Social-Aware Secret Key Generation for Secure Device-to-Device Communication via Trusted and Non-Trusted Relays
暂无分享,去创建一个
Sheng Chen | Muhammad Waqas | Depeng Jin | Yong Li | Manzoor Ahmed | Yong Li | Depeng Jin | M. Waqas | Manzoor Ahmed | Sheng Chen
[1] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[2] Klaus Doppler,et al. Mode Selection for Device-To-Device Communication Underlaying an LTE-Advanced Network , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[3] Kaigui Bian,et al. PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement , 2016, IEEE Transactions on Information Forensics and Security.
[4] Zheng Yan,et al. Security in D2D Communications: A Review , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[5] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[6] Alireza Sadeghi,et al. Analysis of key generation rate from wireless channel in in-band full-duplex communications , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).
[7] Zhu Han,et al. Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.
[8] M. van Dijk. Broadcast channels with confidential messages, with tampering : the binary symmetric case , 1994 .
[9] Ming Zeng,et al. Mobility-assisted device to device communications for Content Transmission , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[10] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[11] S H Strogatz,et al. Random graph models of social networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.
[12] Stark C. Draper,et al. Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.
[13] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[14] Zhu Han,et al. Mobility Assisted Content Transmission For Device-to-Device Communication Underlaying Cellular Networks , 2018, IEEE Transactions on Vehicular Technology.
[15] Xu Chen,et al. Social trust and social reciprocity based cooperative D2D communications , 2013, MobiHoc.
[16] Jörg Ott,et al. Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.
[17] Wenliang Du,et al. Cooperative Key Generation in Wireless Networks , 2012, IEEE Journal on Selected Areas in Communications.
[18] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[19] Xu Chen,et al. Imitation-Based Social Spectrum Sharing , 2014, IEEE Transactions on Mobile Computing.
[20] Xu Chen,et al. SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[21] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[22] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[23] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[24] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[25] Xuemin Shen,et al. Operator controlled device-to-device communications in LTE-advanced networks , 2012, IEEE Wireless Communications.
[26] Zaher Dawy,et al. Social Network Aware Device-to-Device Communication in Wireless Networks , 2015, IEEE Transactions on Wireless Communications.
[27] Stefan Parkvall,et al. Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.
[28] Smriti Gopinath,et al. Reciprocity enhancement and decorrelation schemes for PHY-based key generation , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).
[29] Zhu Han,et al. Coalitional Games for Resource Allocation in the Device-to-Device Uplink Underlaying Cellular Networks , 2014, IEEE Transactions on Wireless Communications.
[30] Hao Liang,et al. Device-to-device communication underlaying converged heterogeneous networks , 2014, IEEE Wireless Communications.
[31] Sheng Chen,et al. Social-aware D2D communications: qualitative insights and quantitative analysis , 2014, IEEE Communications Magazine.
[32] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[33] Zhu Han,et al. Efficient resource allocation for mobile social networks in D2D communication underlaying cellular networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[34] Xu Chen,et al. SoCast: Social ties based cooperative video multicast , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[35] George K. Karagiannidis,et al. Simultaneously Generating Secret and Private Keys in a Cooperative Pairwise-Independent Network , 2016, IEEE Transactions on Information Forensics and Security.
[36] Xu Chen,et al. Adaptive Channel Recommendation for Opportunistic Spectrum Access , 2011, IEEE Transactions on Mobile Computing.
[37] H. Vincent Poor,et al. From Technological Networks to Social Networks , 2013, IEEE Journal on Selected Areas in Communications.
[38] Balasubramaniam Natarajan,et al. Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks , 2015, IEEE Transactions on Information Forensics and Security.
[39] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[40] Tony Q. S. Quek,et al. Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.
[41] Olav Tirkkonen,et al. Device-to-Device Communication Underlaying Cellular Communications Systems , 2009, Int. J. Commun. Netw. Syst. Sci..
[42] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[43] H. Gintis. Strong reciprocity and human sociality. , 2000, Journal of theoretical biology.
[44] Kui Ren,et al. Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.
[45] Wenliang Du,et al. PHY-based cooperative key generation in wireless networks , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).