Secret Key Agreement for Data Dissemination in Vehicular Platoons
暂无分享,去创建一个
Eduardo Tovar | Mohsen Guizani | Lingyun Lu | Wei Ni | Kai Li | Kai Li | Wei Ni | M. Guizani | E. Tovar | Ling-yun Lu
[1] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[2] Kui Ren,et al. Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.
[3] Hans A. Hansson,et al. The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication , 2016, 2016 Euromicro Conference on Digital System Design (DSD).
[4] Xudong Wang,et al. Fast secret key generation in static wireless networks: A virtual channel approach , 2013, 2013 Proceedings IEEE INFOCOM.
[5] Xiang Zhang,et al. A Survey on Platoon-Based Vehicular Cyber-Physical Systems , 2016, IEEE Communications Surveys & Tutorials.
[6] Montserrat Ros,et al. A Comparative Survey of VANET Clustering Techniques , 2017, IEEE Communications Surveys & Tutorials.
[7] Eduardo Tovar,et al. PELE: Power efficient legitimate eavesdropping via jamming in UAV communications , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[8] Hannes Hartenstein,et al. A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.
[9] Danya Yao,et al. A Survey of Traffic Control With Vehicular Communications , 2014, IEEE Transactions on Intelligent Transportation Systems.
[10] Eduardo Tovar,et al. Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels , 2019, Sensors.
[11] Jie Xu,et al. Proactive Eavesdropping via Jamming over HARQ-Based Communications , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[12] Eduardo Tovar,et al. LCD: Low Latency Command Dissemination for a Platoon of Vehicles , 2018, 2018 IEEE International Conference on Communications (ICC).
[13] Kai Zeng,et al. Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[14] Kin K. Leung,et al. Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization , 2016, IEEE Transactions on Information Forensics and Security.
[15] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[16] Falko Dressler,et al. Let's talk in groups: A distributed bursting scheme for cluster-based vehicular applications , 2017, Veh. Commun..
[17] Xin Wang,et al. Energy-Efficient Cooperative Relaying for Unmanned Aerial Vehicles , 2016, IEEE Transactions on Mobile Computing.
[18] Sanjay Jha,et al. Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting , 2016, IEEE Transactions on Mobile Computing.
[19] Robert A Ferlis. The Dream of the Automated Highway , 2007 .
[20] E. Chan. Overview of the SARTRE Platooning Project: Technology Leadership Brief , 2012 .
[21] Rong Jin,et al. Practical Secret Key Agreement for Full-Duplex Near Field Communications , 2014, IEEE Transactions on Mobile Computing.
[22] Prasant Mohapatra,et al. Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller , 2013, IEEE Transactions on Mobile Computing.
[23] Gregory D. Durgin,et al. Space-Time Wireless Channels , 2002 .
[24] Eduardo Tovar,et al. Poster Abstract: Privacy-preserving Control Message Dissemination for PVCPS , 2019, 2019 18th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
[25] Anthony Bahadir Lopez,et al. Physical Layer Key Generation for Wireless Communication Security in Automotive Cyber-Physical Systems , 2017 .
[26] Stark C. Draper,et al. Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.
[27] Rong Jin,et al. Delay Analysis of Physical-Layer Key Generation in Dynamic Roadside-to-Vehicle Networks , 2017, IEEE Transactions on Vehicular Technology.
[28] Pin-Han Ho,et al. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[29] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[30] Ning Zhang,et al. Cooperative Key Agreement for Wireless Networking: Key Rates and Practical Protocol Design , 2014, IEEE Transactions on Information Forensics and Security.
[31] MengChu Zhou,et al. Routing in Internet of Vehicles: A Review , 2015, IEEE Transactions on Intelligent Transportation Systems.
[32] Mohsen Guizani,et al. Performance Evaluation of IEEE 802.15.4 Nonbeacon-Enabled Mode for Internet of Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.
[33] Panlong Yang,et al. SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference , 2013, IEEE Transactions on Information Forensics and Security.
[34] Yang Wang,et al. Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.
[35] Gregory Epiphaniou,et al. Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks , 2018, IEEE Internet of Things Journal.
[36] Eduardo Tovar,et al. Energy Efficient Legitimate Wireless Surveillance of UAV Communications , 2019, IEEE Transactions on Vehicular Technology.
[37] Eduardo Tovar,et al. Cooperative Key Generation for Data Dissemination in Cyber-Physical Systems , 2018, 2018 ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS).
[38] Guihai Chen,et al. Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios , 2017, IEEE Transactions on Mobile Computing.
[39] Hsiao-Hwa Chen,et al. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Vehicular Technology.
[40] Chau Yuen,et al. Cooperative relative positioning of mobile users by fusing IMU inertial and UWB ranging information , 2017, 2017 IEEE International Conference on Robotics and Automation (ICRA).
[41] Song Guo,et al. Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications , 2014, IEEE Transactions on Parallel and Distributed Systems.
[42] Mohsen Guizani,et al. Mapping-Varied Spatial Modulation for Physical Layer Security: Transmission Strategy and Secrecy Rate , 2018, IEEE Journal on Selected Areas in Communications.
[43] Jinho Choi,et al. Secret Key Agreement With Large Antenna Arrays Under the Pilot Contamination Attack , 2015, IEEE Transactions on Wireless Communications.
[44] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[45] Ronald Raulefs,et al. Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications , 2017, IEEE Communications Surveys & Tutorials.
[46] Tan Cheon Kheong,et al. Autonomous Vehicles, Next Stop: Singapore , 2014 .
[47] Tony Q. S. Quek,et al. Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.
[48] Yasser L. Morgan,et al. Notes on DSRC & WAVE Standards Suite: Its Architecture, Design, and Characteristics , 2010, IEEE Communications Surveys & Tutorials.
[49] Shi-Jinn Horng,et al. Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs , 2017, IEEE Transactions on Vehicular Technology.