[1] |
SHAWKY M A , USMAN M , IMRAN M A ,et al. Adaptive chaotic map-based key extraction for efficient cross-layer authentication in VANETs[J]. Vehicular Communications. 2023,39: 4-5.
|
[2] |
CHENG L , STANCIL D D , BAI F ,et al. A roadside scattering model for the vehicle-to-vehicle communication channel[J]. IEEE Journal on Selected Areas in Communications, 2013,31(9): 449-459.
|
[3] |
MARGELIS G , FAFOUTIS X , OIKONOMOU G ,et al. Physical layer secret-key generation with discreet cosine transform for the Internet of Things[C]// Proceedings of IEEE International Conference on Communications (ICC). 2017: 2-4.
|
[4] |
YANG H Q , LIU H B , LUO C W ,et al. Vehicle-key:a secret key establishment scheme for LoRa-enabled IoV communications[C]// Proceedings of IEEE 42nd International Conference on Distributed Computing Systems. 2022: 5-7.
|
[5] |
LI K , LU L Y , NI W ,et al. Secret key agreement for data dissemination in vehicular platoons[J]. IEEE Transactions on Vehicular Technology, 2019,99:1.
|
[6] |
LI S , MA Y F , GU X ,et al. Wi-Fi-based device-free vehicle speed measurement using fast phase correction MUSIC algorithm[C]// Proceedings of 2020 International Conferences on Internet of Things (iThings). 2020: 9060-9062.
|
[7] |
LIU H , WANG Y , REN Y ,et al. Bipartite graph matching based secret key generation[C]// Proceedings of IEEE Conference on Computer Communications. 2021.
|
[8] |
ZHANG J Q , MARSHALL A , WOODS R ,et al. Efficient key generation by exploiting randomness from channel responses of individual OFDM subcarriers[J]. IEEE Transactions on Communications, 2016,64(6): 2579-2580.
|
[9] |
PAN Y J , XU Z Q , LI M ,et al. Man-in-the-middle attack resistant secret key generation via channel randomization[C]// Proceedings of International Symposium on Mobile Ad Hoc Networking and Computing. 2021: 231-240.
|
[10] |
ERCEG V , SCHUMACHER L , KYRITSI P ,et al. TGn channel models[S]. IEEE Standard 802.11-03/940r4, 2004.
|
[11] |
ZHANG J Q , LI G Y , MARSHALL A ,et al. A new frontier for loT security emerging from three decades of key generation relying on wireless channels[J]. IEEE Access, 2020,8(99): 138410-138412.
|
[12] |
BAKSI S , SNOAP J , POPESCU D C . Secret key generation using one-bit quantized channel state information[C]// Proceedings of Wireless Communications Networking Conference. 2017.
|
[13] |
RANA V , CHOU R A . Design of short block length wiretap channel codes:deep learning and cryptography working hand in hand[C]// Proceedings of IEEE Information Theory Workshop (ITW). 2021.
|
[14] |
LIN Q , XU W T , LIU J ,et al. H2b:heartbeat-based secret key generation using piezo vibration sensors[C]// Proceedings of the Inter- national Conference on Information Processing in Sensor Networks(IPSN). 2019: 265-267.
|
[15] |
BESSER K L , LIN P H , JANDA C R ,et al. Wiretap code design by neural network autoencoders[J]. IEEE Transactions on Information Forensics and Security. 2019,5(99): 3377-3378.
|
[16] |
ARTEMY K , BRENDAN T . Estimating mixture entropy with pairwise distances[J]. Entropy, 2017,19(7): 361-362.
|
[17] |
李默, 张春梅, 银振强 ,等. 量子密钥分配后处理概述[J]. 密码学报, 2015(2): 9.
|
|
LI M , ZHANG C M , YIN Z Q ,et al. Overview of post-processing for quantum key distribution[J]. Journal of Cryptologic Research, 2015(2): 9.
|
[18] |
杨铮, 刘云浩 . Wi-Fi雷达:从RSSI到CSI[J]. 中国计算机协会通讯, 2014,10(11): 55-57.
|
|
YANG Z , LIU Y H . Wi-Fi radar:from RSSI to CSI[J]. Communications of the China Computer Federation, 2014,10(11): 55-57.
|