Citation: | HAN Yuanzhi and HU Aiqun, “An Improved Key Generation Scheme Based on Multipath Channel Measurements,” Chinese Journal of Electronics, vol. 26, no. 1, pp. 185-191, 2017, doi: 10.1049/cje.2016.10.005 |
R.E. Shannon, "Communication theory of secrecy systems", The Bell System Technical Journal, Vol.28, No.4, pp.656-715, 1949.
|
A.D. Wyner, "The wire-tap channel", The Bell System Technical Journal, Vol.54, No.8, pp.1355-1387, 1975.
|
I. Csiszar and J. Korner, "Broadcast channels with confidential messages", IEEE Transactions on Information Theory, Vol.24, No.3, pp.339-348, 1978.
|
U.M. Maurer, "Secret key agreement by public discussion from common information", IEEE Transactions on Information Theory, Vol.39, No.3, pp.733-742, 1993.
|
R. Ahlswede and I. Csiszar, "Common randomness in information theory and cryptography, part I:Secret sharing", IEEE Transactions on Information Theory, Vol.39, No.4, pp.1121-1132, 1993.
|
N. Patwari, J. Croft, S. Jana, et al., "High-rate uncorrelated bit extraction for shared secret key generation from channel measurements", IEEE Transactions on Mobile Computing, Vol.9, No.1, pp.17-30, 2010.
|
X.J. Zhu, F.Y. Xu, E. Novak, et al., "Extracting secret key from wireless link dynamics in vehicular environments", Proc. of IEEE International Conference on Computer Communications, Turin, Italy, pp.2283-2291, 2013.
|
Y.P. Liu, S. Draper and A. Sayeed, "Exploiting channel diversity in secret key generation from multipath fading randomness", IEEE Transactions on Information Forensics and Security, Vol.7, No.5, pp.1484-1497, 2012.
|
C.X. Ye, A. Reznik and Y. Shah, "Extracting secrecy from jointly gaussian random variables", Proc. of IEEE International Symposium on Information Theory, Seattle, Washington, USA, pp.2593-2597, 2006.
|
A. Sayeed and A. Perrig, "Secure wireless communications:Secret keys through multipath", Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, Nevada, USA, pp.3013-3016, 2008.
|
S. Mathur, W. Trappe, N. Mandayam, et al., "Radio-telepathy:Extracting a secret key from an unauthenticated wireless channel", Proc. of ACM Annual International Conference on Mobile Computing and Networking, San Francisco, California, USA, pp.128-139, 2008.
|
Y. Shehadeh and D. Hogrefe, "An optimal guard-intervals based mechanism for key generation from multipath wireless channels", Proc. of IFIP International Conference on New Technologies, Mobility and Security, Paris, France, pp.1-5, 2011.
|
S. Premnath, S. Jana, J. Croft, et al., "Secret key extraction from wireless signal strength in real environments", IEEE Transactions on Mobile Computing, Vol.12, No.5, pp.917-930, 2013.
|
G.Y. Li, A.Q. Hu and L. Shi, "Secret key extraction in wireless channel", Journal of Cryptologic Research, Vol.1, No.3, pp.211-224, 2014. (in Chinese)
|
M. Patzold, Mobile Fading Channels, John Wiley & Sons, Baffins Lane, Chichester, UK, 2002.
|
F.M. He, H. Man and W. Wang, "Physical layer assisted security for mobile ofdm networks", Proc. of IEEE Vehicular Networking Conference, Jersey City, NJ, USA, pp.346-353, 2010.
|