Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (10): 52-58.doi: 10.11959/j.issn.2096-109x.2018082
• Papers • Previous Articles Next Articles
Aolin CAI,Liang JIN,Zhou ZHONG,Yangming LOU
Revised:
2018-09-25
Online:
2018-10-01
Published:
2018-12-15
Supported by:
CLC Number:
Aolin CAI,Liang JIN,Zhou ZHONG,Yangming LOU. Multiuser secret key generation based on received signal[J]. Chinese Journal of Network and Information Security, 2018, 4(10): 52-58.
[1] | LIU Y , CHEN H H , WANG L . Physical layer security for next generation wireless networks:theories,technologies,and challenges[J]. IEEE Communications Surveys & Tutorials, 2017,19(1): 347-376. |
[2] | ZHANG J , DUONG T Q , MARSHALL A ,et al. Key generation from wireless channels:a review[J]. IEEE Access, 2017,4(3): 614-626. |
[3] | MAURER U M . Secret key agreement by public discussion from common information[J]. Information Theory IEEE Transactions on, 1993,39(3): 733-742. |
[4] | AHLSWEDE R , CSISZAR I . Common randomness in information theory and cryptography.II.CR capacity[J]. Information Theory IEEE Transactions on, 1998,44(1): 225-240. |
[5] | MADISEH M G , NEVILLE S W , MCGUIRE M L . Applying beamforming to address temporal correlation in wireless channel characterization-based secret key generation[J]. IEEE Transactions on Information Forensics & Security, 2012,7(4): 1278-1287. |
[6] | HUANG P , WANG X . Fast secret key generation in static wireless networks:a virtual channel approach[C]// INFOCOM. 2013:22922300. |
[7] | CHEN D , QIN Z , MAO X ,et al. SmokeGrenade:an efficient key generation protocol with artificial interference[J]. IEEE Transactions on Information Forensics & Security, 2013,8(11): 1731-1745. |
[8] | GOLLAKOTA S , KATABI D . Physical layer wireless security made fast and channel independent[C]// INFOCOM, 2011: 1125-1133. |
[9] | CSISZAR I , NARAYAN P . Common randomness and secret key generation with a helper[C]// IEEE International Symposium on Information Theory. 2000:157. |
[10] | SHIMIZU T , IWAI H , SASAOKA H . Physical-layer secret key agreement in two-way wireless relaying systems[J]. IEEE Transactions on Information Forensics & Security, 2011,6(3): 650-660. |
[11] | LAI L , LIANG Y , DU W . cooperative key generation in wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2012,30(8): 1578-1588. |
[12] | MUKHERJEE A . Physical-layer security in the internet of things:sensing and communication confidentiality under resource constraints[J]. Proceedings of the IEEE, 2015,103(10): 1747-1761. |
[13] | 楼洋明, 金梁, 钟州 ,等. 基于MIMO接收信号空间的密钥生成方案[J]. 中国科学:信息科学, 2017(3). |
LOU Y M , JIN L , ZHONG Z ,et al. Secret key generation scheme based on MIMO received signal spaces[J]. SCIENTIA SINICA Informationis, 2017(3). | |
[14] | CHAN W W , TAN F W , SHEA J M . Secret-sharing LDPC codes for the BPSK-constrained gaussian wiretap channel[J]. IEEE Transactions on Information Forensics & Security, 2011,6(3): 551-564. |
[15] | BLOCH M , BARROS J , RODRIGUES M R D ,et al. Wireless Information-Theoretic Security-Part II:Practical Implementation[J]. IEEE Transactions on Information Theory, 2006,54(6): 2515-2534. |
[16] | ZHANG S , JIN L , LOU Y ,et al. Secret key generation based on two-way randomness for TDD-SISO system[J]. China Communications, 2018,15(7): 202-216. |
[17] | ZENG X , DURRANI T S . Estimation of mutual information using copula density function[J]. Electronics Letters, 2011,47(8): 493-494. |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|