DroneKey: A Drone-Aided Group-Key Generation Scheme for Large-Scale IoT Networks
暂无分享,去创建一个
Yanchao Zhang | Yan Zhang | Jiawei Li | Dianqi Han | Ang Li | Tao Li | Jiawei Li | Ang Li | Dianqi Han | Yan Zhang | Tao Li | Yanchao Zhang
[1] Jie Yang,et al. Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation , 2014, IEEE Transactions on Mobile Computing.
[2] Tony Q. S. Quek,et al. Secret Group Key Generation in Physical Layer for Mesh Topology , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[3] Aiqun Hu,et al. Lightweight Group Secret Key Generation Leveraging Non-Reconciled Received Signal Strength in Mobile Wireless Networks , 2019, 2019 IEEE International Conference on Communications Workshops (ICC Workshops).
[4] Sinem Coleri Ergen,et al. Channel estimation techniques based on pilot arrangement in OFDM systems , 2002, IEEE Trans. Broadcast..
[5] Falko Dressler,et al. Performance Assessment of IEEE 802.11p with an Open Source SDR-Based Prototype , 2018, IEEE Transactions on Mobile Computing.
[6] Rao Yarlagadda,et al. Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..
[7] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[8] Yang Wang,et al. Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.
[9] J. H. Zar,et al. Spearman Rank Correlation , 2005 .
[10] Dwijendra K. Ray-Chaudhuri,et al. Binary mixture flow with free energy lattice Boltzmann methods , 2022, arXiv.org.
[11] Kefei Chen,et al. A key management protocol with robust continuity for sensor networks , 2009, Comput. Stand. Interfaces.
[12] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[13] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[14] Alex Reznik,et al. Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.
[15] Wu Yuezhong,et al. Auto-Key , 2020, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..
[16] Junqing Zhang,et al. Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.
[17] Hung-Min Sun,et al. A Pair-wise Key Establishment Scheme for Wireless Sensor Networks , 2009 .
[18] Umberto Mengali,et al. A comparison of pilot-aided channel estimation methods for OFDM systems , 2001, IEEE Trans. Signal Process..
[19] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[20] Hairong Qi,et al. Self-certified group key generation for ad hoc clusters in wireless sensor networks , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..
[21] Jun Ni,et al. Group Secret Key Generation Algorithm from Wireless Signal Strength , 2012, 2012 Sixth International Conference on Internet Computing for Science and Engineering.
[22] Chik How Tan,et al. Energy-efficient and scalable group key agreement for large ad hoc networks , 2005, PE-WASUN '05.
[23] Kin K. Leung,et al. Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization , 2016, IEEE Transactions on Information Forensics and Security.
[24] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[25] J. Harshan,et al. Group Secret-Key Generation using Algebraic Rings in Wireless Networks , 2018 .
[26] H. Abdi. The Kendall Rank Correlation Coefficient , 2007 .
[27] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[28] Sanjay Kumar Madria,et al. A secure hierarchical model for sensor network , 2004, SGMD.
[29] Tianyu Tang,et al. Group secret key generation in physical layer, protocols and achievable rates , 2017, 2017 17th International Symposium on Communications and Information Technologies (ISCIT).
[30] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[31] Thinh Nguyen,et al. Distance Based Thresholds for Cluster Head Selection in Wireless Sensor Networks , 2012, IEEE Communications Letters.
[32] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[33] John McEachen,et al. Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[34] Elisa Bertino,et al. Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.
[35] Jin Liu,et al. A key management scheme based on grouping within cluster , 2014, Proceeding of the 11th World Congress on Intelligent Control and Automation.
[36] Chirag Prajapati,et al. Energy Efficient Cluster Head Selection in Wireless Sensor Networks , 2014 .
[37] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.