|
[1] L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network, vol. 13, no. 6, pp. 24–30, Nov./Dce. 1999. [2] C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, Oct. 1949. [3] U. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inform. Theory, vol. 39, pp. 733–742, May 1993. [4] U. Maurer and S. Wolf, “Secret-key agreement over unauthenticated public channels,” IEEE Trans. Inform. Theory, vol. 49, pp. 822–838, Apr. 2003. [5] A. A. Hassan, W. E. Stark, J. E. Hershey, and S. Chennakeshu, “Cryptographic key agreement for mobile radio,” in Digital Signal Processing, vol. 6. San Diego, CA: Academic, 1996, pp. 207–212. [6] B. Azimi-Sadjadi, A. Mercado, A. Kiayias, and B. Yener, “Robust key generation from signal envelopes in wireless networks,” in Proc. ACM Comput. Commun. Security, Oct. 2007, pp. 401–410. [7] Z. Li, W. Xu, R. Miller, and W. Trappe, “Securing wireless systems via lower layer enforcements,” in Proc. Fifth ACM Workshop Wireless Security, 2006. [8] S. Jana, S. N. Premnath, M. Clark, S. Kasera, N. Patwari, and S. V. Krishnamurthy, “On the effectiveness of secret key extraction from wireless signal strength in real environments,” in International Conference on Mobile Computing and Networking. Beijing, China: ACM, 2009. [9] A. Sayeed and A. Perrig, “Secure wireless communications: Secret keys through multipath,” in Proc. Int. Conf. Acoustics, Speech and Signal Processing, Las Vegas, Nevada, March 31 2008-April 4 2008, pp. 3013–3016. [10] R. Wilson, D. Tse, and R. A. Scholtz, “Channel identification: Secret sharing using reciprocity in ultrawideband channels,” IEEE Trans. Information Forensics and Security, vol. 2, pp. 364–375, 2007. [11] M. G. Madiseh, M. L. McGuire, S. S. Neville, L. Cai, and M. Horie, “Secret key generation and agreement in uwb communication channels,” in Proc. IEEE GLOBECOM, 2008. [12] G. D. Durgin, Space-Time Wireless Channels. Prentice Hall, Oct. 2002. [13] N. Patwari, J. Croft, S. Jana, and S. K. Kasera, “High-rate uncorrelated bit extraction for shared secret key generation from channel measurements,” IEEE Trans. Mobile Computing, vol. 9, no. 1, pp. 17–30, Jan. 2009. [14] A. Gersho and R. M. Gray, Vector quantization and signal compression. Springer, Nov. 1991. [15] P. A. Chou, T. Lookabaugh, and R. M. Gray, “Entropy-constrained vector quantization,” IEEE Trans. Acoustics, Speech and Signal Processing, vol. 37, pp. 31–42, Jan. 1989.
|