Phase Jamming Attack: A Practical Attack on Physical layer-Based Key Derivation
暂无分享,去创建一个
S. Mohammad Razavizadeh | Seyed Mohamad Mirhoseini Nejad | S. M. Razavizadeh | Ali Rahmanpour | Seyed Morteza Mirhoseini Nejad | Ali Rahmanpour
[1] T. Aono,et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels , 2005, IEEE Transactions on Antennas and Propagation.
[2] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[3] Dariush Abbasi-Moghadam,et al. Energy Detector in Ultra Wideband Systems Using Phase Compensation Technique , 2014, Wirel. Pers. Commun..
[4] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[5] Vahid Tabataba Vakili,et al. Enhancement of Physical Layer Security Using Destination Artificial Noise Based on Outage Probability , 2016, Wireless Personal Communications.
[6] Mudhakar Srivatsa,et al. Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary , 2012, IEEE/ACM Transactions on Networking.
[7] Nico Döttling,et al. Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity , 2010, WISA.
[8] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[9] Vahid Tabataba Vakili,et al. Secure resource allocation for the SISO-OFDM wiretap channel , 2017, IET Commun..
[10] Wayne E. Stark,et al. Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..
[11] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[12] Ivan Martinovic,et al. A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols , 2012, ESORICS.
[13] Gregory W. Wornell,et al. Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks , 2003, IEEE Trans. Inf. Theory.
[14] Kai Zeng,et al. Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[15] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.