[1] 宫继兵, 王睿, 崔莉, 等. 体域网BSN的研究进展及面临的挑战[J]. 计算机研究与发展, 2010, 47(5): 737-753. (Gong Jibin, Wang Rui, Cui Li, et al.Reasearch advances and challenges of body sensor network[J]. Journal of Computer Research and Development, 2010, 47(5): 737-753.) [2] Venkatasubramanian K K, Banerjee A, Gupta S K S. Plethysmogram-based secure inter-sensor communication in Body Area Networks[C]// Military Communications Conference. California, USA: IEEE Milcom, 2008: 1-7. [3] Rong C, Cheng H.Authenticated health monitoring scheme for wireless body sensor networks[C]// International Conference on Body Area Networks. Oslo, Norway: EAI, 2012: 31-35. [4] 陈灿峰. 低功耗蓝牙技术原理与应用 [M]. 北京: 北京航空航天大学出版社, 2013. (Chen Canfeng.BLE technology theory and application [M]. Beijing, China: Beijing University of Aeronautics and Astronautics Press, 2013.) [5] Xu J, Zhang T, Lin D, et al.Pairing and Authentication Security Technologies in Low-Power Bluetooth[C]// Green Computing and Communications, Beijing, China. USA: IEEE, 2013:1081-1085. [6] Sandhya S, Sumithra Devi K A. Analysis of Bluetooth threats and v4.0 security features[C]// International Conference on Computing, Communication and Applications (ICCCA), Tamilnadu, India. USA: IEEE, 2012: 1-4. [7] Rahman S, He Y, Wu H.Public-Key Based Efficient Key Distribution in Bluetooth[C]// 10th International Conference on Information Technology: New Generations. Las Vegas, USA: IEEE, 2013: 727-728. [8] Xu Guangliang, B Yu. Security enhanced design of the Bluetooth simple pairing protocol[C]// Computer Science and Network Technology (ICCSNT), China. USA: IEEE, 2011: 292-296. [9] Perrey H, Ugus O, Westhoff D.WiSec' 2011 poster: security enhancement for bluetooth low energy with Merkle's puzzle[J]. Acm Sigmobile Mobile Computing & Communications Review (S1559-1662), 2011, 15(3): 45-46. [10] Mathur S.Building information-theoretic confidentiality and traffic privacy into wireless networks [D]. New Brunswick, USA: Graduate School, Rutgers University, 2010. [11] Jana S, Premnath S N, Clark M, et al.On the effectiveness of secret key extraction from wireless signal strength in real environments[C]// Proceedings of the 15th Annual International Conference on Mobile Computing and Networking. USA: ACM, 2009: 321-332. [12] Maurer U M.Secret key agreement by public discussion from common information[J]. IEEE Transactions on Information Theory (S0018-9448), 1993, 39(3): 733-742. [13] Hershey J E, Hassan A A, Yarlagadda R.Unconventional cryptographic keying variable management[J]. IEEE Transactions on Communications (S0090-6778), 1995, 43(1): 3-6. [14] Mathur S, Trappe W, Mandayam N, et al.Radio-telepathy: extracting a secret key from an unauthenticated wireless channel[C]// Proceedings of the 14th ACM international conference on Mobile computing and networking. USA: ACM, 2008: 128-139. [15] Neal Patwari, Jessica Croft, Suman Jana.High Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements[J]. IEEE Transactions on Mobile Computing (S1536-1233), 2010, 9(3): 17-30. [16] Qian Wang, Kaihe Xu, Kui Ren.Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels[J]. IEEE Journal on selected areas in communication (S0733-8716), 2012, 30(9): 1666-1674. [17] Premnath S N, Gowda P L, Kasera S K, et al.Secret key extraction using Bluetooth wireless signal strength measurements[C]// Sensing, Communication, and Networking (SECON), 2014 Eleventh Annual IEEE International Conference on. USA: IEEE, 2014: 293-301. |