[1] 孙宏,杨义先.无线局域网协议802.11安全性分析[J].电子学报,2003,31(7):1098-1100. SUN Hong,YANG Yi-xian.On the security of wireless network protocol 802.11[J].Acta Electronica Sinica,2003,31(7):1098-1100.(in Chinese)
[2] Hershey J E,Hassan AA,Yarlagadda R.Unconventional cryptographic keying variable management[J].IEEE Transactions on Communications,1995,43(1):3-6.
[3] Patwari N,Croft J,Jana S,et al.High-rate uncorrelated bit extraction for shared secret key generation from channel measurements[J].IEEE Transactions on Mobile Computing,2010,9(1):17-30.
[4] 李鑫,李兴华,杨丹,马建峰.基于矢量量化的高效随机物理层密钥提取方案[J].电子学报,2016,44(2):275-281. LI Xin,LI Xing-hua,YANG Dan,MA Jian-feng.A high-speed random key extraction scheme based on vector quantization[J].Acta Electronica Sinica,2016,44(2):275-281.(in Chinese)
[5] Aono T,Higuchi K,Ohira T,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and propagation,2005,53(11):3776-3784.
[6] Premnath S N,Jana S,Croft J,et al.Secret key extraction from wireless signal strength in real environments[J].IEEE Transactions on mobile Computing,2013,12(5):917-930.
[7] Ye C,Mathur S,Reznik A,et al.Information theoretically secret key generation for fading wireless channels[J].IEEE Transactions on Information Forensics and Security,2010,5(2):240-254.
[8] Zhu X,Xu F,Novak E,et al.Using wireless link dynamics to extract a secret key in vehicular scenarios[J].IEEE Transactions on Mobile Computing,2017,16(7):2065-2078.
[9] Mathur S,Trappe W,Mandayam N,et al.Radio-telepathy:extracting a secret key from an unauthenticated wireless channel[A].14th ACM international conference on Mobile computing and networking[C].San Francisco,California,USA,2008.128-139.
[10] Edman M,Kiayias A,Tang Q,et al.On the security of key extraction from measuring physical quantities[J].IEEE Transactions on Information Forensics and Security,2016,11(8):1796-1806.
[11] Chen C,Jensen M A.Secret key establishment using temporally and spatially correlated wireless channel coefficients[J].IEEE Transactions on Mobile Computing,2011,10(2):205-215.
[12] Erceg V,Greenstein L J,Tjandra S Y,et al.An empirically based path loss model for wireless channels in suburban environments[J].IEEE Journal on selected areas in communications,1999,17(7):1205-1211.
[13] Ye C,Reznik A,Shah Y.Extracting secrecy from jointly Gaussian random variables[A].IEEE International Symposium on Information Theory[C].IEEE,2006.2593-2597.
[14] Margelis G,Fafoutis X,Oikonomou G,et al.Physical layer secret-key generation with discreet cosine transform for the Internet of Things[A].2017 IEEE International Conference on Communications[C].IEEE,2017.1-6. |