Wireless physical layer key generation with improved bit disagreement for the internet of things using moving window averaging
暂无分享,去创建一个
[1] Hai Su,et al. Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.
[2] Ting Jiang,et al. Physical-layer security in Internet of Things based on compressed sensing and frequency selection , 2017, IET Commun..
[3] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[4] Yuexing Peng,et al. Secret Key Generation Based on Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels , 2017, IEEE Transactions on Wireless Communications.
[5] Prasant Mohapatra,et al. Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller , 2013, IEEE Transactions on Mobile Computing.
[6] Michael A. Jensen,et al. Key generation exploiting MIMO channel evolution: Algorithms and theoretical limits , 2009, 2009 3rd European Conference on Antennas and Propagation.
[7] Jun Li,et al. Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM , 2018, IEEE Communications Magazine.
[8] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[9] Rao Yarlagadda,et al. Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..
[10] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[11] Daniele Trinchero,et al. Secret key generation based on channel and distance measurements , 2014, 2014 6th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).
[12] Joel Max,et al. Quantizing for minimum distortion , 1960, IRE Trans. Inf. Theory.
[13] Michael A. Jensen,et al. Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.
[14] Fang Sheng,et al. A Lloyd-Max-based Non-Uniform Quantization Scheme for Distributed Video Coding , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).
[15] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[16] Yang Wang,et al. Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.
[17] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[18] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[19] Prasant Mohapatra,et al. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[20] Sneha Kumar Kasera,et al. Secret key extraction using Bluetooth wireless signal strength measurements , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[21] Jie Yang,et al. Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[22] Daniele Trinchero,et al. Secret Key Generation Based on AoA Estimation for Low SNR Conditions , 2015, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).
[23] Nianmin Yao,et al. On the using of discrete wavelet transform for physical layer key generation , 2017, Ad Hoc Networks.
[24] Tim Güneysu,et al. Information reconciliation schemes in physical-layer security: A survey , 2016, Comput. Networks.
[25] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[26] Jun Li,et al. Secure and Efficient Context-Aware Localization of Drones in Urban Scenarios , 2018, IEEE Communications Magazine.
[27] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..
[28] Raksha Upadhyay,et al. Internet of Things and Wireless Physical Layer Security: A Survey , 2017 .
[29] Hisato Iwai,et al. Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems , 2011, IEEE Transactions on Information Forensics and Security.
[30] Balasubramaniam Natarajan,et al. Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks , 2015, IEEE Transactions on Information Forensics and Security.
[31] Werner Henkel,et al. LDPC code construction for wireless physical-layer key reconciliation , 2012, 2012 1st IEEE International Conference on Communications in China (ICCC).
[32] Ueli Maurer,et al. Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.