[1] |
WU B , CHEN J , CARDEI M ,et al. A survey of attacks and countermeasures in mobile Ad Hoc networks[J]. Springer, 2007: 103-105.
|
[2] |
ZOU Y , JIA Z , WANG X ,et al. A survey on wireless security:technical challenges,recent advances,and future trends[J]. Proceedings of the IEEE, 2016,104(9): 1727-1765.
|
[3] |
ZHANG J , DUONG T , MARSHALL A ,et al. Key generation from wireless channels:a review[J]. IEEE Access, 2017,4(3): 614-626.
|
[4] |
闫富朝, 刘怡良, 韩帅 ,等. 空天地通信网络中物理层安全技术综述[J]. 电信科学, 2020,36(9): 1-13.
|
|
YAN F C , LIU Y L , HAN S ,et al. A survey of physical layer security in space-air-ground communication and networks[J]. Telecommunications Science, 2020,36(9): 1-13.
|
[5] |
MATHUR S , TRAPPE W , MANDAYAM N ,et al. Radio-telepathy:extracting a secret key from an unauthenticated wireless channel[C]// Proceedings of the ACM International Conference on Mobile Computing and Networking. New York:ACM Press, 2008: 128-139.
|
[6] |
PENG Y , WANG P , XIANG W ,et al. Secret key generation based on estimated channel state information for TDD-OFDM systems over fading channels[J]. IEEE Transactions on Wireless Communications, 2017,16(8): 5176-5186.
|
[7] |
UPADHYAY G , NENE M J . One time pad generation using quantum superposition states[C]// Proceedings of IEEE International Conference on Recent Trends in Electronics Information& Communication Technology (RTEICT). Piscataway: IEEE Press, 2017: 1882-1886.
|
[8] |
SUDARSONO A , YULIANA M , KRISTALINA P . A reciprocity approach for shared secret key generation extracted from received signal strength in the wireless networks[C]// Proceedings of International Electronics Symposium on Engineering Technology and Applications. Piscataway: IEEE Press, 2018: 170-175.
|
[9] |
LI H , SHEN C , ZHAO Y ,et al. High entropy secrecy generation from wireless CIR[J]. Journal of Communications and Networks, 2019,21(2): 177-191.
|
[10] |
LI G , HU A , ZHANG J ,et al. High-agreement uncorrelated secret key generation based on principal component analysis preprocessing[J]. IEEE Transactions on Communications, 2018,66(7): 3022-3034.
|
[11] |
BRASSARD G , SALVAIL L . Secret-key reconciliation by public discussion[C]// Proceedings of the 1993 Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology. Heidelberg: Springer, 1994: 410-423.
|
[12] |
ZHAO F , FU M , WANG F ,et al. Error reconciliation for practical quantum cryptography[J]. Optik-International Journal for Light and Electron Optics, 2007,118(10): 502-506.
|
[13] |
ZHANG S , JIN L , ZHU S ,et al. Information reconciliation based on systematic secure polar code for secret key generation[C]// Proceedings of IEEE 88th Vehicular Technology Conference(VTC-Fall). Piscataway:IEEE Press, 2018: 1-6.
|
[14] |
EPIPHANIOU G , KARADIMAS P , ISMAIL D K B ,et al. Non-reciprocity compensation combined with Turbo codes for secret key generation in vehicular Ad Hoc social IoT networks[J]. IEEE Internet of Things Journal, 2018,5(4): 2496-2505.
|
[15] |
SIMEONE O , BAR-NESS Y , SPAGNOLINI U . Pilot-based channel estimation for OFDM systems by tracking the delay-subspace[J]. IEEE Transactions on Wireless Communications, 2004,3(1): 315-325.
|
[16] |
SHIN C , HEATH R W , POWERS E J . Blind channel estimation for MIMO-OFDM systems[C]// Proceedings of the IEEE Global Telecommunications Conference. Piscataway:IEEE Press, 2007: 670-685.
|
[17] |
Guidelines for evaluation of radio transmission technologies for IMT-2000[J]. Rec.ITU-R M.1225, 1997.
|
[18] |
LI G , SUN C , ZHANG J ,et al. Physical layer key generation in 5G and beyond wireless communications:challenges and opportunities[J]. Entropy, 2019,21(5): 1-16.
|