Retrodirective-Assisted Secure Wireless Key Establishment
暂无分享,去创建一个
[1] Wenliang Du,et al. Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.
[2] Prasant Mohapatra,et al. Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller , 2013, IEEE Transactions on Mobile Computing.
[3] A. Kraskov,et al. Estimating mutual information. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[4] Stephen W. Neville,et al. Applying Beamforming to Address Temporal Correlation in Wireless Channel Characterization-Based Secret Key Generation , 2012, IEEE Transactions on Information Forensics and Security.
[5] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[6] Junqing Zhang,et al. Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.
[7] Balasubramaniam Natarajan,et al. MIMO-Based Secret Key Generation Strategies: Rate Analysis , 2014, Int. J. Mob. Comput. Multim. Commun..
[8] Mohsen Guizani,et al. Unleashing the secure potential of the wireless physical layer: Secret key generation methods , 2016, Phys. Commun..
[9] Vincent Fusco,et al. Modulation Insensitive PLL for Tracking Antenna Applications , 2015 .
[10] Maarten van der Vorst,et al. SATCOM Retrodirective Array , 2016, IEEE Transactions on Microwave Theory and Techniques.
[11] Tony Q. S. Quek,et al. Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.
[12] Yang Wang,et al. Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.
[13] V.F. Fusco,et al. A high performance analogue retrodirective phase conjugation circuit with RX array factor combination ability , 2011, 2011 IEEE MTT-S International Microwave Symposium.
[14] Pedro Pinho,et al. Smart Surfaces: Large Area Electronics Systems for Internet of Things Enabled by Energy Harvesting , 2014, Proceedings of the IEEE.
[15] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[16] Tim Güneysu,et al. Information reconciliation schemes in physical-layer security: A survey , 2016, Comput. Networks.
[17] Vincent Fusco,et al. Improved physical layer secure wireless communications using a directional modulation enhanced retrodirective array , 2014, 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS).
[18] Marco Gruteser,et al. Random channel hopping schemes for key agreement in wireless networks , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.
[19] Vincent Fusco,et al. Developments in retrodirective array technology , 2013 .
[20] Panlong Yang,et al. SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference , 2013, IEEE Transactions on Information Forensics and Security.
[21] Kai Zeng,et al. Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[22] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[23] V. Erceg,et al. TGn Channel Models , 2004 .
[24] H. Sasaoka,et al. Adaptive key generation in secret key agreement scheme based on the channel characteristics in OFDM , 2008, 2008 International Symposium on Information Theory and Its Applications.
[25] Tian Ling Zhang,et al. Overview on the Phase Conjugation Techniques of the Retrodirective Array , 2010 .
[26] Stark C. Draper,et al. Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.
[27] Jingjing Huang,et al. Secret Key Generation Exploiting Ultra-wideband Indoor Wireless Channel Characteristics , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
[28] Syed Taha Ali,et al. Decorrelating secret bit extraction via channel hopping in body area networks , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[29] V. Fusco,et al. Phase conjugating circuit with frequency offset beam pointing error correction facility for precision retrodirective antenna applications , 2011, 2011 8th European Radar Conference.
[30] David Tse,et al. Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.
[31] Geoffrey Ye Li,et al. Robust channel estimation for OFDM systems with rapid dispersive fading channels , 1998, IEEE Trans. Commun..
[32] V. Fusco,et al. Bi-static 5.8GHz RFID range enhancement using retrodirective techniques , 2011, 2011 41st European Microwave Conference.
[33] Michael A. Jensen,et al. Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits , 2009, 2009 3rd European Conference on Antennas and Propagation.
[34] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[35] Hisato Iwai,et al. Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems , 2011, IEEE Transactions on Information Forensics and Security.
[36] V. Fusco,et al. Analysis and characterization of PLL-based retrodirective array , 2005, IEEE Transactions on Microwave Theory and Techniques.
[37] Prasant Mohapatra,et al. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[38] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[39] Ting Jiang,et al. Physical layer secret key generation scheme used in 60 GHz band , 2014 .
[40] Kui Ren,et al. Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.
[41] Xudong Wang,et al. Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.
[42] Sneha Kumar Kasera,et al. Efficient High-Rate Secret Key Extraction in Wireless Sensor Networks Using Collaboration , 2014, TOSN.
[43] Marco Gruteser,et al. Improving robustness of key extraction from wireless channels with differential techniques , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[44] William Stallings,et al. Cryptography and network security , 1998 .
[45] Yuan Ding,et al. Experimental study on channel reciprocity in wireless key generation , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[46] Sanjay Jha,et al. Mobility Independent Secret Key Generation for Wearable Health-care Devices , 2015, BODYNETS.
[47] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[48] Christof Paar,et al. Security Analysis of Quantization Schemes for Channel-based Key Extraction , 2015, EAI Endorsed Trans. Security Safety.
[49] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[50] Paul V. Brennan. An experimental and theoretical study of self-phased arrays in mobile satellite communications , 1989 .
[51] Sanjay Jha,et al. Secret Key Generation by Virtual Link Estimation , 2015, BODYNETS.
[52] Qian Xu,et al. Experimental Study on Key Generation for Physical Layer Security in Wireless Communications , 2016, IEEE Access.