Unleashing the secure potential of the wireless physical layer: Secret key generation methods
Tài liệu tham khảo
Mukherjee, 2014, Principles of physical layer security in multiuser wireless networks: A survey, IEEE Commun. Surv. Tutor., 16, 1550, 10.1109/SURV.2014.012314.00178
Wyner, 1975, The wire-tap channel, Bell Syst. Tech. J., 54, 1355, 10.1002/j.1538-7305.1975.tb02040.x
Wilson, 2007, Channel identification: Secret sharing using reciprocity in ultrawideband channels, IEEE Trans. Inf. Forensics Secur., 2, 364, 10.1109/TIFS.2007.902666
Kitaura, 2007, A scheme of secret key agreement based on received signal strength variation by antenna switching in land mobile radio, 1763
Gungor, 2014, Secret key generation via localization and mobility, IEEE Trans. Veh. Technol., PP, 1
S. Mathur, W. Trappe, N. Mandayam, C. Ye, A. Reznik, Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel, in: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, MobiCom ’08, 2008, pp. 128–139.
Z. Li, W. Xu, R. Miller, W. Trappe, Securing wireless systems via lower layer enforcements, in: Proceedings of the 5th ACM Workshop on Wireless Security, WiSe ’06, 2006, pp. 33–42.
Hassan, 1996, Cryptographic key agreement for mobile radio, Digit. Signal Process., 6, 207, 10.1006/dspr.1996.0023
Koorapaty, 1998, Secure information transmission for mobile radio, 381
Wang, 2012, Cooperative secret key generation from phase estimation in narrowband fading channels, IEEE J. Sel. Areas Commun., 30, 1666, 10.1109/JSAC.2012.121010
A. Badawy, T. Khattab, T.M. Elfouly, C.-F. Chiasserini, A. Mohamed, D. Trinchero, Channel secondary random process for robust secret key generation, in: IWCMC 2015 Security Symposium, IWCMC 2015 Security Symposium, Dubrovnik, Croatia, 2015.
Patwari, 2010, High-rate uncorrelated bit extraction for shared secret key generation from channel measurements, IEEE Trans. Mobile Comput., 9, 17, 10.1109/TMC.2009.88
Premnath, 2013, Secret key extraction from wireless signal strength in real environments, IEEE Trans. Mobile Comput., 12, 917, 10.1109/TMC.2012.63
Ren, 2011, Secret key generation exploiting channel characteristics in wireless communications, IEEE Wirel. Commun., 18, 6, 10.1109/MWC.2011.5999759
N. Patwari, A.O. Hero III, Using proximity and quantized rss for sensor localization in wireless networks, in: Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, WSNA ’03, 2003, pp. 20–29.
A. Badawy, T. Khattab, T. Elfouly, D. Mohamed, A. Trinchero, C. Chiasserini, Secret key generation based on aoa estimation for low snr conditions, in: 2015 IEEE 81st Vehicular Technology Conference, VTC Spring, 2015, pp. 1–7.
S. Jana, S.N. Premnath, M. Clark, S.K. Kasera, N. Patwari, S.V. Krishnamurthy, On the effectiveness of secret key extraction from wireless signal strength in real environments, in: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, MobiCom ’09, 2009, pp. 321–332.
Liu, 2012, Collaborative secret key extraction leveraging received signal strength in mobile wireless networks, 927
Aono, 2005, Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels, IEEE Trans. Antennas Propag., 53, 3776, 10.1109/TAP.2005.858853
Zhang, 2010, Mobility assisted secret key generation using wireless link signatures, 1
Brassard, 1994, 410
Bloch, 2008, Wireless information-theoretic security, IEEE Trans. Inform. Theory, 54, 2515, 10.1109/TIT.2008.921908
Liu, 2012, Exploiting channel diversity in secret key generation from multipath fading randomness, IEEE Trans. Inf. Forensics Secur., 7, 1484, 10.1109/TIFS.2012.2206385
Thai, 2014, Physical-layer secret key generation with untrusted relays, 1385
Badawy, 2014, Secret key generation based on channel and distance measurements, 136
Maurer, 1993, Secret key agreement by public discussion from common information, IEEE Trans. Inform. Theory, 39, 733, 10.1109/18.256484
Gungor, 2012, Secrecy outage capacity of fading channels, 1
Menezes, 2001
Nist: Computer security resource center. URL http://csrc.nist.gov.
Nist — csrs: Public key interoperability test suite certification path validation. URL http://csrc.nist.gov/groups/ST/crypto_apps_infra/documents/PKITS.pdf.
Ye, 2007, On the secrecy capabilities of itu channels, 2030
Saad, 2015, Comparative simulation for physical layer key generation methods, 120
