|
[1]
|
Perrig, A., Szewczyk, K., Wen, V., Culler, D. and Tygar, J. (2002) Spins: Security Protocols for Sensor Networks. Wireless Networks, 8, 521-534. [Google Scholar] [CrossRef]
|
|
[2]
|
Mathur, S., Trappe, W., Mandayam, N., Ye, C. and Reznik, A. (2008) Radiotelepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, New York, September 2008, 128-139.
|
|
[3]
|
Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N. and Krishnamurthy, S.V. (2009) On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments. Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, MOBICOM 2009, Beijing, 20-25 September 2009, 321-332. [Google Scholar] [CrossRef]
|
|
[4]
|
Patwari, N., Croft, J., Jana, S. and Kasera, S.K. (2010) High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements. IEEE Transactions on Mobile Computing, 9, 17-30.
[Google Scholar] [CrossRef]
|
|
[5]
|
Brassard, G. and Salvail, L. (1994) Secret-Key Reconciliation by Public Discussion. In: Advances in Cryptology EUROCRYPT93, Springer, Berlin, 410-423. [Google Scholar] [CrossRef]
|
|
[6]
|
Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N. and Krishnamurthy, S.V. (2009) On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments. Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, Beijing, 20-25 September 2009, 321-332.
|
|
[7]
|
Azimi-Sadjadi, B., Kiayias, A., Mercado, A. and Yener, B. (2007) Robust Key Generation from Signal Envelopes in Wireless Networks. Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, 28-31 October 2007, 401-410. [Google Scholar] [CrossRef]
|
|
[8]
|
Ye, C., Mathur, S., Reznik, A., Shah, Y., Trappe, W. and Mandayam, N.B. (2010) Information-Theoretically Secret Key Generation for Fading Wireless Channels. IEEE Transactions on Information Forensics and Security, 5, 240-254.
|
|
[9]
|
Zan, B., Gruteser, M. and Hu, F. (2013) Key Agreement Algorithms for Vehicular Communication Networks Based on Reciprocity and Diversity Theorems. IEEE Transactions on Vehicular Technology, 62, 4020-4027.
[Google Scholar] [CrossRef]
|
|
[10]
|
Zhu, X., Xu, F., Novak, E., Tan, C.C., Li, Q. and Chen, G. (2013) Extracting Secret Key from Wireless Link Dynamics in Vehicular Environments. 2013 Proceedings IEEE INFOCOM, Turin, 14-19 April 2013, 2283-2291.
[Google Scholar] [CrossRef]
|
|
[11]
|
Zhan, F.R. and Yao, N.M. (2017) On the Using of Discrete Wavelet Transform for Physical Layer Key Generation. Ad Hoc Networks, 64, 22-31. [Google Scholar] [CrossRef]
|
|
[12]
|
Huang, N., Wu, Z.H. and Long, S. (2008) Hilbert-Huang Transform. Scholarpedia, 3, 2544.
[Google Scholar] [CrossRef]
|
|
[13]
|
Zhang, J., Duong, T.Q., Marshall, A. and Woods, R. (2016) Key Generation from Wireless Channels: A Review. IEEE Access, 4, 614-626. [Google Scholar] [CrossRef]
|
|
[14]
|
Huang, N. and Wu, Z.H. (2008). A Review on Hilbert-Hung Transform Method and Its Applications to Geophysical Studies. Reviews of Geophysics, 46, RG2006. [CrossRef]
|
|
[15]
|
Rong, F., Chen, N., Guo, C. and Yang, M. (2018) New Method for Speed Curve Estimation by Using the EEMD-HHT Combined with Time-Frequency Reassignment. Journal of Vibration and Shock, 37, 81-87.
|
|
[16]
|
Córdova, F., Cifuentes, F. and Atero, R. (2018) Hilbert Huang Transform (HHT) Applied to Memorization of Objects Using the Tactile Sense. 2018 7th International Conference on Computers Communications and Control (ICCCC), Oradea, 8-12 May 2018, 23-28. [Google Scholar] [CrossRef]
|
|
[17]
|
Salih Abdelgader, A.M., Feng, S. and Wu, L. (2018) Exploiting the Randomness Inherent of the Channel for Secret Key Sharing in Vehicular Communications. The International Journal of Intelligent Transportation Systems Research, 16, 39-50. [Google Scholar] [CrossRef]
|