[1] |
HAMAMREH J M , FURQAN H M , ARSLAN H . Classifications and applications of physical layer security techniques for confidentiality:a comprehensive survey[J]. IEEE Communications Surveys & Tutorials, 2019,21(2): 1773-1828.
|
[2] |
ZHANG J Q , HE B , DUONG T Q ,et al. On the key generation from correlated wireless channels[J]. IEEE Communications Letters, 2017,21(4): 961-964.
|
[3] |
EPIPHANIOU G , KARADIMAS P , ISMAIL D K B ,et al. Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks[J]. IEEE Internet of Things Journal, 2018,5(4): 2496-2505.
|
[4] |
AMAN W , IJAZ A , RAHMAN M M U ,et al. Shared secret key generation via carrier frequency offsets[C]// Proceedings of 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring). Piscataway:IEEE Press, 2019: 1-5.
|
[5] |
HUANG Y , LI W , LEI J . Concatenated physical layer encryption scheme based on rateless codes[J]. IET Communications, 2018,12(12): 1491-1497.
|
[6] |
LU X J , SHI Y X , LI W ,et al. A joint physical layer encryption and PAPR reduction scheme based on polar codes and chaotic sequences in OFDM system[J]. IEEE Access, 2019,7: 73036-73045.
|
[7] |
WANG S X , LI W , LEI J . Physical-layer encryption in massive MIMO systems with spatial modulation[J]. China Communications, 2018,15(10): 159-171.
|
[8] |
SHA Y P , GAO M Y , WANG L ,et al. Physical encryption based on chaotic sequence-assisted pseudo QAM systems[C]// Proceedings of 2019 18th International Conference on Optical Communications and Networks (ICOCN). Piscataway:IEEE Press, 2019: 1-3.
|
[9] |
ZEWAIL A A , YENER A . Multi-terminal two-hop untrusted-relay networks with hierarchical security guarantees[J]. IEEE Transactions on Information Forensics and Security, 2017,12(9): 2052-2066.
|
[10] |
HUA G . Over-complete-dictionary-based improved spread spectrum watermarking security[J]. IEEE Signal Processing Letters, 2020,27: 770-774.
|
[11] |
PROAKIS J G , SALEHI M . Digital Communications[M]. 5th ed. New York: McGraw-Hill, 2008.
|
[12] |
AMURU S , DHILLON H S , BUEHRER R M . On jamming against wireless networks[J]. IEEE Transactions on Wireless Communications, 2017,16(1): 412-428.
|
[13] |
ZOU Y L , ZHU J , WANG X B ,et al. A survey on wireless security:technical challenges,recent advances,and future trends[C]// Proceedings of the IEEE. Piscataway:IEEE Press, 2016: 1727-1765.
|
[14] |
SIMON R M K , OMURA J K , LEVITT B K . Spread spectrum communications handbook[M]. New York: McGraw-Hill, 1994.
|
[15] |
STRASSER M , POPPER C , CAPKUN S ,et al. Jamming-resistant key establishment using uncoordinated frequency hopping[C]// Proceedings of 2008 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2008: 64-78.
|
[16] |
YAZICIGIL R T , NADEAU P , RICHMAN D ,et al. Ultra-fast bit-level frequency-hopping transmitter for securing low-power wireless devices[C]// Proceedings of 2018 IEEE Radio Frequency Integrated Circuits Symposium (RFIC). Piscataway:IEEE Press, 2018: 176-179.
|
[17] |
SHI Y X , AN K , LI Y S . Index modulation based frequency hopping:anti-jamming design and analysis[J]. IEEE Transactions on Vehicular Technology, 2021,70(7): 6930-6942.
|
[18] |
戴峤, 金梁, 黄开枝 . 基于信道特征量化的自适应密钥生成方案设计[J]. 通信学报, 2014,35(1): 191-197.
|
|
DAI Q , JIN L , HUANG K Z . Adaptive key distillation from channel characteristics[J]. Journal on Communications, 2014,35(1): 191-197.
|
[19] |
赖凤麟, 姜永广, 咸立文 ,等. 一种OFDM系统信道密钥生成方法[J]. 电讯技术, 2018,58(3): 313-319.
|
|
LAI F L , JIANG Y G , XIAN L W ,et al. A channel frequency response based secret key generation method in OFDM systems[J]. Telecommunication Engineering, 2018,58(3): 313-319.
|
[20] |
WILHELM M , MARTINOVIC I , SCHMITT J B ,et al. Short paper:reactive jamming in wireless networks:how realistic is the threat?[C]// Proceedings of the Fourth ACM Conference on Wireless Network Security. New York:ACM Press, 2011: 47-52.
|