Computer Science ›› 2024, Vol. 51 ›› Issue (5): 414-420.doi: 10.11896/jsjkx.221000037
• Information Security • Previous Articles
ZHANG Zhongxin1, YI Ming2, XIAO Shuaifang2
CLC Number:
[1]HUANG K Z,JIN L,CHEN Y J,et al.Development and new challenges of wireless physical layer key generation technology [J].Journal of Electronics and Information,2020,42(10):2330-2341. [2]ZHANG J,HE B,DUONG T Q,et al.On the Key Generation From Correlated Wireless Channels [J].IEEE Communications Letters,2017,21(4):961-964. [3]ROTTENBERG F,NGUYEN T H,DRICOT J M,et al.CSI-Based Versus RSS-Based Secret-Key Generation Under Correlated Eavesdropping [J].IEEE Transactions on Communications,2021,69(3):1868-1881. [4]ZHANG J,DING M,LI G,et al.Key Generation Based on Large Scale Fading [J].IEEE Transactions on Vehicular Technology,2019,68(8):8222-8226. [5]HU X Y,JIN L,HUANG K Z,et al.Physical Layer Key Gene-ration Scheme Based on Signal Propagation Characteristics [J].Electronic Journal,2019,47(2):483-488. [6]GUO D,CAO K,XIONG J,et al.A Lightweight Key Generation Scheme for the Internet of Things [J].IEEE Internet of Things Journal,2021,8(15):12137-12149. [7]LOU Y M,ZHONG Z,JIN L,et al.Key Generation Scheme Based on Received Signal Waveform [J].Journal of the University of Information Engineering,2017,18(2):166-171. [8]ZHANG S J,JIN L,LOU Y,et al.Secret key generation based on two-way randomness for TDD-SISO system [J].China Communications,2018,15(7):202-216. [9]LI G Y.Research on Theory and Method of Wireless Communication Physical Layer Security [D].Nanjing:University of Southeast,2017. [10]XIAO S F.Research on physical layer key generation technology for Internet of Things [D].Zhengzhou:University of Information Engineering,2018. [11]ALDAGHRI N,MAHDAVIFAR H.Physical Layer Secret Key Generation in Static Environments [J].IEEE Transactions on Information Forensics and Security,2020,15:2692-2705. [12]LIANG Y C,CHEN J,LONG R Z,et al.Reconfigurable intelligent surfaces for smart wireless environments:channel estimation,system design and applications in 6G networks [J].Science China(Information Sciences),2021,64(10):52-72. [13]HAO Y N,JIN L,HUANG K Z,et al.Key generation method based on smart metasurface in quasi-static scene [J].Journal of Network and Information Security,2021,7(2):77-85. [14]YANG J,JI X S,HUANG K Z,et al.Physical layer key generation scheme based on RIS antenna in static scene [J].Chinese Science:Information Science,2022,52(2):253-269. [15]JIN L,LOU Y M,XU X M,et al.Separating Multi-Stream Signals Based on Space-Time Isomerism [C]//2020 International Conference on Wireless Communications and Signal Processing(WCSP).2020:418-423. [16]LOU Y M,JIN L,SUN X L,et al.Multi-path separation and parameter estimation by single DMA in fading channel [J].IET Communications,2022,16(13):1475-1485. [17]ZHANG W.Research on Estimation Algorithm of CoherentSource Direction of Arrival Based on Matrix Reconstruction [D].Harbin:University of Harbin Industry,2021. [18]ADIL M,WYNE S,NAWAZ S J.On Quantization for SecretKey Generation From Wireless Channel Samples [J].IEEE Access,2021,9(2):21653-21668. [19]LI G,ZHANG Z,ZHANG J,et al.Encrypting Wireless Communications on the Fly Using One-Time Pad and Key Generation [J].IEEE Internet of Things Journal,2021,8(1):357-369. [20]HU X Y.Key Generation Method Based on Wireless Endogenous Security [D].Zhengzhou:University of Information Engineering,2021. |
[1] | DONG Chao-ying, XU Xin, LIU Ai-jun, CHANG Jing-hui. New Routing Methods of LEO Satellite Networks [J]. Computer Science, 2020, 47(12): 285-290. |
[2] | ZHANG Jin-hui, DENG Qian, LI Zhen-yu. Study on Application of Network Coding and Multipath Transmission in Internet Live Video Broadcasting [J]. Computer Science, 2019, 46(8): 171-177. |
[3] | QIN Kuang-yu, HUANG Chuan-he, LIU Ke-wei, SHI Jiao-li and CHEN Xi. Multipath Routing Algorithm in Software Defined Networking Based on Multipath Broadcast Tree [J]. Computer Science, 2018, 45(1): 211-215. |
[4] | YAN Jun-ya, QIAN Yu-hua, LI Hua-feng and MA Shang-cai. Node Localization Based on Multipath Distance and Neural Network in WSN [J]. Computer Science, 2017, 44(8): 71-75. |
[5] | NONG Huang-wu, HUANG Chuan-he and HUANG Xiao-peng. SDN-based Multipath Routing Algorithm for Fat-tree Data Center Networks [J]. Computer Science, 2016, 43(6): 32-34. |
[6] | WANG Jun, DU Wei-qi, LIU Hui and WANG Lei. Multipath Routing Protocol Based on Braid-multipath Network Coding Model for Wireless Sensor Networks [J]. Computer Science, 2016, 43(11): 135-141. |
[7] | ZHU Wei-na, ZHOU Jie, CAI Shi-qing and SHEN Xiao-yan. Research on Channel Esitimation of Scattering Channel Models in Mobile Communication Macrocell Environments [J]. Computer Science, 2016, 43(10): 87-92. |
[8] | DU Wen-feng and WU Zhen. Data Distribution Algorithm with Out-of-order Feedback for CMT over Diversity Network [J]. Computer Science, 2015, 42(3): 60-64. |
[9] | HAN Li and QIAN Huan-yan. Algorithm of Network Coding Based Multipath Opportunistic Routing for Wireless Networks [J]. Computer Science, 2014, 41(5): 116-119. |
[10] | . Cluster-based Multipath Routing Protocol for Wireless Sensor Networks [J]. Computer Science, 2013, 40(2): 91-94. |
[11] | . Algorithm for MFSK Symbol Rate Estimation Based on Signal Decomposition [J]. Computer Science, 2012, 39(2): 66-67. |
[12] | . Fast Fault Location Mechanism Based on Multipath Traffic Transmission [J]. Computer Science, 2012, 39(12): 87-90. |
[13] | . Distributed Protocol for Multipath Relay Routing Based on Node's Security Degree [J]. Computer Science, 2012, 39(10): 54-. |
[14] | LI Dan,WANG Bin-qiang,LIU Qiang,MA Hai-long. Analysis for Loop-freeness of Multipath Inter-domain Routing Based on Locator/ID Decoupling Architecture [J]. Computer Science, 2011, 38(1): 130-135. |
[15] | CAI Ling,WANG Jin-kuan,WANG Cui-rong. Optimization Based on Traffic Balance over Multipath Network [J]. Computer Science, 2010, 37(7): 74-78. |
|