A Lightweight Key Generation Scheme for Secure Device-to-Device (D2D) Communication
暂无分享,去创建一个
[1] Qinye Yin,et al. Destination Assisted Secret Wireless Communication With Cooperative Helpers , 2013, IEEE Signal Processing Letters.
[2] Jie Yang,et al. Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.
[3] Ueli Maurer,et al. Secret-key agreement over unauthenticated public channels I: Definitions and a completeness result , 2003, IEEE Trans. Inf. Theory.
[4] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[5] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[6] Dina Katabi,et al. Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.
[7] Ning Zhang,et al. Physical Layer based Message Authentication with Secure Channel Codes , 2020, IEEE Transactions on Dependable and Secure Computing.
[8] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[9] Anfeng Liu,et al. MAGLeak: A Learning-Based Side-Channel Attack for Password Recognition With Multiple Sensors in IIoT Environment , 2020, IEEE Transactions on Industrial Informatics.
[10] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[11] Derrick Wing Kwan Ng,et al. Artificial Noise Assisted Secure Transmission Under Training and Feedback , 2015, IEEE Transactions on Signal Processing.
[12] Jiming Chen,et al. Learning-Based Jamming Attack against Low-Duty-Cycle Networks , 2017, IEEE Transactions on Dependable and Secure Computing.
[13] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[14] Richard E. Blahut,et al. Secrecy capacity of SIMO and slow fading channels , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..
[15] Matthew R. McKay,et al. Artificial-Noise-Aided Secure Multi-Antenna Transmission With Limited Feedback , 2015, IEEE Transactions on Wireless Communications.
[16] Yupeng Liu,et al. Destination assisted cooperative jamming for wireless physical layer security , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[17] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[18] Huiming Wang,et al. Hybrid Opportunistic Relaying and Jamming With Power Allocation for Secure Cooperative Networks , 2015, IEEE Transactions on Wireless Communications.
[19] Jon W. Wallace. Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits , 2009, 2009 IEEE International Conference on Communications.
[20] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[21] Paulo R. L. Gondim,et al. Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation , 2020, Wirel. Commun. Mob. Comput..
[22] Panlong Yang,et al. SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference , 2013, IEEE Transactions on Information Forensics and Security.
[23] Xuemin Shen,et al. Synergy of Big Data and 5G Wireless Networks: Opportunities, Approaches, and Challenges , 2018, IEEE Wireless Communications.
[24] Aggelos Kiayias,et al. Robust key generation from signal envelopes in wireless networks , 2007, CCS '07.
[25] Qiang Li,et al. Robust Cooperative Beamforming and Artificial Noise Design for Physical-Layer Secrecy in AF Multi-Antenna Multi-Relay Networks , 2015, IEEE Transactions on Signal Processing.
[26] Sneha Kumar Kasera,et al. Robust uncorrelated bit extraction methodologies for wireless sensors , 2010, IPSN '10.
[27] Yevgeni Koucheryavy,et al. Clustering Optimization for Out-of-Band D2D Communications , 2017, Wirel. Commun. Mob. Comput..
[28] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[29] Sneha Kumar Kasera,et al. High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements , 2010, IEEE Transactions on Mobile Computing.
[30] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.