Experimental study on channel reciprocity in wireless key generation
暂无分享,去创建一个
Yuan Ding | Junqing Zhang | Trung Quang Duong | Roger F. Woods | Alan J. Marshall | Roger Francis Woods | T. Duong | Yuan Ding | A. Marshall | Junqing Zhang
[1] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[2] Jie Yang,et al. Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[3] Shaojie Tang,et al. KEEP: Fast secret key extraction protocol for D2D communication , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).
[4] Guihai Chen,et al. Extracting secret key from wireless link dynamics in vehicular environments , 2013, 2013 Proceedings IEEE INFOCOM.
[5] Syed Taha Ali,et al. Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices , 2014, IEEE Transactions on Mobile Computing.
[6] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[7] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[8] Junqing Zhang,et al. Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.
[9] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[10] Junqing Zhang,et al. An effective key generation system using improved channel reciprocity , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[11] Yang Wang,et al. Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.
[12] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[13] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[14] Theodore S. Rappaport,et al. Wireless Communications: Principles and Practice (2nd Edition) by , 2012 .
[15] Junqing Zhang,et al. Verification of Key Generation from Individual OFDM Subcarrier's Channel Response , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[16] Sneha Kumar Kasera,et al. Secret key extraction using Bluetooth wireless signal strength measurements , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[17] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..