Telecommunications Science ›› 2021, Vol. 37 ›› Issue (5): 100-112.doi: 10.11959/j.issn.1000-0801.2021106
• Research and Development • Previous Articles Next Articles
Nannan LI1, Yu HAN2, Ning GAO1, Shi JIN1
Revised:
2021-03-19
Online:
2021-05-20
Published:
2021-05-01
Supported by:
CLC Number:
Nannan LI, Yu HAN, Ning GAO, Shi JIN. Joint amplitude and phase partition based physical layer key generation method[J]. Telecommunications Science, 2021, 37(5): 100-112.
[1] | WU B , CHEN J , CARDEI M ,et al. A survey of attacks and countermeasures in mobile Ad Hoc networks[J]. Springer, 2007: 103-105. |
[2] | ZOU Y , JIA Z , WANG X ,et al. A survey on wireless security:technical challenges,recent advances,and future trends[J]. Proceedings of the IEEE, 2016,104(9): 1727-1765. |
[3] | ZHANG J , DUONG T , MARSHALL A ,et al. Key generation from wireless channels:a review[J]. IEEE Access, 2017,4(3): 614-626. |
[4] | 闫富朝, 刘怡良, 韩帅 ,等. 空天地通信网络中物理层安全技术综述[J]. 电信科学, 2020,36(9): 1-13. |
YAN F C , LIU Y L , HAN S ,et al. A survey of physical layer security in space-air-ground communication and networks[J]. Telecommunications Science, 2020,36(9): 1-13. | |
[5] | MATHUR S , TRAPPE W , MANDAYAM N ,et al. Radio-telepathy:extracting a secret key from an unauthenticated wireless channel[C]// Proceedings of the ACM International Conference on Mobile Computing and Networking. New York:ACM Press, 2008: 128-139. |
[6] | PENG Y , WANG P , XIANG W ,et al. Secret key generation based on estimated channel state information for TDD-OFDM systems over fading channels[J]. IEEE Transactions on Wireless Communications, 2017,16(8): 5176-5186. |
[7] | UPADHYAY G , NENE M J . One time pad generation using quantum superposition states[C]// Proceedings of IEEE International Conference on Recent Trends in Electronics Information& Communication Technology (RTEICT). Piscataway: IEEE Press, 2017: 1882-1886. |
[8] | SUDARSONO A , YULIANA M , KRISTALINA P . A reciprocity approach for shared secret key generation extracted from received signal strength in the wireless networks[C]// Proceedings of International Electronics Symposium on Engineering Technology and Applications. Piscataway: IEEE Press, 2018: 170-175. |
[9] | LI H , SHEN C , ZHAO Y ,et al. High entropy secrecy generation from wireless CIR[J]. Journal of Communications and Networks, 2019,21(2): 177-191. |
[10] | LI G , HU A , ZHANG J ,et al. High-agreement uncorrelated secret key generation based on principal component analysis preprocessing[J]. IEEE Transactions on Communications, 2018,66(7): 3022-3034. |
[11] | BRASSARD G , SALVAIL L . Secret-key reconciliation by public discussion[C]// Proceedings of the 1993 Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology. Heidelberg: Springer, 1994: 410-423. |
[12] | ZHAO F , FU M , WANG F ,et al. Error reconciliation for practical quantum cryptography[J]. Optik-International Journal for Light and Electron Optics, 2007,118(10): 502-506. |
[13] | ZHANG S , JIN L , ZHU S ,et al. Information reconciliation based on systematic secure polar code for secret key generation[C]// Proceedings of IEEE 88th Vehicular Technology Conference(VTC-Fall). Piscataway:IEEE Press, 2018: 1-6. |
[14] | EPIPHANIOU G , KARADIMAS P , ISMAIL D K B ,et al. Non-reciprocity compensation combined with Turbo codes for secret key generation in vehicular Ad Hoc social IoT networks[J]. IEEE Internet of Things Journal, 2018,5(4): 2496-2505. |
