|
[1] L. Atzoria, A. Ierab, and G. Morabitoc, “The internet of things: A survey,” Computer Networks, vol. 54, pp. 2787–2805, 2010. [2] L. Atzori, A. Iera, and G. Morabito, “From ”smart objects” to ”social objects”: The next evolutionary step of the internet of things,” Communications Magazine, IEEE, vol. 52, no. 1, pp. 97–105, January 2014. [3] A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-device communication in cellular networks,” Communications Surveys Tutorials, IEEE, vol. 16, no. 4, pp. 1801–1819, Fourthquarter 2014. [4] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” Communications Magazine, IEEE, vol. 40, no. 8, pp. 102–114, Aug 2002. [5] S. Androutsellis-Theotokis and D. Spinellis, “A survey of peerto-peer content distribution technologies,” Proc. ACM Comput. Surv., vol. 36, no. 4, pp. 335–371, 2004. [6] C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, Oct. 1949. [7] U. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inform. Theory, vol. 39, pp. 733–742, May 1993. [8] U. Maurer and S. Wolf, “Secret-key agreement over unauthenticated public channels,” IEEE Trans. Inform. Theory, vol. 49, pp. 822–838, Apr. 2003. [9] A. A. Hassan, W. E. Stark, J. E. Hershey, and S. Chennakeshu, “Cryptographic key agreement for mobile radio,” Elsevier Digital Signal Processing, vol. 6, pp. 207–212, 1996. [10] B. Azimi-Sadjadi, A. Mercado, A. Kiayias, and B. Yener, “Robust key generation from signal envelopes in wireless networks,” in Proc. ACM Comput. Commun. Security , pp. 401–410, Oct. 2007. [11] Z. Li, W. Xu, R. Miller, and W. Trappe, “Securing wireless systems via lower layer enforcements,” Proc. Fifth ACM Workshop Wireless Security, 2006. [12] S. Jana, S. N. Premnath, M. Clark, S. Kasera, N. Patwari, and S. V. Krishnamurthy, “On the effectiveness of secret key extraction from wireless signal strength in real environments,” in International Conference on Mobile Computing and Networking. Beijing, China: ACM, 2009. [13] A. Sayeed and A. Perrig, “Secure wireless communications: Secret keys through multipath,” Proc. Int. Conf. Acoustics, Speech and Signal Processing, pp. 3013–3016, 2008. [14] R. Wilson, D. Tse, and R. A. Scholtz, “Channel identification: Secret sharing using reciprocity in ultrawideband channels,” IEEE Trans. Information Forensics and Security, vol. 2, pp. 364–375, 2007.
[15] S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, “Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel,” Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 128–139, 2008. [16] M. G. Madiseh, M. L. McGuire, S. S. Neville, L. Cai, and M. Horie, “Secret key generation and aggreement in uwb communication channels,” Proc. IEEE GLOBECOM, 2008. [17] K. Zeng, D. Wu, C. A., and P. Mohapatra, “Exploiting multiple-antenna diversity for shared secret key generation in wireless networks,” Proc. IEEE INFOCOM, 2010. [18] Q. Wang, H. Su, K. Ren, and K. Kim, “Fast and scalable secret key generation exploiting channel phase eandomness in wireless networks,” Proc. IEEE INFOCOM, 2011. [19] Q. Wang, K. Xu, and K. Ren, “Cooperative secret key generation from phase estimation in narrowband fading channels,” Selected Areas in Communications, IEEE Journal on, vol. 30, no. 9, pp. 1666–1674, October 2012. [20] H. Liu, J. Yang, Y. Wang, Y. Chen, and C. Koksal, “Group secret key generation via received signal strength: Protocols, achievable rates, and implementation,” Mobile Computing, IEEE Transactions on, vol. 13, no. 12, pp. 2820–2835, Dec 2014. [21] C.-W. Huang, T.-H. Chang, X. Zhou, and Y.-W. Hong, “Two-way training for discriminatory channel estimation in wireless mimo systems,” Signal Processing, IEEE Transactions on, vol. 61, no. 10, pp. 2724–2738, May 2013. [22] G. Brassard and L. Salvail, “Secret-key reconciliation by public discussion,” in Advances in Cryptology Proc. Eurocrypt, pp. 410–423, 1994. [23] C. Bennett, G. Brassard, C. Crepeau, and U. Maurer, “Generalized privacy amplification,” Information Theory, IEEE Transactions on, vol. 41, no. 6, pp. 1915–1923, Nov 1995. [24] N. Patwari, J. Croft, S. Jana, and S. K. Kasera, “High-rate uncorrelated bit extraction for shared secret key generation from channel measurements,” IEEE Trans. Mobile Computing, vol. 9, no. 1, pp. 17–30, Jan. 2010. [25] H.-T. Li and Y.-W. P. Hong, “Secret key generation over correlated wireless fading channels using vector quantization,” Proc. of Asia-Pacific Signal & Information Processing Association Annual Summit and Conference, 2012. [26] A. Gersho and R. M. Gray, Vector quantization and signal compression. Springer, Nov. 1991. [27] M. MikkoI and F. Pasi, “Balanced k-means for clustering,” Structural and Syntactic and Statistical Pattern Recognition, pp. 32–41, 2014.
|