[1] |
Musa S M.Network security and cryptography: A self-teaching introduction[M]. Mercury Learning & Information, 2018.
|
[2] |
Zhan Furui, Zhao Zixiang, Chen Yuhua, et al.On the using of Renyi' s quadratic entropy for physical layer key generation[J].Computer Communications, 2019, 137:32-43
|
[3] |
Jana S, Premnath S N, Clark M, et al.On the effectiveness of secret key extraction from wireless signal strength in real environments[C] // Proceedings of the 15th Annual International Conference on Mobile Computing and Networking. ACM, 2009: 321-332.
|
[4] |
Zhang J, Woods R, Duong T Q, et al.Experimental study on key generation for physical layer security in wireless communications[J].IEEE Access, 2016, 4:4464-4477
|
[5] |
Goldsmith A.Wireless communications[M]. Cambridge University Press, 2005.
|
[6] |
Zhang J, Duong T Q, Marshall A, et al.Key generation from wireless channels: A review[J].IEEE Access, 2016, 4:614-626
|
[7] |
Mathur S, Trappe W, Mandayam N, et al.Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel[C] // Proceedings of the 14th ACM International Conference on Mobile Computing and Networking. 2008: 128-139.
|
[8] |
Patwari N, Croft J, Jana S, et al.High-rate uncorrelated bit extraction for shared secret key generation from channel measurements[J].IEEE Transactions on Mobile Computing, 2009, 9(1):17-30
|
[9] |
Ruotsalainen H, Zhang J, Grebeniuk S.Experimental investigation on wireless key generation for low-power wide-area networks[J].IEEE Internet of Things Journal, 2019, 7(3):1745-1755
|
[10] |
Rottenberg F, Nguyen T H, Dricot J M, et al.CSI-based versus RSS-based secret-key generation under correlated eavesdropping[J].IEEE Transactions on Communications, 2020, :-
|
[11] |
Zhan F, Yao N, Gao Z, et al.Efficient key generation leveraging wireless channel reciprocity for MANETs[J].Journal of Network and Computer Applications, 2018, 103:18-28
|
[12] |
Shehadeh Y E H, Alfandi O, Hogrefe D.Towards robust key extraction from multipath wireless channels[J].Journal of Communications and Networks, 2012, 14(4):385-395
|
[13] |
Yuliana M.An efficient key generation for the Internet of Things based synchronized quantization[J].Sensors, 2019, 19(12):2674-
|
[14] |
Aono T, Higuchi K, Ohira T, et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and Propagation, 2005, 53(11):3776-3784
|
[15] |
Premnath S N, Jana S, Croft J, et al.Secret key extraction from wireless signal strength in real environments[J].IEEE Transactions on Mobile Computing, 2012, 12(5):917-930
|
[16] |
Xi W, Duan M, Bai X, et al.KEEP: Secure and efficient communication for distributed IoT devices[J].IEEE Internet of Things Journal, 2020, :-
|
[17] |
袁瑞, 彭林宁, 李古月, 等.不同环境下无线信道密钥生成性能研究[J].密码学报, 2020, 7(2):261-273
|