Channel-Envelope Differencing Eliminates Secret Key Correlation: LoRa-Based Key Generation in Low Power Wide Area Networks
暂无分享,去创建一个
[1] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[2] Aydin Sezgin,et al. The Passive Eavesdropper Affects My Channel: Secret-Key Rates under Real-World Conditions , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[3] Thomas H. Clausen,et al. A Study of LoRa: Long Range & Low Power Networks for the Internet of Things , 2016, Sensors.
[4] Xudong Wang,et al. Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.
[5] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[6] B. L. Yeap,et al. Turbo Coding, Turbo Equalisation and Space-Time Coding , 2002 .
[7] Junqing Zhang,et al. Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.
[8] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[9] Sneha Kumar Kasera,et al. Secret key extraction using Bluetooth wireless signal strength measurements , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[10] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[11] Can Emre Koksal,et al. Secret Key Generation Via Localization and Mobility , 2015, IEEE Transactions on Vehicular Technology.
[12] Henri Ruotsalainen,et al. Towards Wireless Secret key Agreement with LoRa Physical Layer , 2018, ARES.
[13] Christof Paar,et al. Authenticated key establishment for low-resource devices exploiting correlated random channels , 2016, Comput. Networks.
[14] Marco Gruteser,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY 1 Key Agreement Algorithms for Vehicular Communicatio , 2022 .
[15] Yuan Ding,et al. Experimental study on channel reciprocity in wireless key generation , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[16] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[17] U. Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.
[18] Qian Xu,et al. Experimental Study on Key Generation for Physical Layer Security in Wireless Communications , 2016, IEEE Access.