Efficient physical layer key generation technique in wireless communications
暂无分享,去创建一个
Li Xu | He Fang | Chuan Huang | Rushan Lin
[1] Lajos Hanzo,et al. Learning-Aided Physical Layer Authentication as an Intelligent Process , 2018, IEEE Transactions on Communications.
[2] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[3] Kyung-Ah Shim,et al. A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks , 2016, IEEE Communications Surveys & Tutorials.
[4] Khalid A. Darabkh,et al. A Physical-Layer Key Distribution Mechanism for IoT Networks , 2019, Mobile Networks and Applications.
[5] Xianbin Wang,et al. Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication , 2018, IEEE Transactions on Vehicular Technology.
[6] Rong Jin,et al. Delay Analysis of Physical-Layer Key Generation in Dynamic Roadside-to-Vehicle Networks , 2017, IEEE Transactions on Vehicular Technology.
[7] I. Johnstone,et al. Adapting to Unknown Smoothness via Wavelet Shrinkage , 1995 .
[8] Berna Özbek,et al. Key Error Rates in Physical Layer Key Generation: Theoretical Analysis and Measurement-Based Verification , 2017, IEEE Wireless Communications Letters.
[9] Radomir S. Stankovic,et al. The Haar wavelet transform: its status and achievements , 2003, Comput. Electr. Eng..
[10] Chen Sun,et al. Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems , 2018, IEEE Communications Letters.
[11] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[12] Jianfeng Ma,et al. Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks , 2017, IEEE Access.
[13] Yuexing Peng,et al. Secret Key Generation Based on Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels , 2017, IEEE Transactions on Wireless Communications.
[14] Sneha Kumar Kasera,et al. Robust uncorrelated bit extraction methodologies for wireless sensors , 2010, IPSN '10.
[15] Junqing Zhang,et al. Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.
[16] Junqing Zhang,et al. Verification of Key Generation from Individual OFDM Subcarrier's Channel Response , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[17] Y.-W. Peter Hong,et al. Vector Quantization and Clustered Key Mapping for Channel-Based Secret Key Generation , 2017, IEEE Transactions on Information Forensics and Security.
[18] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[19] Zhen Yang,et al. The Security Network Coding System With Physical Layer Key Generation in Two-Way Relay Networks , 2018, IEEE Access.
[20] Nianmin Yao,et al. On the using of discrete wavelet transform for physical layer key generation , 2017, Ad Hoc Networks.
[21] Li Zhou,et al. Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase , 2017, Mob. Inf. Syst..
[22] Jonathan Rodriguez,et al. A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation , 2017, IEEE Transactions on Vehicular Technology.
[23] Jingjing Huang,et al. Dynamic secret key generation exploiting Ultra-wideband wireless channel characteristics , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).
[24] Guihai Chen,et al. Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios , 2017, IEEE Transactions on Mobile Computing.
[25] Yuan Ding,et al. Experimental study on channel reciprocity in wireless key generation , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[26] Lenan Wu,et al. A Secret Key Extraction Technique Applied in Vehicular Networks , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.
[27] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[28] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..
[29] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[30] Kai Zeng,et al. Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.