[1] |
DADDALA B , WANG H , JAVAID A Y . Design and implementation of a customized encryption algorithm for authentication and secure communication between devices[C]// IEEE National Aerospace and Electronics Conference. 2017: 258-262.
|
[2] |
MOHINDRU V , SINGH Y . Performance analysis of message authentication algorithms in wireless sensor networks[C]// International Conference on Signal Processing,Computing and Control. 2017: 468-472.
|
[3] |
DANG H V , THUC N D . A privacy preserving message authentication code[C]// International Conference on It Convergence and Security. 2015: 1-4.
|
[4] |
ARAZI B . Message authentication in computationally constrained environments[J]. IEEE Transactions on Mobile Computing, 2009,8(7): 968-974.
|
[5] |
CAO J , MA M , LI H ,et al. A survey on security aspects for LTE and LTE-A networks[J]. IEEE Communications Surveys & Tutorials, 2014,16(1): 283-302.
|
[6] |
WU X , YANG Z , LING C ,et al. Artificial-noise-aided message authentication codes with information-theoretic security[J]. IEEE Transactions on Information Forensics & Security, 2017,11(6): 1278-1290.
|
[7] |
PATWARI N , KASERA S K . Temporal link signature measurements for location distinction[J]. IEEE Transactions on Mobile Computing, 2011,10(3): 449-462.
|
[8] |
LAI L , EL GAMAL H , POOR H V . Authentication over noisy channels[J]. IEEE Transactions on Information Theory, 2009,55(2): 906-916.
|
[9] |
JORSWIECK E , TOMASIN S , SEZGIN A . Broadcasting into the uncertainty:authentication and confidentiality by physical-layer processing[J]. Proceedings of the IEEE, 2015,103(10): 1702-1724.
|
[10] |
张继明 . 无线网络中物理层身份认证研究[D]. 武汉:华中科技大学, 2013.
|
|
ZHANG J M . Research on physical-layer identity authentication in wireless networks[D]. Wuhan:Huazhong University of Science and Technology, 2013.
|
[11] |
LIANG X , GREENSTEIN L , MANDAYAM N ,et al. Fingerprints in the ether:using the physical layer for wireless authentication[C]// IEEE International Conference on Communications IEEE, 2007: 4646-4651.
|
[12] |
DEMIRBAS M , SONG Y . An RSSI-based scheme for sybil attack detection in wireless sensor networks[C]// International Symposium on World of Wireless,Mobile and Multimedia Networks. 2006: 5pp-570.
|
[13] |
LIU J , WANG X . Physical layer authentication enhancement using two-dimensional channel quantization[J]. IEEE Transactions on Wireless Communications, 2016,15(6): 4171-4182.
|
[14] |
WEN H , WANG Y , ZHU X ,et al. Physical layer assist authentication technique for smart meter system[J]. IET Communications, 2013,7(7): 189-197.
|
[15] |
王旭, 金梁, 刘璐 ,等. 均匀散射环境中物理层安全密钥容量分析[J]. 通信学报, 2016,37(9): 75-81.
|
|
WANG X , JIN L , LIU L ,et al. Analysis of physical layer secret key capacity in the uniform scattering environment[J]. Journal on Communications, 2016,37(9): 75-81.
|
[16] |
戴峤, 金梁, 黄开枝 . 基于信道特征量化的自适应密钥生成方案设计[J]. 通信学报, 2014(1): 191-197.
|
|
DAI Q , JIN L , HUANG K Z . Adaptive key distillation from channel characteristics[J]. Journal on Communications, 2014,(1): 191-197.
|
[17] |
LIU Y , BONCELET C . The CRC–NTMAC for noisy message authentication[J]. IEEE Transactions on Information Forensics &Security, 2006,1(4): 517-523.
|
[18] |
樊昌信, 曹丽娜 . 通信原理(第七版)[M]. 北京: 国防工业出版社, 2012.
|
|
FAN C X , CAO L N . Principles of communications (the seventh edition)[M]. Beijing: National Defense Industry PressPress, 2012.
|
[19] |
季新生, 杨静, 黄开枝 ,等. 基于哈希方法的物理层认证机制[J]. 电子与信息学报, 2016,38(11): 2900-2907.
|
|
JI X S , YANG J , HUANG K Z ,et al. Physical layer authentication scheme based on hash method[J]. Journal of Electronics & Information Technology, 2016,38(11): 2900-2907.
|