R. Ahlswede and I. Csiszár, Common randomness in information theory and cryptography. I. Secret sharing, IEEE Transactions on Information Theory, vol.39, issue.4, pp.1121-1132, 1993.
DOI : 10.1109/18.243431

U. Maurer, Protocols for Secret Key Agreement by Public Discussion Based on Common Information, IEEE Trans. Inf. Theory, vol.39, issue.5, pp.733-742, 1993.
DOI : 10.1007/3-540-48071-4_32

M. Bloch, J. Barros, M. Rodrigues, and S. W. Mclaughlin, Wireless Information-Theoretic Security, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2515-2534, 2008.
DOI : 10.1109/TIT.2008.921908

C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe et al., Information-theoretically secret key generation for fading wireless channels, IEEE Trans. Inf. Forensics Security, vol.5, issue.2, pp.240-154, 2010.

G. Wunder, R. Fritschek, and K. Reaz, RECiP: Wireless channel reciprocity restoration method for varying transmission power, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016.
DOI : 10.1109/PIMRC.2016.7794581

C. Saiki and A. Chorti, A novel physical layer authenticated encryption protocol exploiting shared randomness, 2015 IEEE Conference on Communications and Network Security (CNS), pp.113-118, 2015.
DOI : 10.1109/CNS.2015.7346818

M. Zafer, D. Agrawal, and M. Srivatsa, Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary, IEEE/ACM Transactions on Networking, vol.20, issue.5, pp.1440-1451, 2012.
DOI : 10.1109/TNET.2012.2183146

M. Strasser, C. