Vulnerabilities of Physical Layer Secret Key Generation Against Environment Reconstruction Based Attacks
暂无分享,去创建一个
Yan Zhang | Bin Li | Phee Lep Yeoh | Hao Yin | Zijie Ji | Zunwen He | Kun Lin | Zunwen He | Zijie Ji | Bin Li | Hao Yin | Yan Zhang | Kun Lin
[1] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[2] Weidong Wang,et al. On the 3-D MIMO channel model based on regular-shaped geometry-based stochastic model , 2015, 2015 International Symposium on Antennas and Propagation (ISAP).
[3] Junqing Zhang,et al. On the Key Generation From Correlated Wireless Channels , 2017, IEEE Communications Letters.
[4] Zhisheng Niu,et al. Learning-Based Remote Channel Inference: Feasibility Analysis and Case Study , 2019, IEEE Transactions on Wireless Communications.
[5] B. Ai,et al. Characterization of Quasi-Stationarity Regions for Vehicle-to-Vehicle Radio Channels , 2015, IEEE Transactions on Antennas and Propagation.
[6] E. Veronica Belmega,et al. Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches , 2017, IEEE Transactions on Information Forensics and Security.
[7] Syed Taha Ali,et al. Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices , 2014, IEEE Transactions on Mobile Computing.
[8] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[9] Aggelos Kiayias,et al. On passive inference attacks against physical-layer key extraction? , 2011, EUROSEC '11.
[10] Jie Yang,et al. Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation , 2014, IEEE Transactions on Mobile Computing.
[11] Jon W. Wallace,et al. Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.
[12] Tony Q. S. Quek,et al. Physical-Layer Secret Key Generation With Colluding Untrusted Relays , 2016, IEEE Transactions on Wireless Communications.
[13] Yuexing Peng,et al. Secret Key Generation Based on Estimated Channel State Information for TDD-OFDM Systems Over Fading Channels , 2017, IEEE Transactions on Wireless Communications.
[14] Rong Jin,et al. Physical layer key agreement under signal injection attacks , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).