| 1 | ROTTENBERG F, T-H NGUYEN, J-M DRICOT, et al. CSI-based versus RSS-based secret key generation under correlated eavesdropping [J]. IEEE Transactions on Communications, 2021, 69(3): 1868-1881. | 
																													
																						| 2 | SAPUTRA, SUDARSONO A, YULIANA M. Symmetric key generation use received signal strength for V2V communication [C]// Proceedings of the 2022 International Electronics Symposium. Piscataway: IEEE, 2022: 249-254. | 
																													
																						| 3 | RIBOUH S, PHAN K, MALAWADE A V, et al. Channel state information-based cryptographic key generation for intelligent transportation systems [J]. IEEE Transactions on Intelligent Transportation Systems, 2021, 22(12): 7496-7507. | 
																													
																						| 4 | LU X, LEI J, SHI Y, et al. Intelligent reflecting surface assisted secret key generation [J]. IEEE Signal Processing Letters, 2021, 28: 1036-1040. | 
																													
																						| 5 | LIU H, YANG W, YANG J. Fast and practical secret key extraction by exploiting channel response [C]// Proceedings of the 2013 IEEE INFOCOM. Piscataway: IEEE, 2013: 3048-3056. | 
																													
																						| 6 | 盛旺.无线通信中物理层安全密钥提取技术研究[D].南京:南京邮电大学, 2014: 20-30. | 
																													
																						|  | SHENG W. Research on secret key extraction of physical layer in wireless communications [D]. Nan jing: Nanjing University of Posts and Telecommunications, 2014: 20-30. | 
																													
																						| 7 | PENGY, WANGP, XIANGW, et al. Secret key generation based on estimated channel state information for TDD-OFDM systems over fading channels [J]. IEEE Transactions on Wireless Communications, 2017, 16(8): 5176-5186. | 
																													
																						| 8 | WANG L, AN H, ZHU H, et al. MobiKey: mobility-based secret key generation in smart home [J]. IEEE Internet of Things Journal, 2020, 7(8): 7590-7600. | 
																													
																						| 9 | PATWARI N, CROFT J, JANA S, et al. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements [J]. IEEE Transactions on Mobile Computing, 2010, 9(1): 17-30. | 
																													
																						| 10 | 丁宁,管新荣,杨炜伟,等.非完美信道估计条件下多比特量化无线密钥生成性能分析[J].计算机应用, 2020, 40(1): 143-147. | 
																													
																						|  | DING N, GUAN X R, YANG W W, et al. Performance analysis of wireless key generation with multi-bit quantization under imperfect channel estimation condition [J]. Journal of Computer Applications, 2020, 40(1): 143-147. | 
																													
																						| 11 | TAN J, DAI L. Channel feedback in TDD massive MIMO systems with partial reciprocity [J]. IEEE Transactions on Vehicular Technology, 2021, 70(12): 12960-12974. | 
																													
																						| 12 | PREMNATH S N, JANA S, CROFT J, et al. Secret key extraction from wireless signal strength in real environments [J]. IEEE Transactions on Mobile Computing, 2013, 12(5): 917-930. | 
																													
																						| 13 | 王华华,郑明杰,陈峰,等.基于LDPC和椭圆曲线加密算法的密钥协商方案[J].南京邮电大学学报(自然科学版), 2022, 42(3): 30-35. | 
																													
																						|  | WANG H H, ZHENG M J, CHEN F, et al. A key reconciliation scheme based on LDPC and elliptic curve cryptography [J]. Journal of Nanjing University of Posts and Telecommunications (Nature Science), 2022, 42(3): 30-35. | 
																													
																						| 14 | WANG Q, SU H, REN K, et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks [C]// Proceedings of the 2011 IEEE INFOCOM. Piscataway: IEEE, 2011: 1422-1430. | 
																													
																						| 15 | WANG J, LIU G, CHENG Y, et al. Construction and analysis of SHA-256 compression function based on chaos S-box [J]. IEEE Access, 2021, 9: 61768-61777. | 
																													
																						| 16 | LAI L, LIANG Y, POOE H V. A unified framework for key agreement over wireless fading channels [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 480-490. | 
																													
																						| 17 | ALDAGHRI N, MAHDAVIFAR H. Physical layer secret key generation in static environments [J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 2692-2705. | 
																													
																						| 18 | MI D, DIANATI M, ZHANG L, et al. Massive MIMO performance with imperfect channel reciprocity and channel estimation error [J]. IEEE Transactions on Communications, 2017, 65(9): 3734-3749. | 
																													
																						| 19 | REN Y, PENG L, BAI W, et al. A practical study of channel influence on radio frequency fingerprint features [C]// Proceedings of the 2018 IEEE International Conference on Electronics and Communication Engineering. Piscataway: IEEE, 2018: 1-7. | 
																													
																						| 20 | FURQAN H M, HAMAMREH J M, ARSLAN H. New physical layer key generation dimensions: subcarrier indices/positions-based key generation [J]. IEEE Communications Letters, 2021, 25(1): 59-63. |