A Physical Encryption Scheme for Low-Power Wireless M2M Devices: a Dynamic Key Approach
暂无分享,去创建一个
[1] Zhen Yang,et al. Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission , 2016, IEEE Transactions on Wireless Communications.
[2] Junqing Zhang,et al. On the Key Generation From Correlated Wireless Channels , 2017, IEEE Communications Letters.
[3] Jun Fang,et al. Compressive Sensing-Based Multiuser Detection via Iterative Reweighed Approach in M2M Communications , 2018, IEEE Wireless Communications Letters.
[4] Marwan Krunz,et al. Exploiting Frame Preamble Waveforms to Support New Physical-Layer Functions in OFDM-Based 802.11 Systems , 2017, IEEE Transactions on Wireless Communications.
[5] Jehad M. Hamamreh,et al. Secure Orthogonal Transform Division Multiplexing (OTDM) Waveform for 5G and Beyond , 2017, IEEE Communications Letters.
[6] Tao Jiang,et al. A Survey of Emerging M2M Systems: Context, Task, and Objective , 2016, IEEE Internet of Things Journal.
[7] Takahiko Saba,et al. Energy Efficient Artificial Fast Fading for MISO-OFDM Systems , 2014, GLOBECOM 2014.
[8] Guang Gong,et al. A new efficient physical layer OFDM encryption scheme , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[9] Yuh-Ren Tsai,et al. Effective channel perturbation based on cyclic delay for physical layer security in OFDM systems , 2014, 2014 International Conference on Information Science, Electronics and Electrical Engineering.
[10] Takahiko Saba,et al. Time-domain artificial noise generation technique using time-domain and frequency-domain processing for physical layer security in MIMO-OFDM systems , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).
[11] Jaume Barceló,et al. IEEE 802.11AH: the WiFi approach for M2M communications , 2014, IEEE Wireless Communications.
[12] Mohsen Guizani,et al. Unleashing the secure potential of the wireless physical layer: Secret key generation methods , 2016, Phys. Commun..
[13] Li Zhao,et al. Vehicle-to-Everything (v2x) Services Supported by LTE-Based Systems and 5G , 2017, IEEE Communications Standards Magazine.
[14] Hassan N. Noura,et al. ERCA: efficient and robust cipher algorithm for LTE data confidentiality , 2013, MSWiM.
[15] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[16] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[17] Christophe De Vleeschouwer,et al. Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..
[18] Ali Chehab,et al. One round cipher algorithm for multimedia IoT devices , 2018, Multimedia Tools and Applications.
[19] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[20] Junqing Zhang,et al. Design of an OFDM Physical Layer Encryption Scheme , 2017, IEEE Transactions on Vehicular Technology.
[21] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[22] J. Rodgers,et al. Thirteen ways to look at the correlation coefficient , 1988 .
[23] Hassan N. Noura,et al. ERDIA: An efficient and robust data integrity algorithm for mobile and wireless networks , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).
[24] Yeh-Ching Chung,et al. A Dynamic Module Deployment Framework for M2M Platforms , 2017, 2017 IEEE 7th International Symposium on Cloud and Service Computing (SC2).
[25] Ali Chehab,et al. Efficient and Secure Physical Encryption Scheme for Low-Power Wireless M2M Devices , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
[26] Junqing Zhang,et al. Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.