Secret key generation based on channel and distance measurements
暂无分享,去创建一个
[1] G.S. Smith,et al. A direct derivation of a single-antenna reciprocity relation for the time domain , 2004, IEEE Transactions on Antennas and Propagation.
[2] Sneha Kumar Kasera,et al. Mobility Assisted Secret Key Generation Using Wireless Link Signatures , 2010, 2010 Proceedings IEEE INFOCOM.
[3] Li Tan,et al. Digital Signal Processing: Fundamentals and Applications , 2013 .
[4] Raida Al Alawi. RSSI based location estimation in wireless sensors networks , 2011, ICON.
[5] G.B. Giannakis,et al. Localization via ultra-wideband radios: a look at positioning aspects for future sensor networks , 2005, IEEE Signal Processing Magazine.
[6] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[7] C.L. Law,et al. BA–POC-Based Ranging Method With Multipath Mitigation , 2005, IEEE Antennas and Wireless Propagation Letters.
[8] Andreas F. Molisch,et al. Wireless Communications , 2005 .
[9] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[10] Alfred O. Hero,et al. Using proximity and quantized RSS for sensor localization in wireless networks , 2003, WSNA '03.
[11] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..
[12] Robert A. Scholtz,et al. Ranging in a dense multipath environment using an UWB radio link , 2002, IEEE J. Sel. Areas Commun..
[13] Hisashi Kobayashi,et al. Analysis of wireless geolocation in a non-line-of-sight environment , 2006, IEEE Transactions on Wireless Communications.
[14] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[15] Moe Z. Win,et al. Fundamental Limits of Wideband Localization— Part I: A General Framework , 2010, IEEE Transactions on Information Theory.
[16] David Tse,et al. Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .
[17] Can Emre Koksal,et al. Secret key generation from mobility , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[18] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[19] Moe Z. Win,et al. Fundamental Limits of Wideband Localization— Part II: Cooperative Networks , 2010, IEEE Transactions on Information Theory.
[20] B. R. Badrinath,et al. Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[21] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.
[22] Laurence Mailaender,et al. On the Geolocation Bounds for Round-Trip Time-of-Arrival and All Non-Line-of-Sight Channels , 2008, EURASIP J. Adv. Signal Process..
[23] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[24] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.