[15] | SIMEONE O , BAR-NESS Y , SPAGNOLINI U . Pilot-based channel estimation for OFDM systems by tracking the delay-subspace[J]. IEEE Transactions on Wireless Communications, 2004,3(1): 315-325. |
[16] | SHIN C , HEATH R W , POWERS E J . Blind channel estimation for MIMO-OFDM systems[C]// Proceedings of the IEEE Global Telecommunications Conference. Piscataway:IEEE Press, 2007: 670-685. |
[17] | Guidelines for evaluation of radio transmission technologies for IMT-2000[J]. Rec.ITU-R M.1225, 1997. |
[18] | LI G , SUN C , ZHANG J ,et al. Physical layer key generation in 5G and beyond wireless communications:challenges and opportunities[J]. Entropy, 2019,21(5): 1-16. |
[1] | Shengli ZHOU, Keyi JIANG, Bo XU, Rui XU, Xikang ZHANG, Quanzhe ZHAO, Yangdong XU. Research on the effectiveness evaluation of cyber security curriculum construction for combating telecom network fraud [J]. Telecommunications Science, 2023, 39(6): 122-128. |
[2] | Jiawei HU, Xiaoqian LIU, Xinke TANG, Yuhan DONG. Trajectory planning of UUV-assisted UWOC systems based on DQN [J]. Telecommunications Science, 2023, 39(5): 42-47. |
[3] | Qingfeng DING, Song WANG. Distributed IOS-SM transmission scheme with joint antenna and IOS unit selection for high-speed railway scenario [J]. Telecommunications Science, 2023, 39(4): 31-42. |
[4] | Yueyu JIANG, Haoxin CHENG, Kang WANG, Wenjun DAI, Xiaoyu LIU. Design method of energy efficiency optimization in PLC-RF wireless transmission networks [J]. Telecommunications Science, 2023, 39(4): 111-119. |
[5] | Le ZHANG, Hongyuan MA. Practice on edge cloud security of telecom operators [J]. Telecommunications Science, 2023, 39(4): 165-172. |
[6] | Fuyuan CHEN, Zhenjiang DONG, Jiankuo DONG, Minjie XU. A survey of V2X security protection technologies [J]. Telecommunications Science, 2023, 39(3): 1-15. |
[7] | Jingjie SHEN, Guangqiu LI, Yancui LUO, Huizhi LIU. Physical layer security of full-duplex relay-assisted D2D networks under outdated CSI [J]. Telecommunications Science, 2023, 39(3): 89-99. |
[8] | Yu KANG, Yaqiong LIU, Tongyu ZHAO, Guochu SHOU. A survey on AI algorithms applied in communication and computation in Internet of vehicles [J]. Telecommunications Science, 2023, 39(1): 1-19. |
[9] | Mingrui XU, Yucai YAO, Xiaorong ZHU. A Fisco-Bcos platform based accurate performance analysis model of blockchain system [J]. Telecommunications Science, 2023, 39(1): 79-91. |
[10] | Yifan DING, Guangqiu LI, Hui LI. Physical layer security of NOMA-D2D cooperative wireless system [J]. Telecommunications Science, 2022, 38(9): 83-94. |
[11] | Jianwu ZHANG, Yanjun AN, Huangyan DENG. A survey on DNS attack detection and security protection [J]. Telecommunications Science, 2022, 38(9): 1-17. |
[12] | Yusun FU, Jinhui TANG. A survey on 5G capabilities enabling the factories of the future [J]. Telecommunications Science, 2022, 38(9): 18-35. |
[13] | Weixiong CHEN, Xiaochen YANG, Zengjun CHUN, Ruolan LI, Hua ZHANG. Research and practice of network security threat intelligence management system for power enterprise [J]. Telecommunications Science, 2022, 38(7): 184-189. |
[14] | Hongbin LUO, Shan ZHANG, Zhiyuan WANG. Interconnection and coexistence of heterogeneous network:requirements, challenges, and architecture [J]. Telecommunications Science, 2022, 38(6): 18-30. |
[15] | Yifan DING, Guangqiu LI, Hui LI. Physical layer security for SWIPT-NOMA system in presence of randomly located eavesdroppers [J]. Telecommunications Science, 2022, 38(3): 133-142. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|