Secret Key Exchange and Authentication via Randomized Spatial Modulation and Phase Shifting
暂无分享,去创建一个
[1] Chen-Mou Cheng,et al. Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices , 2013, IEEE Journal on Selected Areas in Communications.
[2] Jitendra K. Tugnait,et al. Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.
[3] Feifei Gao,et al. Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.
[4] P. Grant,et al. Spatial modulation for multiple-antenna wireless systems: a survey , 2011, IEEE Communications Magazine.
[5] Wan Choi,et al. Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.
[6] Larry J. Greenstein,et al. Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.
[7] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[8] Emanuele Viterbo,et al. Signal Space Diversity: A Power- and Bandwidth-Efficient Diversity Technique for the Rayleigh Fading Channel , 1998, IEEE Trans. Inf. Theory.
[9] Lajos Hanzo,et al. A Scalable Performance–Complexity Tradeoff for Constellation Randomization in Spatial Modulation , 2017, IEEE Transactions on Vehicular Technology.
[10] Aydin Sezgin,et al. Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing , 2015, Proceedings of the IEEE.
[11] Alex Reznik,et al. Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.
[12] Michael A. Jensen,et al. Bound on the Key Establishment Rate for Multi-Antenna Reciprocal Electromagnetic Channels , 2014, IEEE Transactions on Antennas and Propagation.
[13] Harald Haas,et al. Bit Error Probability of SM-MIMO Over Generalized Fading Channels , 2012, IEEE Transactions on Vehicular Technology.
[14] Michael A. Jensen,et al. Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.
[15] Marco Gruteser,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 Key Agreement Algorithms for Vehicular Communicatio , 2022 .
[16] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[17] Prasant Mohapatra,et al. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[18] Yi Hong,et al. Unshared Secret Key Cryptography , 2014, IEEE Transactions on Wireless Communications.
[19] Arputharaj Kannan,et al. Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[20] Emad Alsusa,et al. Secret Key Exchange Using Private Random Precoding in MIMO FDD and TDD Systems , 2017, IEEE Transactions on Vehicular Technology.
[21] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[22] Emad Alsusa,et al. Secret key establishment technique using channel state information driven phase randomisation in multiple-input multiple-output orthogonal frequency division multiplexing , 2017, IET Inf. Secur..
[23] Nuwan S. Ferdinand,et al. Physical Layer Secrecy Performance of TAS Wiretap Channels with Correlated Main and Eavesdropper Channels , 2014, IEEE Wireless Communications Letters.
[24] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[25] Richard E. Blahut. Modem Theory: An Introduction to Telecommunications , 2009 .
[26] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[27] Christos Masouros. Improving the Diversity of Spatial Modulation in MISO Channels by Phase Alignment , 2014, IEEE Communications Letters.
[28] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[29] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[30] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[31] Lajos Hanzo,et al. Constellation Randomization Achieves Transmit Diversity for Single-RF Spatial Modulation , 2016, IEEE Transactions on Vehicular Technology.
[32] Stark C. Draper,et al. Secret Key Generation from Sparse Wireless Channels: Ergodic Capacity and Secrecy Outage , 2013, IEEE Journal on Selected Areas in Communications.
[33] Xianbin Wang,et al. A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).