Efficient DCT-based secret key generation for the Internet of Things
暂无分享,去创建一个
Paul Thomas | Robert J. Piechocki | Xenofon Fafoutis | Theo Tryfonas | George Oikonomou | George Margelis | T. Tryfonas | G. Oikonomou | R. Piechocki | Xenofon Fafoutis | George Margelis | P. Thomas
[1] Prakash Narayan,et al. Secret key and private key constructions for simple multiterminal source models , 2005, ISIT.
[2] Sneha Kumar Kasera,et al. Efficient High-Rate Secret Key Extraction in Wireless Sensor Networks Using Collaboration , 2014, TOSN.
[3] Ivan Martinovic,et al. A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.
[4] Geir M. Køien,et al. Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).
[5] Yao Liu,et al. Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices , 2018, IEEE Trans. Inf. Forensics Secur..
[6] Noel E. O'Connor,et al. Energy-Efficient Hardware Architecture for Variable N-point 1D DCT , 2004, PATMOS.
[7] Syed Taha Ali,et al. Zero reconciliation secret key generation for body-worn health monitoring devices , 2012, WISEC '12.
[8] Theodore Tryfonas,et al. Privacy Leakage of Physical Activity Levels in Wireless Embedded Wearable Systems , 2017, IEEE Signal Processing Letters.
[9] Alexandre J. Pierrot,et al. Experimental aspects of secret key generation in indoor wireless environments , 2013, 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[10] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[11] Stephen W. Neville,et al. Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).
[12] Ueli Maurer,et al. Unconditionally Secure Key Agreement and the Intrinsic Conditional Information , 1999, IEEE Trans. Inf. Theory.
[13] Rudolf Ahlswede,et al. Common Randomness in Information Theory and Cryptography - Part II: CR Capacity , 1998, IEEE Trans. Inf. Theory.
[14] Sanjay Jha,et al. DLINK: Dual link based radio frequency fingerprinting for wearable devices , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).
[15] Ankur Mehta,et al. WARPWING: A complete open source control platform for miniature robots , 2010, 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[16] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[17] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[18] Antonio F. Skarmeta,et al. A decentralized approach for security and privacy challenges in the Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[19] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[20] Paul Thomas,et al. Low Throughput Networks for the IoT: Lessons learned from industrial implementations , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[21] Xenofon Fafoutis,et al. Physical layer secret-key generation with discreet cosine transform for the Internet of Things , 2017, 2017 IEEE International Conference on Communications (ICC).
[22] Qin Wang,et al. A Realistic Energy Consumption Model for TSCH Networks , 2014, IEEE Sensors Journal.
[23] Liang Jin,et al. High-rate secret key generation aided by multiple relays for Internet of Things , 2017 .
[24] Sanjay Jha,et al. Mobility Independent Secret Key Generation for Wearable Health-care Devices , 2015, BODYNETS.
[25] Wayne E. Stark,et al. Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..
[26] Syed Taha Ali,et al. Decorrelating secret bit extraction via channel hopping in body area networks , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[27] Theodore S. Rappaport,et al. Theory of multipath shape factors for small-scale fading wireless channels , 2000 .
[28] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[29] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[30] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[31] Jinho Choi. Secret key transmission for OFDM based machine type communications , 2017, Journal of Communications and Networks.
[32] Theodore Tryfonas,et al. Practical limits of the secret key-capacity for IoT physical layer security , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).
[33] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[34] Niall Twomey,et al. On-Board Feature Extraction from Acceleration Data for Activity Recognition , 2018, EWSN.
[35] Jun Muramatsu,et al. Secret-Key Distribution Based on Bounded Observability , 2015, Proceedings of the IEEE.
[36] Inmaculada Tomeo-Reyes,et al. Efficient high-rate key management technique for wireless body area networks , 2016, 2016 22nd Asia-Pacific Conference on Communications (APCC).
[37] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[38] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.