|
[1] “Ieee standard for information technology- telecommunications and information echange between systems-local and metropolitan area networks-specific requirements-part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications,” IEEE Std 802.11-1997, pp. i–445, 1997. [2] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt, Spread Spectrum Commu- nications Handbook. McGraw-Hill, 1994. [3] A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-device communication in cellular networks,” IEEE Communications Surveys Tutorials, vol. 16, no. 4, pp. 1801– 1819, Fourthquarter 2014. [4] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer Networks, vol. 54, no. 15, pp. 2787 – 2805, 2010. [5] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008. [6] U. M. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 733–742, May 1993. [7] R. Ahlswede and I. Csiszar, “Common randomness in information theory and cryptography Part I: secret sharing,” IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121–1132, Jul 1993. [8] C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Mandayam, “Information-theoretically secret key generation for fading wireless channels,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 240–254, June 2010. [9] A. Sayeed and A. Perrig, “Secure wireless communications: Secret keys through multipath,” in Proc. 2008 IEEE Int. Conf. Acoustics, Speech, and Signal Processing, March 2008, pp. 3013–3016. [10] R. Wilson, D. Tse, and R. A. Scholtz, “Channel identification: secret sharing using reciprocity in ultrawideband channels,” IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 364–375, Sept 2007. [11] J. W. Wallace and R. K. Sharma, “Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 381–392, Sept 2010. [12] E. A. Jorswieck, A. Wolf, and S. Engelmann, “Secret key generation from reciprocal spatially correlated mimo channels,” in 2013 IEEE Globecom Workshops (GC Wkshps), Dec 2013, pp. 1245–1250. [13] G. Pasolini and D. Dardari, “Secret information of wireless multi-dimensional gaussian channels,” IEEE Trans. Wireless Commun., vol. 14, no. 6, pp. 3429–3442, June 2015. [14] L. Lai, Y. Liang, and H. V. Poor, “A unified framework for key agreement over wireless fading channels,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 480–490, April 2012. [15] H. Zhou, L. M. Huie, and L. Lai, “Secret key generation in the two-way relay channel with active attackers,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 3, pp. 476–488, March 2014. [16] M. Zafer, D. Agrawal, and M. Srivatsa, “Limitations of generating a secret key using wireless fading under active adversary,” IEEE/ACM Trans. Netw., vol. 20, no. 5, pp. 1440–1451, Oct 2012. [17] U. Maurer and S. Wolf, “Secret-key agreement over unauthenticated public channels .i. definitions and a completeness result,” IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822–831, April 2003. [18] ——, “Secret-key agreement over unauthenticated public channels-part ii: the simulatability condition,” IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832–838, April 2003. [19] ——, “Secret-key agreement over unauthenticated public channels iii. privacy amplification,” IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 839–851, April 2003. [20] C. Popper, M. Strasser, and S. Capkun, “Anti-jamming broadcast communication using uncoordinated spread spectrum techniques,” IEEE J. Sel. Areas Commun., vol. 28, no. 5, pp. 703–715, Oct 2010. [21] L. Zhang, H. Wang, and T. Li, “Anti-jamming message-driven frequency hopping Part I: system design,” IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 70–79, Jan 2013. [22] L. Zhang and T. Li, “Anti-jamming message-driven frequency hopping Part II: capacity analysis under disguised jamming,” IEEE Trans. Wireless Commun., vol. 12, no. 1, pp. 80–88, Jan 2013ㄡ[23] W. Stark, “Coding for frequency-hopped spread-spectrum communication with partial-band interference - part I: Capacity and cutoff rate,” IEEE Trans. Commun., vol. 33, no. 10, pp. 1036–1044, October 1985. [24] P. J. Crepeau, “Performance of fh/bfsk with generalized fading in worst case partial-band Gaussian interference,” IEEE J. Sel. Areas Commun., vol. 8, no. 5, pp. 884–886, Jun 1990. [25] W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of launching and detecting jamming attacks in wireless networks,” in Proc. ACM MobiHoc. ACM, 2005, pp. 46–57. [26] T. Yoo and A. Goldsmith, “Capacity and power allocation for fading mimo channels with channel estimation error,” IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2203–2214, May 2006. [27] S. Haykin, Communication systems. Wiley, 2001. [28] S. Watanabe and Y. Oohama, “Secret key agreement from vector gaussian sources by rate limited public communication,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 541–550, Sept 2011. [29] R. A. Horn and C. R. Johnson, Matrix analysis. Cambridge university press, 2012. [30] H. T. Li and Y. W. P. Hong, “Secret key generation over correlated wireless fading channels using vector quantization,” in Signal Information Processing Association Annual Summit and Conference (APSIPA ASC), 2012 Asia-Pacific, Dec 2012, pp. 1–7. [31] Y.-W. P. Hong, L.-M. Huang, and H.-T. Li, “Vector quantization and clustered key mapping for channel-based secret key generation,” IEEE Trans. Inf. Forensics Security, submitted 2016. [32] K. Bian, J. M. Park, and R. Chen, “Control channel establishment in cognitive radio networks using channel hopping,” IEEE J. Sel. Areas Commun., vol. 29, no. 4, pp. 689–703, April 2011. [33] G. Y. Chang, W. H. Teng, H. Y. Chen, and J. P. Sheu, “Novel channel-hopping schemes for cognitive radio networks,” IEEE Trans. Mobile Comput., vol. 13, no. 2, pp. 407–421,Feb 2014. [34] K. Bian and J. M. . Park, “Maximizing rendezvous diversity in rendezvous protocols for decentralized cognitive radio networks,” IEEE Trans. Mobile Comput., vol. 12, no. 7, pp. 1294–1307, July 2013. [35] M. D. Silvius, F. Ge, A. Young, A. B. MacKenzie, and C. W. Bostian, “Smart radio: spectrum access for first responders,” in SPIE Defense and Security Symposium. International Society for Optics and Photonics, 2008, pp. 698008–698008. [36] P. Bahl, R. Chandra, and J. Dunagan, “Ssch: Slotted seeded channel hopping for cpacity improvement in ieee 802.11 ad-hoc wireless networks,” in Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, ser. MobiCom’04. New York, NY, USA: ACM, 2004, pp. 216–230. [37] L. A. DaSilva and I. Guerreiro, “Sequence-based rendezvous for dynamic spectrum access,” in New Frontiers in Dynamic Spectrum Access Networks, 2008. DySPAN 2008. 3rd IEEE Symposium on, Oct 2008, pp. 1–7. [38] N. C. Theis, R. W. Thomas, and L. A. DaSilva, “Rendezvous for cognitive radios,” IEEE Trans. Mobile Comput., vol. 10, no. 2, pp. 216–227, Feb 2011. [39] Y.-W. Leung and Y. Wang, “An orthogonal genetic algorithm with quantization for global numerical optimization,” IEEE Trans. Evol. Comput., vol. 5, no. 1, pp. 41–53, Feb 2001. [40] A. S. Hedayat, N. J. A. Sloane, and J. Stufken, Orthogonal arrays: theory and applica- tions. Springer Science & Business Media, 2012. [41] R. Fuji-Hara, Y. Miao, and M. Mishima, “Optimal frequency hopping sequences: a combinatorial approach,” IEEE Trans. Inf. Theory, vol. 50, no. 10, pp. 2408–2420, Oct 2004. [42] G. Ge, Y. Miao, and Z. Yao, “Optimal frequency hopping sequences: Auto- and cross-correlation properties,” IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 867–879, Feb 2009.
|