Efficient key generation leveraging wireless channel reciprocity for MANETs
Tài liệu tham khảo
Ahlswede, 1993, Common randomness in information theory and cryptography - part i secret sharing, IEEE Trans. Inf. Theory, 39, 1121, 10.1109/18.243431
Arlinghaus, 1994
Badawy, A., Khattab, T., El-Fouly, T., Mohamed, A., Trinchero, D., Chiasserini, C.F., 2015. Secret key generation based on aoa estimation for low snr conditions. In: Proceedings of IEEE Vehicular Technology Conference.
Bennett, 1988, Privacy amplification by public discussion, SIAM J. Comput., 17, 210, 10.1137/0217014
Brassard, G., Salvail, L., 1994. Secret-key reconciliation by public discussion. In: advances in Cryptology łEUROCRYPT93. Springer, pp. 410–423.
Croft, J., Patwari, N., Kasera, S.K., 2010. Robust uncorrelated bit extraction methodologies for wireless sensors. In: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks. ACM; pp .70–81.
Haroun, 2015, Secret key generation using chaotic signals over frequency selective fading channels, IEEE Trans. Inf. Forensics Secur., 10, 1764, 10.1109/TIFS.2015.2428211
Hassan, 1996, Cryptographic key agreement for mobile radio, Digit. Signal Process., 6, 207, 10.1006/dspr.1996.0023
Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V., 2009. On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking. ACM; pp. 321–332.
Johnston, 1999, Some properties of a simple moving average when applied to forecasting a time series, J. Oper. Res. Soc., 50, 1267, 10.1057/palgrave.jors.2600823
Koorapaty, H., Hassan, A., Chennakeshu, S., 1998. Secure information transmission for mobile radio. In: Information Theory. In: Proceedings of IEEE International Symposium on. IEEE; pp. 381.
Liu, H., Yang, J., Wang, Y., Chen, Y., 2012. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In: Proceedings IEEE, INFOCOM pp. 927–935.
Liu, 2014, Group secret key generation via received signal strength: protocols, achievable rates, and implementation, IEEE Trans. Mob. Comput., 13, 2820, 10.1109/TMC.2014.2310747
Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A. 2008. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking. ACM; pp. 128–139.
Maurer, 1993, Secret key agreement by public discussion from common information, IEEE Trans. Inf. Theory, 39, 733, 10.1109/18.256484
Patwari, 2010, High-rate uncorrelated bit extraction for shared secret key generation from channel measurements, IEEE Trans. Mob. Comput., 9, 17, 10.1109/TMC.2009.88
Premnath, 2013, Secret key extraction from wireless signal strength in real environments, IEEE Trans. Mob. Comput., 12, 917, 10.1109/TMC.2012.63
Primak, S., Liu, K., Wang, X., 2014. Secret key generation using physical channels with imperfect csi. In: Proceedings of IEEE 80th Vehicular Technology Conference (VTC Fall), pp. 1–5.
Rappaport, 1996
Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., 2001. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical Report; DTIC Document.
Shehadeh, 2015, A survey on secret key generation mechanisms on the physical layer in wireless networks, Secur. Commun. Netw., 8, 332, 10.1002/sec.973
Simonoff, 2012
Strauss, 1992, Partial differential equations: an introduction, Math. Gaz., 77, 814
Wang, 2014, Efficient and secure key extraction using channel state information, J. Supercomput., 70, 1537, 10.1007/s11227-014-1247-1
Wei, Y., Zeng, K., Mohapatra, P., 2011. Adaptive wireless channel probing for shared key generation. In: Proceedings IEEE, INFOCOM, pp. 2165–2173.
Wu X., Peng, Y., Hu, C., Zhao, H., Shu, L., 2013. A secret key generation method based on csi in ofdm-fdd system. In: Proceedings of IEEE Globecom Workshops, pp. 1297–1302.