1 |
ROTTENBERG F, T-H NGUYEN, J-M DRICOT, et al. CSI-based versus RSS-based secret key generation under correlated eavesdropping [J]. IEEE Transactions on Communications, 2021, 69(3): 1868-1881.
|
2 |
SAPUTRA, SUDARSONO A, YULIANA M. Symmetric key generation use received signal strength for V2V communication [C]// Proceedings of the 2022 International Electronics Symposium. Piscataway: IEEE, 2022: 249-254.
|
3 |
RIBOUH S, PHAN K, MALAWADE A V, et al. Channel state information-based cryptographic key generation for intelligent transportation systems [J]. IEEE Transactions on Intelligent Transportation Systems, 2021, 22(12): 7496-7507.
|
4 |
LU X, LEI J, SHI Y, et al. Intelligent reflecting surface assisted secret key generation [J]. IEEE Signal Processing Letters, 2021, 28: 1036-1040.
|
5 |
LIU H, YANG W, YANG J. Fast and practical secret key extraction by exploiting channel response [C]// Proceedings of the 2013 IEEE INFOCOM. Piscataway: IEEE, 2013: 3048-3056.
|
6 |
盛旺.无线通信中物理层安全密钥提取技术研究[D].南京:南京邮电大学, 2014: 20-30.
|
|
SHENG W. Research on secret key extraction of physical layer in wireless communications [D]. Nan jing: Nanjing University of Posts and Telecommunications, 2014: 20-30.
|
7 |
PENGY, WANGP, XIANGW, et al. Secret key generation based on estimated channel state information for TDD-OFDM systems over fading channels [J]. IEEE Transactions on Wireless Communications, 2017, 16(8): 5176-5186.
|
8 |
WANG L, AN H, ZHU H, et al. MobiKey: mobility-based secret key generation in smart home [J]. IEEE Internet of Things Journal, 2020, 7(8): 7590-7600.
|
9 |
PATWARI N, CROFT J, JANA S, et al. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements [J]. IEEE Transactions on Mobile Computing, 2010, 9(1): 17-30.
|
10 |
丁宁,管新荣,杨炜伟,等.非完美信道估计条件下多比特量化无线密钥生成性能分析[J].计算机应用, 2020, 40(1): 143-147.
|
|
DING N, GUAN X R, YANG W W, et al. Performance analysis of wireless key generation with multi-bit quantization under imperfect channel estimation condition [J]. Journal of Computer Applications, 2020, 40(1): 143-147.
|
11 |
TAN J, DAI L. Channel feedback in TDD massive MIMO systems with partial reciprocity [J]. IEEE Transactions on Vehicular Technology, 2021, 70(12): 12960-12974.
|
12 |
PREMNATH S N, JANA S, CROFT J, et al. Secret key extraction from wireless signal strength in real environments [J]. IEEE Transactions on Mobile Computing, 2013, 12(5): 917-930.
|
13 |
王华华,郑明杰,陈峰,等.基于LDPC和椭圆曲线加密算法的密钥协商方案[J].南京邮电大学学报(自然科学版), 2022, 42(3): 30-35.
|
|
WANG H H, ZHENG M J, CHEN F, et al. A key reconciliation scheme based on LDPC and elliptic curve cryptography [J]. Journal of Nanjing University of Posts and Telecommunications (Nature Science), 2022, 42(3): 30-35.
|
14 |
WANG Q, SU H, REN K, et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks [C]// Proceedings of the 2011 IEEE INFOCOM. Piscataway: IEEE, 2011: 1422-1430.
|
15 |
WANG J, LIU G, CHENG Y, et al. Construction and analysis of SHA-256 compression function based on chaos S-box [J]. IEEE Access, 2021, 9: 61768-61777.
|
16 |
LAI L, LIANG Y, POOE H V. A unified framework for key agreement over wireless fading channels [J]. IEEE Transactions on Information Forensics and Security, 2012, 7(2): 480-490.
|
17 |
ALDAGHRI N, MAHDAVIFAR H. Physical layer secret key generation in static environments [J]. IEEE Transactions on Information Forensics and Security, 2020, 15: 2692-2705.
|
18 |
MI D, DIANATI M, ZHANG L, et al. Massive MIMO performance with imperfect channel reciprocity and channel estimation error [J]. IEEE Transactions on Communications, 2017, 65(9): 3734-3749.
|
19 |
REN Y, PENG L, BAI W, et al. A practical study of channel influence on radio frequency fingerprint features [C]// Proceedings of the 2018 IEEE International Conference on Electronics and Communication Engineering. Piscataway: IEEE, 2018: 1-7.
|
20 |
FURQAN H M, HAMAMREH J M, ARSLAN H. New physical layer key generation dimensions: subcarrier indices/positions-based key generation [J]. IEEE Communications Letters, 2021, 25(1): 59-63.
|