Related references
Note: Only part of the references are listed.KEEP: Secure and Efficient Communication for Distributed IoT Devices
Wei Xi et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Efficient DCT-based secret key generation for the Internet of Things
George Margelis et al.
AD HOC NETWORKS (2019)
Design of an Efficient OFDMA-Based Multi-User Key Generation Protocol
Junqing Zhang et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)
Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices
Zi Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
Sample Entropy, Univariate, and Multivariate Multi-Scale Entropy in Comparison with Classical Postural Sway Parameters in Young Healthy Adults
Clint Hansen et al.
FRONTIERS IN HUMAN NEUROSCIENCE (2017)
Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios
Xiaojun Zhu et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2017)
Instant and Robust Authentication and Key Agreement among Mobile Devices
Wei Xi et al.
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
Physical Layer Key Generation in Wireless Networks: Challenges and Opportunities
Kai Zeng
IEEE COMMUNICATIONS MAGAZINE (2015)
Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness
Yanpei Liu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)
Channel identification: Secret sharing using reciprocity in ultrawideband channels
Robert Wilson et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2007)
Robust Key Generation from Signal Envelopes in Wireless Networks
Babak Azimi-Sadjadi et al.
CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2007)