[1] 张立健,唐燕群. 无线物理层安全综述[J]. 无线电工程, 2018,48(6):447-452.
[2] TRAPPE W. The challenges facing physical layer security[J].IEEE Communications Magazine, 2015,53(6):16-20.
[3] WANG X B, HAO P, HANZO L. Physical-layer authentication for wireless security enhancement: Current challenges and future developments[J]. IEEE Communications Magazine, 2016,54(6):152-158.
[4] 李古月,胡爱群,石乐. 无线信道的密钥生成方法[J]. 密码学报, 2014,1(3):211-224.
[5] 胡爱群,李古月. 无线通信物理层安全方法综述[J]. 数据采集与处理, 2014,29(3):341-350.
[6] MUKHERJEE A. Physical-layer security in the Internet of things: Sensing and communication confidentiality under resource constraints[J]. Proceedings of the IEEE, 2015,103(10):1747-1761.
[7] SON P N, KONG H Y. Cooperative communication with energy-harvesting relays under physical layer security[J]. IET Communications, 2015,9(17):2131-2139.
[8] YANG N, WANG L F, GERACI G, et al. Safeguarding 5G wireless communication networks using physical layer security[J]. IEEE Communications Magazine, 2015,53(4):20-27.
[9] WU Y, CHEN C, XIA H F, et al. The noise-like disguised scheme for physical layer security using phase rotation and wavelet transform[C]// Proceedings of the 5th International Conference on Systems and Informatics. 2018:823-827.
[10]TAHIR M, JAROT S P W, SIDDIQI M U. Wireless physical layer security using encryption and channel pre-compensation[C]// Proceedings of 2010 International Conference on Computer Applications and Industrial Electronics. 2010:304-309.
[11]高宝建,张自然,金媛媛. 一种基于OFDM的信息安全算法[J]. 计算机工程与应用, 2012,48(5):59-62.
[12]黄晶晶. 基于无线信道环境的密钥生成机制研究[D]. 北京:北京邮电大学, 2015.
[13]王宁. 基于稀疏信号处理的物理层安全机制研究[D]. 北京:北京邮电大学, 2017.
[14]曹中强. 基于无线信道特征的密钥生成方法研究[D]. 南京:南京邮电大学, 2016.
[15]楼洋明,钟州,金梁,等. 基于接受信号波形的密钥生成方案[J]. 信息工程大学, 2017,18(2):166-171.
[16]黄夷芯. 基于无线信道特征的物理层安全研究[D]. 南京:东南大学, 2015.
[17]张洪霞. 基于无线信道特征的密钥生成与安全增强关键技术研究[D]. 杭州:杭州电子科技大学, 2018.
[18]张东,李晓强. 基于信道特征的无线物理层安全技术研究[J]. 无线通信技术, 2019,1(1):48-52.
[19]BABAK A, AGGELOS K, ALEJANDRA M, et al. Robust key generation from signal envelopes in wireless networks[C]// Proceedings of 2007 ACM Conference on Computer and Communications Security. 2007:401-41.
[20]ALI S T, SIVARAMAN V, OSTRY D. Zero reconciliation secret key generation for body-worn health monitoring devices[C]// Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 2012:39-50.
[21]LIU H B, YANG J, WANG Y, et al. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks[C]// Proceedings of 2012 IEEE INFOCOM. 2012:927-935.
[22]李兴志,金梁,钟州,等. 基于物理层密钥的消息加密和认证机制[J]. 网络与信息安全学报, 2018,4(8):31-38.
[23]WU Y, XIA H F, CHEN C. Improved multi-bit adaptive quantization algorithm for physical layer security based on channel characteristics[C]// Proceedings of the 5th International Conference on Systems and Informatics. 2018:807-811. |