Performance Analysis of Loss Multilevel Quantization on the Secret Key Generation Scheme in Indoor Wireless Environment
暂无分享,去创建一个
[1] Xiaojiang Du,et al. Symmetric Encryption Relying on Chaotic Henon System for Secure Hardware-Friendly Wireless Communication of Implantable Medical Systems , 2018, J. Sens. Actuator Networks.
[2] Xiaoming Xu,et al. Physical layer security in IoT: A spatial-temporal perspective , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).
[3] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[4] Parviz Keshavarzi,et al. Advance hybrid key management architecture for SCADA network security , 2016, Secur. Commun. Networks.
[5] Christof Paar,et al. Security Analysis of Quantization Schemes for Channel-based Key Extraction , 2015, EAI Endorsed Trans. Security Safety.
[6] Alireza Sadeghi,et al. Analysis of key generation rate from wireless channel in in-band full-duplex communications , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).
[7] Christof Paar,et al. Bringing PHY-Based Key Generation into the Field: An Evaluation for Practical Scenarios , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).
[8] A. Ambekar,et al. Improving channel reciprocity for effective key management systems , 2012, 2012 International Symposium on Signals, Systems, and Electronics (ISSSE).
[9] Parviz Keshavarzi,et al. Key management issue in SCADA networks: A review , 2017 .
[10] Abdalhossein Rezai,et al. Secure Wireless Body Area Network (WBAN) Communication Method Using New Random Key Management Scheme , 2016 .
[11] Syed Taha Ali,et al. Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[12] Junqing Zhang,et al. Key Generation From Wireless Channels: A Review , 2016, IEEE Access.
[13] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[14] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[15] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[16] Christof Paar,et al. Fair Comparison and Evaluation of Quantization Schemes for PHY-based Key Generation , 2014 .
[17] Prasant Mohapatra,et al. Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller , 2013, IEEE Transactions on Mobile Computing.
[18] Wirawan,et al. Performance evaluation of the key extraction schemes in wireless indoor environment , 2017, 2017 International Conference on Signals and Systems (ICSigSys).
[19] Syed Taha Ali,et al. Eliminating Reconciliation Cost in Secret Key Generation for Body-Worn Health Monitoring Devices , 2014, IEEE Transactions on Mobile Computing.
[20] Prasant Mohapatra,et al. Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[21] Vijay Sivaraman,et al. An experimental study of secret key generation for passive Wi-Fi wearable devices , 2017, 2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[22] A. M. Adeshina,et al. Computational Approach for Securing Radiology-Diagnostic Data in Connected Health Network using High-Performance GPU-Accelerated AES , 2016, Interdisciplinary Sciences: Computational Life Sciences.
[23] Christof Paar,et al. Exploiting the Physical Environment for Securing the Internet of Things , 2015, NSPW '15.
[24] Y. Pandurangaiah,et al. Generation of Secret Key for Physical Layer to Evaluate Channel Characteristics in Wireless Communications , 2013, ArXiv.
[25] Wirawan,et al. Performance Improvement of Secret Key Generation Scheme in Wireless Indoor Environment , 2017, Int. J. Commun. Networks Inf. Secur..
[26] Chen Sun,et al. High-Agreement Uncorrelated Secret Key Generation Based on Principal Component Analysis Preprocessing , 2018, IEEE Transactions on Communications.
[27] Xenofon Fafoutis,et al. Physical layer secret-key generation with discreet cosine transform for the Internet of Things , 2017, 2017 IEEE International Conference on Communications (ICC).
[28] Jie Huang,et al. A lightweight physical-layer based security strategy for Internet of things , 2018, Cluster Computing.
[29] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[30] Junqing Zhang,et al. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview , 2017, Entropy.
[31] Sneha Kumar Kasera,et al. Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.
[32] Shengjun Zhang,et al. Secret key generation based on two-way randomness for TDD-SISO system , 2018, China Communications.
[33] Abdalhossein Rezai,et al. An Efficient Method to Improve WBAN Security , 2014 .
[34] Abhijit Ambekar. Exploiting Radio Channel Aware Physical Layer Concepts , 2015 .