Physical Layer Cryptographic Key Generation by Exploiting PMD of an Optical Fiber Link
暂无分享,去创建一个
Ozdal Boyraz | Imam Uz Zaman | Anthony Bahadir Lopez | Mohammad Abdullah Al Faruque | O. Boyraz | M. A. Faruque | A. Lopez | I. Zaman
[1] K. Shaneman,et al. Optical network security: technical analysis of fiber tapping mechanisms and methods for detection & prevention , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..
[2] Miodrag Potkonjak,et al. Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[3] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[4] Peter J. Winzer,et al. Physical layer security in fiber-optic MIMO-SDM systems: An overview , 2018 .
[5] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[6] Wade Trappe,et al. Physical layer secret key generation for fiber-optical networks. , 2013, Optics express.
[7] M. Tur,et al. Polarization Mode Dispersion of Installed Fibers , 2006, Journal of Lightwave Technology.
[8] Ludovic Apvrille,et al. Car2X Communication: Securing the Last Meter - A Cost-Effective Approach for Ensuring Trust in Car2X Applications Using In-Vehicle Symmetric Cryptography , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).
[9] Mohammad Abdullah Al Faruque,et al. A Physical Layer Security Key Generation Technique for Inter-Vehicular Visible Light Communication , 2017 .
[10] P.R. Prucnal,et al. Low-latency nonlinear fiber-based approach for data encryption and anti-jamming in optical network , 2008, LEOS 2008 - 21st Annual Meeting of the IEEE Lasers and Electro-Optics Society.
[11] Changho Suh,et al. Security analysis of quantum key distribution on passive optical networks. , 2017, Optics express.
[12] Travis S. Humble. Quantum security for the physical layer , 2013, IEEE Communications Magazine.
[13] Z. Sipus,et al. Analysis of crosstalk in optical couplers and associated vulnerabilities , 2010, The 33rd International Convention MIPRO.
[14] Sergey Ten. An Introduction to the Fundamentals of PMD in Fibers , 2010 .
[15] Goutam Sanyal,et al. A comparative survey of Symmetric and Asymmetric Key Cryptography , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).
[16] Benedetto Daino,et al. Statistical treatment of the evolution of the principal states of polarization in single-mode fibers , 1990 .
[17] Srivaths Ravi,et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.
[18] Benedetto Daino,et al. Concatenation of polarisation dispersion in single-mode fibres , 1989 .
[19] Mohammad Abdullah Al Faruque,et al. Polarization Mode Dispersion-Based Physical Layer Key Generation for Optical Fiber Link Security , 2017 .
[20] N C Pistoni. Simplified approach to the Jones calculus in retracing optical circuits. , 1995, Applied optics.
[21] Mohammad Abdullah Al Faruque,et al. Exploiting Wireless Channel Randomness to Generate Keys for Automotive Cyber-Physical System Security , 2016, 2016 ACM/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS).