1. Melki, R., Noura, H.N., Mansour, M.M. and Chehab, A., “A survey on ofdm physical layer security”, Physical Communication, Vol. 32, No., (2019), 1-30. https://doi.org/10.1016/j.phycom.2018.10.008
2. Chen, Y., Wen, H., Wu, J., Song, H., Xu, A., Jiang, Y., Zhang, T. and Wang, Z., “Clustering based physical-layer authentication in edge computing systems with asymmetric resources”, Sensors, Vol. 19, No. 8, (2019), 1926. https://doi.org/10.3390/s19081926
3. Jiang, Y., Zou, Y., Guo, H., Zhu, J. and Gu, J., “Power allocation for intelligent interference exploitation aided physical-layer security in ofdm-based heterogeneous cellular networks”, IEEE Transactions on Vehicular Technology, Vol. 69, No. 3, (2020), 3021-3033. doi: 10.1109/TVT.2020.2966637
4. Zhan, F. and Yao, N., “Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform”, KSII Transactions on Internet and Information Systems, Vol. 11, No. 5, (2017), 2701-2722. https://doi.org/10.3837/tiis.2017.05.022
5. Zhang, J., Duong, T.Q., Marshall, A. and Woods, R., “Key generation from wireless channels: A review”, IEEE Access, Vol. 4, (2016), 614-626. doi: 10.1109/ACCESS.2016.2521718
6. Cheng, L., Zhou, L., Seet, B.-C., Li, W., Ma, D. and Wei, J., “Efficient physical-layer secret key generation and authentication schemes based on wireless channel-phase”, Mobile Information Systems, Vol. 2017, (2017), 1-13. https://doi.org/10.1155/2017/7393526
7. Genkin, D., Pachmanov, L., Pipman, I., Tromer, E. and Yarom, Y., “Ecdsa key extraction from mobile devices via nonintrusive physical side channels”, In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. (2016), 1626-1638. https://doi.org/10.1145/2976749.2978353
8. Liu, H., Yang, J., Wang, Y. and Chen, Y., “Collaborative secret key extraction leveraging received signal strength in mobile wireless networks”, In Proceedings IEEE INFOCOM, IEEE, (2012), 927-935. doi: 10.1109/INFCOM.2012.6195843
9. Li, G., Hu, A., Zhang, J., Peng, L., Sun, C. and Cao, D., “High-agreement uncorrelated secret key generation based on principal component analysis preprocessing”, IEEE Transactions on Communications, Vol. 66, No. 7, (2018), 3022-3034. doi: 10.1109/TCOMM.2018.2814607
10. Bloch, M., Thangaraj, A., McLaughlin, S.W. and Merolla, J.-M., “Ldpc-based secret key agreement over the gaussian wiretap channel”, In IEEE International Symposium on Information Theory, IEEE, (2006), 1179-1183. doi: 10.1109/ISIT.2006.261991
11. Peng, L., Li, G. and Hu, A., “Channel reciprocity improvement of secret key generation with loop-back transmissions”, In IEEE 17th International Conference on Communication Technology (ICCT), IEEE, (2017), 193-198. doi: 10.1109/ICCT.2017.8359629
12. Shehadeh, Y.E.H. and Hogrefe, D., “An optimal guard-intervals based mechanism for key generation from multipath wireless channels”, In 4th IFIP International Conference on New Technologies, Mobility and Security, IEEE, (2011), 1-5. doi: 10.1109/NTMS.2011.5720584
13. Liu, H., Wang, Y., Yang, J. and Chen, Y., “Fast and practical secret key extraction by exploiting channel response”, In Proceedings IEEE INFOCOM, IEEE, (2013), 3048-3056. doi: 10.1109/INFCOM.2013.6567117
14. Zhang, J., Marshall, A., Woods, R. and Duong, T.Q., “Efficient key generation by exploiting randomness from channel responses of individual ofdm subcarriers”, IEEE Transactions on Communications, Vol. 64, No. 6, (2016), 2578-2588. doi: 10.1109/TCOMM.2016.2552165
15. Chen, C. and Jensen, M.A., “Secret key establishment using temporally and spatially correlated wireless channel coefficients”, IEEE Transactions on Mobile Computing, Vol. 10, No. 2, (2010), 205-215. doi: 10.1109/TMC.2010.114
16. Margelis, G., Fafoutis, X., Oikonomou, G., Piechocki, R., Tryfonas, T. and Thomas, P., “Physical layer secret-key generation with discreet cosine transform for the internet of things”, In IEEE International Conference on Communications (ICC), IEEE, (2017), 1-6. doi: 10.1109/ICC.2017.7997419
17. Margelis, G., Fafoutis, X., Oikonomou, G., Piechocki, R., Tryfonas, T. and Thomas, P., “Efficient dct-based secret key generation for the internet of things”, Ad Hoc Networks, Vol. 92, (2019), 101744. https://doi.org/10.1016/j.adhoc.2018.08.014
18. Wu, Y., Sun, Y., Zhan, L. and Ji, Y., “Low mismatch key agreement based on wavelet-transform trend and fuzzy vault in body area network”, International Journal of Distributed Sensor Networks, Vol. 9, No. 6, (2013), 1-16. https://doi.org/10.1155/2013/912873
19. Zhan, F. and Yao, N., “On the using of discrete wavelet transform for physical layer key generation”, Ad Hoc Networks, Vol. 64, (2017), 22-31. https://doi.org/10.1016/j.adhoc.2017.06.003
20. Cheng, L., Li, W., Zhou, L., Zhu, C., Wei, J. and Guo, Y., “Increasing secret key capacity of ofdm systems: A geometric program approach”, Concurrency and Computation: Practice