[1] 孙宏,杨义先.无线局域网协议802.11安全性分析[J].电子学报,2003,31(7):1098-1100. Sun Hong,Yang Yixian.On the security of wireless network protocol 802.11[J].Acta Electronica Sinica,2003,31(7):1098-1100.(in Chinese)
[2] Sayeed A,Perrig A.Secure wireless communications:Secret keys through multipath[A].IEEE ICASSP[C].Piscataway,NJ,USA:IEEE Press,2008.3013-3016.
[3] Shannon C E.Communication theory of secrecy systems[J].J Bell Syst Tech,1949,28(4):656-715.
[4] Xiao L,Greenstein L,Mandayam N,et al.A physical-layer technique to enhance authentication for mobile terminals[A].IEEE International Conference on Communications[C].Piscataway,NJ,USA:IEEE,2008.1520-1524.
[5] Aono T,Higuchi K,Ohira T,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and Propagation,2005,53(11):3776-3784.
[6] Hershey J,Hassan A,Yarlagadda R.Unconventional cryptographic keying variable management[J].IEEE Transactions on Communications,1995,43(1):3-6.
[7] Mathur S,Trappe W,Mandayam N,et al.Radio-telepathy:Extracting a secret key from an unauthenticated wireless channel[A].ACM MobiCom[C].New York,NY,USA:ACM Press,2008.128-139.
[8] Jana S,Pre S,Clark M,et al.On the effectiveness of secret key extraction from wireless signal strength in real environments[A].ACM Mobi Com[C].New York,NY,USA:ACM,2009.321-332.
[9] Patwari N,Croft J,Jana S,et al.High-rate uncorrelated bit extraction for shared secret key generation from channel measurements[J].IEEE Transactions on Mobile Computing,2010,9(1):17-30.
[10] Croft J,Patwari N,Kasera S.Robust uncorrelated bit extraction methodologies for wireless sensors[A].ACM/IEEE ICNP[C].New York,NY,USA:ACM Press,2010.70-81.
[11] Zhang J,Firooz M H,Patwari N,et al.Advancing wireless link signatures for location distinction[A].ACM MobiCom[C].New York,NY,USA:ACM,2008.26-37.
[12] Azimi-Sadjadi B,Kiayias A,Mercado A,et al.Robust key generation from signal envelopes in wireless networks[A].ACM CCS[C].New York,NY,USA:ACM,2007.401-410.
[13] Tope M,Mceachen J.Unconditionally secure communications over fading channels[A].IEEE MILCOM[C].Piscataway,NJ,USA:IEEE,2001.54-58.
[14] Liu H,Yang J,Wang Y,et al.Collaborative secret key extraction leveraging received signal strength in mobile wireless networks[A].IEEE INFOCOM[C].Piscataway,NJ,USA:IEEE,2012.927-935.
[15] Liu H,Yang J,Wang Y,et al.Group secret key generation via received signal strength:Protocols,achievable rates,and implementation[J].IEEE Transactions on Mobile Computing,2014,13(12):2820-2835.
[16] Dou L,Wei Y,Ni J.Multi-user wireless channel probing for shared key generation with a fuzzy controller[J].Computer Networks,2014,58:112-126.
[17] Ye C,Reznik A,Shah Y.Extracting secrecy from jointly Gaussian random variables[A].IEEE ISIT[C].Piscataway,NJ,USA:IEEE,2006.2593-2597.
[18] Dodis Y,Ostrovsky R,Reyzin L,et al.Fuzzy extractors:How to generate strong keys from biometrics and other noisy data[J].SIAM Journal on Computing,2008,38(1):97-139.
[19] Dodis Y,Reyzin L,Smith A.Fuzzy extractors:How to generate strong keys from biometrics and other noisy data[A].International Conference on the Theory and Applications of Cryptographic Techniques[C].Heidelberg,GER:Springer,2004.523-540.
[20] Li X,Bao F,Li S,Ma J.FLAP:An efficient WLAN initial access authentication protocol[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(2):488-497.
[21] 李兴华,尚昭辉,杨丹,马建峰.利用无线物理层密钥增强802.11i的安全性[J].江苏大学学报(自然科学版),2013,34(4):416-421. Li Xinghua,Shang Zhaohui,Yang Dan,Ma Jianfeng.Security enhancement of 802.11i by wireless physical layer key[J].Journal of Jiangsu University(Natural Science Edition),2013,34(4):416-421.(in Chinese) |