[1] |
Cisco. Cisco delivers vision of fog computing to accelerate value from billions of connected devices[R]. 2017.
|
[2] |
SARKAR S , CHATTERJEE S , MISRA S . Assessment of the suitability of fog computing in the context of internet of things[J]. IEEE Transactions on Cloud Computing, 2018, 6(1): 46-59.
|
[3] |
ALRAWAIS A , ALHOTHAILY A , HU C , et al. Fog computing for the internet of things: security and privacy issues[J]. IEEE Internet Computing, 2017, 21(2): 34-42.
|
[4] |
CHAUDHARY R , KUMAR N , ZEADALLY S . Network service chaining in fog and cloud computing for the 5G environment: data management and security challenges[J]. IEEE Communications Magazine, 2017, 55(11): 114-122.
|
[5] |
王庆扬, 谢沛荣, 熊尚坤 . 5G 关键技术与标准综述[J]. 电信科学, 2017, 33(11): 112-122.
|
|
WANG Q Y , XIE P R , XIONG S K . Key technology and standardization progress for 5G[J]. Telecommunications Science, 2017, 33(1): 112-122.
|
[6] |
朱雪田, 夏旭, 齐飞 . 5G 网络关键技术和业务[J]. 电子技术应用, 2018, 44(9): 1-4.
|
|
ZHU X T , XIA X , QI F . 5G key technologies and business forecast[J]. Application of Electronic Technique, 2018, 44(9): 1-4.
|
[7] |
BOTTA A , DONATO W D , PERSICO V , et al. Integration of cloud computing and internet of things: a survey[J]. Future Generation Computer Systems, 2016, 56(1): 684-700.
|
[8] |
SINGH S P , NAYYAR A , KUMAR R , et al. Fog computing: from architecture to edge computing and big data processing[J]. The Journal of Supercomputing, 2019, 75(4): 2070-2105.
|
[9] |
MA Z , XIE J , LI H , et al. The role of data analysis in the development of intelligent energy networks[J]. IEEE Network, 2017, 31(5): 88-95.
|
[10] |
SHANNON C E . Communication theory of secrecy systems[J]. Bell System Technical Journal, 1949, 28(4): 656-715.
|
[11] |
WYNER A D . The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387.
|
[12] |
MAURER U M . Secret key agreement by public discussion from common information[J]. IEEE Transactions on Information Theory, 1993, 39(3): 733-742.
|
[13] |
ZENG K . Physical layer key generation in wireless networks: challenges and opportunities[J]. IEEE Communications Magazine, 2015, 53(6): 33-39.
|
[14] |
THAI C D T , LEE J , TONY Q S , et al. Physical-layer secret key generation with colluding untrusted relays[J]. IEEE Transactions on Wireless Communications, 2016, 15(2): 1517-1530.
|
[15] |
胡晓言, 金梁, 黄开枝 , 等. 基于信号传播特性的物理层密钥生成方案[J]. 电子学报, 2019, 47(2): 483-488.
|
|
HU X Y , JIN L , HUANG K Z , et al. Physical layer secret key generation scheme based on signal propagation characteristics[J]. ACTA Electronica Sinica, 2019, 47(2): 483-488.
|
[16] |
TU S , WAQAS M , REHMAN S U , et al. Security in fog somputing: anovel technique to tackle an impersonation attack[J]. IEEE Access, 2018(6): 74993-75001.
|
[17] |
WAQAS M , AHMED M , LI Y , et al. Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays[J]. IEEE Transactions on Wireless Communications, 2018, 17(6): 3918-3930.
|
[18] |
AHLSWEDE R , CSISZáR I . Common randomness in information theory and cryptography.Part I: secret sharing[J]. IEEE Transactions on Information Theory, 1993, 39(4): 1121-1132.
|
[19] |
张启星, 付敬奇 . 基于信道特征提取的物理层安全密钥生成方法[J]. 电子测量与仪器学报, 2019, 33(1): 16-22.
|
|
ZHANG Q X , FU J Q . Physical layer secure key generation method based on channel feature extraction[J]. Journal of Electronic Measurement and Instrumentation, 2019, 33(1): 16-22.
|
[20] |
孟远, 涂山山, 于金亮 . 雾计算中基于DQL算法的伪装攻击检测方案[J]. 计算机工程与应用, 2019(已录用).
|
|
MENG Y , TU S S , YU J L . Detection scheme of camouflage attack based on DQL algorithms in fog computing[J]. Computer Engineering and Applications, 2019(accepted).
|
[21] |
MNIH V , KAVUKCUOGLU K , SILVER D , et al. Human-level control through deep reinforcement learning[J]. Nature, 2015, 518(7540): 529-533.
|