[1] |
SHEHADEH Y E H , HOGREFE D . A survey on secret key generation mechanisms on the physical layer in wireless networks[J]. Security and Communication Networks, 2015,8(2): 332-41.
|
[2] |
WANG T , LIU Y , VASILAKOS A V . Survey on channel reciprocity based key establishment techniques for wireless systems[J]. Wireless Networks, 2015,21(6): 1835-46.
|
[3] |
THAI C D T , LEE J , QUEK T Q . Physical-layer secret key generation with colluding untrusted relays[J]. IEEE Transactions on Wireless Communications, 2016,15(2): 1517-30.
|
[4] |
CHOU T H , DRAPER S C , SAYEED A M . Key generation using external source excitation:capacity,reliability,and secrecy exponent[J]. IEEE Transactions on Information Theory, 2012,58(4): 2455-74.
|
[5] |
PFENNIG S , FRANZ E , ENGELMANN S ,et al. End-to-end key establishment with physical layer key generation and specific attacker models[M]. Physical and Data-Link Security Techniques for Future Communication Systems. Springer, 2016: 93-110.
|
[6] |
PREMNATH S N , JANA S , CROFT J ,et al. Secret key extraction from wireless signal strength in real environments[J]. IEEE Transactions on Mobile Computing, 2013,12(5): 917-30.
|
[7] |
TSOURI G R , WAGNER D M . Threshold constraints on symmetric key extraction from rician fading estimates[J]. IEEE Transactions on Mobile Computing, 2013,12(12): 2496-506.
|
[8] |
戴峤, 宋华伟, 金梁 . 基于等效信道的物理层认证和密钥分发机制[J]. 中国科学 信息科学, 2014,44(12): 1580-92. DAI Q , SONG H W , JIN L ,et al. Physical–layer authentication and key distribution mechanism based on equivalent channel[J]. Scientia Sinica Informationis, 2014,44(12): 1580-1592.
|
[9] |
MAURER U M . Secret key agreement by public discussion from common information[J]. IEEE Transactions on Information Theory, 1993,39(3): 733-42.
|
[10] |
AHLSWEDE R,CSISZáR I.Common randomness in information theory and cryptography . part I:secret sharing[J]. IEEE Transactions on Information Theory, 1993,39(4): 1121-32.
|
[11] |
AHLSWEDE R,CSISZáR I . Common randomness in information theory and cryptography part II:CR capacity[J]. IEEE Transactions on Information Theory, 1998,44(1): 225-40.
|
[12] |
PATWARI N , CROFT J , JANA S ,et al. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements[J]. IEEE Transactions on Mobile Computing, 2010,9(1): 17-30.
|
[13] |
SHEHADEH Y E H , ALFANDI O , HOGREFE D . On improving the robustness of physical-layer key extraction mechanisms against delay and mobility[C]// IEEE Wireless Communications and Mobile Computing Conference. Limassol,Cyprus, 2012: 1028-1033.
|
[14] |
SHEHADEH Y E H , ALFANDI O , HOGREFE D . Towards robust key extraction from multipath wireless channels[J]. Journal of Communications and Networks, 2012,4(14): 385-95.
|
[15] |
NITINAWARAT S , NARAYAN P . Secret key generation for correlated Gaussian sources[J]. IEEE Transactions on Information Theory, 2012,58(6): 3373-3391.
|
[16] |
WU X , SONG Y , ZHAO C ,et al. Secrecy extraction from correlated fading channels:an upper bound[C]// IEEE International Conference on Wireless Communications & Signal Processing. Nanjing,China, 2009.
|
[17] |
CLARKE R . A statistical theory of mobile‐radio reception[J]. Bell System Technical Journal, 1968,47(6): 957-1000.
|
[18] |
JAKES W C , COX D C . Microwave mobile communications[M]. New Jersey,USA: Wiley-IEEE PressPress, 1994.
|
[19] |
GOLD S A . Wireless communications[M]. Cambridge,UK: Cambridge University PressPress, 2005.
|
[20] |
CHEN C , JENSEN M . Secret key establishment using temporally and spatially correlated wireless channel coefficients[J]. IEEE Transactions on Mobile Computing, 2011,10(2): 205-215.
|
[21] |
COVER T M , THOMAS J A . Elements of information theory[M]. New Jersey,USA: John Wiley & SonsPress, 2012.
|
[22] |
FONTáN F P , ESPI?EIRA P M . Modelling the wireless propagation channel:a simulation approach with matlab[M]. New Jersey,USA: John Wiley & SonsPress, 2008.
|
[23] |
ZENG X , DURRANI T . Estimation of mutual information using copula density function[J]. Electronics Letters, 2011,47(8): 493-494.
|
[24] |
MA J , SUN Z . Mutual information is copula entropy[J]. Tsinghua Science & Technology, 2011,16(1): 51-4.
|
[25] |
韩敏, 刘晓欣 . 基于Copula熵的互信息估计方法[J]. 控制理论与应用, 2013,30(7): 875-879. HAN M , LIU X X . Mutual information estimation based on copula entropy[J]. Control Theory & Applications, 2013,30(7): 875-879.
|