[1] LIU Y, CHEN H H, WANG L. Physical layer security for next generation wireless networks:theories, technologies, and challenges[J]. IEEE Communications Surveys and Tutorials, 2017, 19(1):347-376. [2] DIFFIE W, HELLMAN M. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6):644-654. [3] AHLSWEDE R, CSISZAR I. Common randomness in information theory and cryptography, Part I:secret sharing[J]. IEEE Transactions on Information Theory, 1993, 39(4):1121-1132. [4] PATWARI N, CROFT J, JANA S, et al. High rate uncorrelated bit extraction for shared secret key generation from channel measurements[J]. IEEE Transactions on Mobile Computing, 2010, 9(1):17-30. [5] 盛旺.无线通信中物理层安全密钥提取技术研究[D].南京:南京邮电大学,2014:20-30.(SHENG W. Research on secret key extraction of physical layer in wireless communications[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2014:20-30.) [6] PENG Y, WANG P, XIANG W, et al. Secret key generation based on estimated channel state information for TDD-OFDM systems over fading channels[J]. IEEE Transactions on Wireless Communications, 2017, 16(8):5176-5186. [7] WANG X, THIELE L, HAUSTEIN T, et al. Secret key generation using entropy-constrained-like quantization scheme[C]//Proceedings of the 23rd International Conference on Telecommunications. Piscataway:IEEE, 2016:1-6. [8] AMBEKAR A, HASSAN M, SCHOTTEN H D. Improving channel reciprocity for effective key management systems[C]//Proceedings of the 2012 International Symposium on Signals, Systems, and Electronics. Piscataway:IEEE, 2012, 1:1-4. [9] ALI S T, SIVARAMAN V, OSTRY D. Zero reconciliation secret key generation for body-worn health monitoring devices[C]//Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks. New York:ACM, 2012:39-50. [10] CHENG L, LI W, MA D, et al. Towards an effective secret key generation scheme for imperfect channel state information[C]//Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA. Piscataway:IEEE, 2017:915-920. [11] TOPAL O A, KURT G K, ÖZBEK B. Key error rates in physical layer key generation:theoretical analysis and measurement-based verification[J]. IEEE Wireless Communications Letters, 2017, 6(6):766-769. [12] BARHUMI I, LEUS G, MOONEN M. Optimal training design for MIMO OFDM systems in mobile wireless channels[J]. IEEE Transactions on Signal Processing, 2003, 51(6):1615-1624. [13] GUAN X, SHI H, DING N, et al. Performance analysis in wireless key generation using estimated channel state information[J]. Electronics Letters, 2018, 54(20):1178-1180. [14] PROAKIS G J, SALEHI M. Digital Communication[M]. 5th ed. New York:McGraw-Hill Education, 2007:45-55. [15] KAPINAS V M, MIHOS S K, KARAGIANNIDIS G K. On the monotonicity of the generalized Marcum and Nuttall Q-functions[J]. IEEE Transactions on Information Theory, 2009, 55(8):3701-3710. [16] GRADSHTEYN I S, RYZHIK I M. In table of integrals, series, and products[J]. Mathematics of Computation, 2007, 20(96):1157-1160. |