sneha Kumar Kasera,et al.  High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.

[9]  A. Ambekar,et al.  Improving channel reciprocity for effective key management systems , 2012, 2012 International Symposium on Signals, Systems, and Electronics (ISSSE).

[10]  Christof Paar,et al.  Security Analysis of Quantization Schemes for Channel-based Key Extraction , 2015, EAI Endorsed Trans. Security Safety.

[11]  Samee U. Khan,et al.  Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA , 2019, 2019 International Conference on Frontiers of Information Technology (FIT).

[12]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[13]  Nianmin Yao,et al.  On the using of discrete wavelet transform for physical layer key generation , 2017, Ad Hoc Networks.

[14]  Zhao Feng,et al.  Performance of an improved one-way error reconciliation protocol based on key redistribution , 2014, China Communications.

[15]  Joel Max,et al.  Quantizing for minimum distortion , 1960, IRE Trans. Inf. Theory.

[16]  Abhay Kumar,et al.  Performance improvement of wireless secret key generation with colored noise for IoT , 2019, Int. J. Commun. Syst..

[17]  Abhay Kumar,et al.  Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging , 2019, Phys. Commun..

[18]  Mohsen Guizani,et al.  Unleashing the secure potential of the wireless physical layer: Secret key generation methods , 2016, Phys. Commun..

[19]  David L. Neuhoff,et al.  Quantization , 2022, IEEE Trans. Inf. Theory.

[20]  Hsiao-Hwa Chen,et al.  Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[21]  Shay Gueron Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel® Core™ Processors , 2012, 2012 Ninth International Conference on Information Technology - New Generations.

[22]  Qi Shi,et al.  A Novel Physical Layer Secure Key Generation and Refreshment Scheme for Wireless Sensor Networks , 2018, IEEE Access.