共 122 条
[1]
DANEV B, ZANETTI D, CAPKUN S., On physical-layer identification of wireless devices, ACM Comput. Surv, 45, 1, (2012)
[2]
BALDINI G, STERI G., A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in com-ponents, IEEE Commun. Surveys Tuts, 19, 3, pp. 1761-1789, (2017)
[3]
XU Q, ZHENG R, SAAD W, Et al., Device fingerprinting in wireless networks: Challenges and opportunities, IEEE Commun. Surveys Tuts, 18, 1, pp. 94-104, (2015)
[4]
WANG X, HAO P, HANZO L., Physical-layer authentication for wireless security enhancement: Current challenges and future develop-ments, IEEE Commun. Mag, 54, 6, pp. 152-158, (2016)
[5]
MUKHERJEE A, FAKOORIAN S A, HUANG J, Et al., Principles of physical layer security in multiuser wireless networks: A survey, IEEE Commun. Surveys Tuts, 16, 3, pp. 1550-1573, (2014)
[6]
LIU Y, CHEN H H, WANG L., Physical layer security for next gen-eration wireless networks: Theories, technologies, and challenges, IEEE Commun. Surveys Tut, 19, 1, pp. 347-376, (2017)
[7]
JORSWIECK E, TOMASIN S, SEZGIN A., Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer pro-cessing, Proc. IEEE, 103, 10, pp. 1702-1724, (2015)
[8]
MASSEY J L., An introduction to contemporary cryptology, Proc. IEEE, 76, 5, pp. 533-549, (1988)
[9]
BARENGHI A, BREVEGLIERI L, KOREN I, Et al., Fault injection attacks on cryptographic devices: Theory, practice, and countermea-sures, Proc. IEEE, 100, 11, pp. 3056-3076, (2012)
[10]
SHANNON C E., Communication theory of secrecy systems, Bell Syst. Tech. J, 28, 4, pp. 656-715, (1949)