[1] FERNANDO N,LOKE W,RAHAYU W.Mobile cloud computing:a survey[J].Future Generation Computer Systems,2013,29(1):84-106. [2] ARMBRUST M,FOX A,GRIFFITH R,et al.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58. [3] ZHANG Hong,ZHANG Jinbo,ZHOU Yun,et al.Research on physical layer security technology of large-scale distributed system[J].Radio Engineering,2019,49(1):1-5.(in Chinese)张鸿,张金波,周云.大规模分布式系统的物理层安全技术研究[J].无线电工程,2019,49(1):1-5. [4] GOPINATH S,GUILLAUME R,DUPLYS P,et al,Reciprocity enhancement and decorrelation schemes for PHY-based key generation[C]//Proceedings of Globecom Workshops.Austin,USA:[s.n.],2014:1367-1372. [5] THAI C D T,LEE J,QUEK T Q S.Physical-layer secret key generation with colluding untrusted relays[J].IEEE Transactions on Wireless Communications,2016,15(2):1517-1530. [6] ZHANG J,TRUNG Q,MARSHALL D A,et al.Key generation from wireless channels:a review[J].IEEE Access,2016,4:614-626. [7] ZENG Kai.Physical layer key generation in wireless networks:challenges and opportunities[J].IEEE Communications Magazine,2015,56(3):33-39. [8] LIAO Xiaomin,FENG Suili,TANG Weijun.Physical layer security strategy based on full-duplex and cooperative jamming in wireless mesh networks[J].Telecommunication Engineering,2018,58(7):753-759.(in Chinese)廖晓敏,冯穗力,唐玮俊.结合全双工与协作干扰的无线网状网物理层安全策略[J].电讯技术,2018,58(7):753-759. [9] SONG Huiying,GAO Yuanyuan,SHA Nan.An effective method of improving security performance of RFID system physical layer[J].Computer Engineering,2018,44(5):119-123.(in Chinese)宋慧颖,高媛媛,沙楠.一种有效提高RFID系统物理层安全性能的方法[J].计算机工程,2018,44(5):119-123. [10] SADEGHI A,ZORZI M,LAHOUTI F.Analysis of key generation rate from wireless channel in in-band full-duplex communications[J].IEEE Transactions on Wireless Communications,2016,17(6):3768-3780. [11] SUN Jingchao,CHEN Xu,ZHANG Jinxue,et al.SYNERGY:a game-theoretical approach for cooperative key generation in wireless networks[C]//Proceedings of the 33rd IEEE Conference on Computer Communications.Washington D.C.,USA:IEEE Press,2014:997-1005. [12] CHEN K,NATARAJAN B,SHATTIL S.Secret key generation rate with power allocation in relay-based LTE-A networks[J].IEEE Transactions on Information Forensics and Security,2015,10(11):2424-2434. [13] XIAO Liang,LI Yan,HAN Guoliang,et al.PHY-layer spoofing detection with reinforcement learning in wireless networks[J].IEEE Transactions on Vehicular Technology,2016,65(12):10037-10047. [14] MATHUR S,TRAPPE W,MANDAYAM N,et al.Radio-telepathy:extracting a secret key from an unauthenticated wireless channel[C]//Proceedings of the 14th ACM International Conference on Mobile Computing and Networking.San Francisco,USA:ACM Press,2008:128-139. [15] WILSON R,TSE D,SCHOLTZ R A.Channel identification:secret sharing using reciprocity in ultrawideband channels[J].IEEE Transactions on Information Forensics and Security,2007,2(3):364-375. [16] JANA S,PREMNATH S N,CLARK M,et al.On the effectiveness of secret key extraction from wireless signal strength in real environments[C]//Proceedings of the 15th Annual International Conference on Mobile Computing and Networking.New York,USA:ACM Press,2009:321-332. [17] LECUN Y,BENGIO Y,HINTON G.Deep learning[J].Nature,2015,7553(521):436-444. [18] JIANG Chunxiao,ZHANG Haijun,REN Yong,et al.Machine learning paradigms for next-generation wireless networks[J].IEEE Wireless Communications,2017,24(2):98-105. [19] YAN Jun,HE Haibo,ZHONG Xiangnan,et al.Q-learning-based vulnerability analysis of smart grid against sequential topology attacks[J].IEEE Information Forensics and Security,2017,12(1):200-210. [20] ZHANG Huaxiang,LU Jing.An adaptive evolutionary programming algorithm based on Q learning[J].Acta Automatica Sinica,2008,34(7):819-822.(in Chinese)张化祥,陆晶.基于Q学习的适应性进化规划算法[J].自动化学报,2008,34(7):819-822. [21] ALRAWAIS A,ALHOTHAILY A,HU C,et al.An attribute-based encryption scheme to secure fog communications[J].IEEE Access,2017,5:9131-9138. [22] HU Pengfei,NING Huangsheng,QIU Tie,et al.Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things[J].IEEE Internet of Things Journal,2017,4(5):1143-1155. [23] RIEHL J R,CAO M.A centrality-based security game for multihop networks[J].IEEE Transactions on Control of Network Systems,2018,5(4):1507-1516. |