Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation
暂无分享,去创建一个
Jie Yang | Yingying Chen | Hongbo Liu | Can Emre Koksal | Yan Wang | C. E. Koksal | Yingying Chen | J. Yang | Hongbo Liu | Yan Wang
[1] Ivan Martinovic,et al. Secret keys from entangled sensor motes: implementation and analysis , 2010, WiSec '10.
[2] Hairong Qi,et al. Self-certified group key generation for ad hoc clusters in wireless sensor networks , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..
[3] Michael A. Jensen,et al. Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits , 2009, 2009 3rd European Conference on Antennas and Propagation.
[4] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[5] Sneha Kumar Kasera,et al. Robust uncorrelated bit extraction methodologies for wireless sensors , 2010, IPSN '10.
[6] Robert A. Meyers,et al. Encyclopedia of telecommunications , 1988 .
[7] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[8] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[9] John McEachen,et al. Unconditionally secure communications over fading channels , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[10] Gene Tsudik,et al. Tree-based group key agreement , 2004, TSEC.
[11] C. W. Farrow,et al. A continuously variable digital delay element , 1988, 1988., IEEE International Symposium on Circuits and Systems.
[12] John G. Proakis. Wiley encyclopedia of telecommunications , 2003 .
[13] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[14] Alex Reznik,et al. Group Secret Key Generation Algorithms , 2007, 2007 IEEE International Symposium on Information Theory.
[15] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result , 2003, IEEE Trans. Inf. Theory.
[16] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[17] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[18] Alexander Barg,et al. Secret Key Generation for a Pairwise Independent Network Model , 2008, IEEE Transactions on Information Theory.
[19] Imre Csiszár,et al. Secrecy capacities for multiple terminals , 2004, IEEE Transactions on Information Theory.
[20] Alex Reznik,et al. Extracting Secrecy from Jointly Gaussian Random Variables , 2006, 2006 IEEE International Symposium on Information Theory.
[21] Stephen W. Neville,et al. Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).
[22] Ueli Maurer,et al. Unconditionally Secure Key Agreement and the Intrinsic Conditional Information , 1999, IEEE Trans. Inf. Theory.
[23] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[24] Rao Yarlagadda,et al. Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..
[25] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[26] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[27] Alex Reznik,et al. On the Secrecy Capabilities of ITU Channels , 2007, 2007 IEEE 66th Vehicular Technology Conference.
[28] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[29] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[30] Prakash Narayan,et al. Perfect Omniscience, Perfect Secrecy, and Steiner Tree Packing , 2010, IEEE Transactions on Information Theory.
[31] Jon W. Wallace. Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits , 2009, 2009 IEEE International Conference on Communications.
[32] Prasant Mohapatra,et al. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[33] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[34] Jie Yang,et al. Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[35] Imre Csiszár,et al. Common randomness and secret key generation with a helper , 2000, IEEE Trans. Inf. Theory.
[36] Guihai Chen,et al. Extracting secret key from wireless link dynamics in vehicular environments , 2013, 2013 Proceedings IEEE INFOCOM.
[37] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.
[38] Stark C. Draper,et al. Minimum energy per bit for secret key acquisition over multipath wireless channels , 2009, 2009 IEEE International Symposium on Information Theory.
[39] Abbas Jamalipour,et al. Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[40] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.