[1] |
LIU Y , CHEN H H , WANG L . Physical layer security for next generation wireless networks:theories,technologies,and challenges[J]. IEEE Communications Surveys & Tutorials, 2017,19(1): 347-376.
|
[2] |
ZHANG J , DUONG T Q , MARSHALL A ,et al. Key generation from wireless channels:a review[J]. IEEE Access, 2017,4(3): 614-626.
|
[3] |
MAURER U M . Secret key agreement by public discussion from common information[J]. Information Theory IEEE Transactions on, 1993,39(3): 733-742.
|
[4] |
AHLSWEDE R , CSISZAR I . Common randomness in information theory and cryptography.II.CR capacity[J]. Information Theory IEEE Transactions on, 1998,44(1): 225-240.
|
[5] |
MADISEH M G , NEVILLE S W , MCGUIRE M L . Applying beamforming to address temporal correlation in wireless channel characterization-based secret key generation[J]. IEEE Transactions on Information Forensics & Security, 2012,7(4): 1278-1287.
|
[6] |
HUANG P , WANG X . Fast secret key generation in static wireless networks:a virtual channel approach[C]// INFOCOM. 2013:22922300.
|
[7] |
CHEN D , QIN Z , MAO X ,et al. SmokeGrenade:an efficient key generation protocol with artificial interference[J]. IEEE Transactions on Information Forensics & Security, 2013,8(11): 1731-1745.
|
[8] |
GOLLAKOTA S , KATABI D . Physical layer wireless security made fast and channel independent[C]// INFOCOM, 2011: 1125-1133.
|
[9] |
CSISZAR I , NARAYAN P . Common randomness and secret key generation with a helper[C]// IEEE International Symposium on Information Theory. 2000:157.
|
[10] |
SHIMIZU T , IWAI H , SASAOKA H . Physical-layer secret key agreement in two-way wireless relaying systems[J]. IEEE Transactions on Information Forensics & Security, 2011,6(3): 650-660.
|
[11] |
LAI L , LIANG Y , DU W . cooperative key generation in wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2012,30(8): 1578-1588.
|
[12] |
MUKHERJEE A . Physical-layer security in the internet of things:sensing and communication confidentiality under resource constraints[J]. Proceedings of the IEEE, 2015,103(10): 1747-1761.
|
[13] |
楼洋明, 金梁, 钟州 ,等. 基于MIMO接收信号空间的密钥生成方案[J]. 中国科学:信息科学, 2017(3).
|
|
LOU Y M , JIN L , ZHONG Z ,et al. Secret key generation scheme based on MIMO received signal spaces[J]. SCIENTIA SINICA Informationis, 2017(3).
|
[14] |
CHAN W W , TAN F W , SHEA J M . Secret-sharing LDPC codes for the BPSK-constrained gaussian wiretap channel[J]. IEEE Transactions on Information Forensics & Security, 2011,6(3): 551-564.
|
[15] |
BLOCH M , BARROS J , RODRIGUES M R D ,et al. Wireless Information-Theoretic Security-Part II:Practical Implementation[J]. IEEE Transactions on Information Theory, 2006,54(6): 2515-2534.
|
[16] |
ZHANG S , JIN L , LOU Y ,et al. Secret key generation based on two-way randomness for TDD-SISO system[J]. China Communications, 2018,15(7): 202-216.
|
[17] |
ZENG X , DURRANI T S . Estimation of mutual information using copula density function[J]. Electronics Letters, 2011,47(8): 493-494.
|