参考文献
[1]MAXIM M,POLLINO D.无线安全[M].余斌霄,译.北京:人民邮电出版社,2004.
[2]RANDALL K N,PANOS C L.无线安全——模型、威胁和解决方案[M].姚兰,惠俊红,郑家玲,等,译.北京:人民邮电出版社,2004:165-170.
[3]BLOCH M,BARROS J,RODRIGUES M,et al.Wireless Information Theoretic Security[J].IEEE Transactions on Information Thery,2008,54(6):2515-2534.
[4]JI J,PANG HW,JIN L,et al.The Random Beamforming Security Schemeof Physical Layer[J].Joumal of Signal Processing,2013,29(1):24-30.
[5]DEAN T R,GOLDSMITH A J.Physical-layer Cryptography Through Massive MIMO[J].IEEE Transactions on Information Theory,2017,63(8):5419-5436.
[6]YASUKAWA S,IWAI H,SASAOKA H.A Secret Key Agreement Scheme with Multi-level Quantization and Parity Check Using Fluctuation of Radio Channel Property[C]//Proceedings of IEEE International Sym-posium on Information Theory.Washington D.C.,USA:IEEE Press,2008:732-736.
[7]KITAURA A,SASAOKA H.A Scheme of Private Key Agreement Based on the Channel Characteristics in OFDM Land Mobile Radio[J].Electronics and Communica-tions in Japan,2005,88(9):1-10.
[8]HAMIDA T B,PIERROT J B,CASTELLUCCIA C.An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements[C]//Proceedings of International Conference on New Technologies,Mobility and Security.Washington D.C.,USA:IEEE Press,2009:1-5.
[9]HUANG J,JIANG T.Dynamic Secret Key Generation Exp-loiting Ultra-wideband Wireless Channel Characteristics[C]//Proceedings of Wireless Communications and Networking Conference.Washington D.C.,USA:IEEE Press,2015:1701-1706.
[10]ZHOU Baipeng,HUANG Kazhi,JIN Liang,et al.Scheme of Key Generation Based on Multipath Relative Delay[J].Application Research of Computers,2011,28(6):2196-2198.
[11]CHENG L,LI W,MA D.Secret Key Generation via Random Beamforming in Stationary Environment[C]//Proceedings of International Conference on Wireless Com-munications & Signal Processing.Washington D.C.,USA:IEEE Press,2015:1-5.
[12]WANG Q,XU K,REN K.Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels[J].IEEE Journal on Selected Areasin Com-munications,2012,30(9):1666-1674.
[13]PATWARI N,CROFT J,JANA S.High-rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements[J].IEEE Transactions on Mobile Computing,2010,9(3):17-30.
[14]CSISZAR I,AHLSWEDE R.Common Randomness in Information Theory and Cryptography——Part II:CR Capacity[J].IEEE Transactions on Information Theory,1998,44(1):225-240.
[15]ALI A,KHAN F A.A Broadcastbased Bey Agreement Scheme Using Set Reconciliation for Wireless Body Area Networks[J].Springer Journal of Medical Systems,2014,38(33):l-12.
编辑刘冰 |