[1] |
LINDQVIST U , NEUMANN P G . The future of the Internet of things[J]. Communications of the ACM, 2017,60(2): 26-30.
|
[2] |
SAMAILA M G , NETO M , FERNANDES D A B ,et al. Security challenges of the Internet of things[M]. Berlin:Springer International Publishing. 2017: 53-82.
|
[3] |
MUKHERJEE A , FAKOORIAN S A , HUANG J ,et al. Principles of physical layer security in multiuser wireless networks:a survey[J]. IEEE Communications Surveys & Tutorials, 2014,16(3): 1550-1573.
|
[4] |
ZENG K . Physical layer key generation in wireless networks:challenges and opportunities[J]. IEEE Communications Magazine, 2015,53(6): 33-39.
|
[5] |
XU P , CUMANAN K , DING Z ,et al. Group secret key generation in wireless networks:algorithms and rate optimization[J]. IEEE Transactions on Information and Security, 2016,11(8): 1831-1846.
|
[6] |
YANG E , WU X . Information-theoretically secure key generation and management[C]// IEEE International Symposium on Information Theory. 2017: 1529-1533.
|
[7] |
ZHANG H , LIANG Y , LAI L ,et al. Multi-key generation over a cellular model with a helper[J]. IEEE Transactions on Information and Security, 2017,63(6): 3804-3822.
|
[8] |
MAURER U M . Secret key agreement by public discussion from common information[J]. IEEE Transactions on Information and Security, 1993,39(3): 733-742.
|
[9] |
AHLSWEDE R , CSISZAR I . Common randomness in information theory and cryptography—part I:secret sharing[J]. IEEE Transactions on Information and Security, 1993,39(4): 1121-1132.
|
[10] |
YE C , MATHUR S , REZNIK A ,et al. Information-theoretically secret key generation for fading wireless channel[J]. IEEE Transactions on Information and Security, 2010,5(2): 240-254.
|
[11] |
ZHANG J , DUONG T Q , MARSHALL A ,et al. Key generation from wireless channels:a review[J]. IEEE Access, 2016,4: 614-626.
|
[12] |
PENG Y , WANG P , XIANG W ,et al. Secret key generation based on estimated channel state information for TDD-OFDM systems over fading channels[J]. IEEE Transactions on Wireless Communications, 2017,16(8): 5176-5186.
|
[13] |
ZHANG J , HE B , DUONG T Q ,et al. On the key generation from correlated wireless channels[J]. IEEE Communications Letters, 2017,21(4): 961-964.
|
[14] |
CASTEL T , TORRE P V , ROGIER H . RSS-based secret key generation for indoor and outdoor WBANs using on-body sensor nodes[C]// International Conference on Military Communications and Information Systems. 2016: 1-5.
|
[15] |
ZHU X , XU F , NOVAK E ,et al. Using wireless link dynamics to extract a secret key in vehicular scenarios[J]. IEEE Transactions on Mobile Computing, 2016,16(7): 2065-2078.
|
[16] |
MARGELIS G , FAFOUTIS X , OIKONOMOU G ,et al. Physical layer secret-key generation with discreet cosine transform for the Internet of things[C]// IEEE International Conference on Communications. 2017: 1-6.
|
[17] |
CSISZAR I , NARAYAN P . Common randomness and secret key generation with a helper[J]. IEEE Transactions on Information and Security, 2000,46(2): 344-366.
|
[18] |
SHIMIZU T , IWAI H , SASAOKA H . Physical-layer secret key agreement in two-way wireless relaying systems[J]. IEEE Transactions on Information and Security, 2011,6(3): 650-660.
|
[19] |
LAI L , LIANG Y , DU W . Cooperative key generation in wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2012,30(8): 1578-1588.
|
[20] |
ZHOU H , HUIE L M , LAI L . Secret key generation in the two-way relay channel with active attackers[J]. IEEE Transactions on Information and Security, 2014,9(3): 476-488.
|
[21] |
THAI C D T , LEE J , QUEK T Q S . Physical-layer secret key generation with colluding untrusted relays[J]. IEEE Transactions on Wireless Communications, 2016,15(2): 1517-1530.
|