A Physical-Layer Key Distribution Mechanism for IoT Networks
暂无分享,去创建一个
Khalid A. Darabkh | Saud Althunibat | Moath Alsafasfeh | Abdullah Alhasanat | Mohanad Alhasanat | S. Althunibat | Moath Alsafasfeh | Abdullah Alhasanat | Mohanad Alhasanat
[1] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..
[2] Wayne E. Stark,et al. Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..
[3] Georgios Mantas,et al. Physical-layer entity authentication scheme for mobile MIMO systems , 2018, IET Commun..
[4] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[5] Dieter Hogrefe,et al. On improving the robustness of physical-layer key extraction mechanisms against delay and mobility , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[6] H. Vincent Poor,et al. Multiple-Access Channels With Confidential Messages , 2008, IEEE Transactions on Information Theory.
[7] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[8] Zhu Han,et al. Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[9] Dieter Hogrefe,et al. An Optimal Guard-Intervals Based Mechanism for Key Generation from Multipath Wireless Channels , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.
[10] Kai Zeng,et al. Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[11] Xianbin Wang,et al. Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.
[12] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[13] Mohammad Iftekhar Husain,et al. CD-PHY: Physical layer security in wireless networks through constellation diversity , 2011, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[14] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[15] Akbar M. Sayeed,et al. Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[16] Stark C. Draper,et al. Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.
[17] Athanasios V. Vasilakos,et al. Survey on channel reciprocity based key establishment techniques for wireless systems , 2015, Wirel. Networks.
[18] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[19] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[20] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[21] Aggelos Kiayias,et al. On the Security of Key Extraction From Measuring Physical Quantities , 2013, IEEE Transactions on Information Forensics and Security.
[22] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[23] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[24] Jonathan Rodriguez,et al. A Physical-Layer Security Scheme by Phase-Based Adaptive Modulation , 2017, IEEE Transactions on Vehicular Technology.
[25] Marco Gruteser,et al. Improving robustness of key extraction from wireless channels with differential techniques , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[26] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[27] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[28] Wade Trappe,et al. ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.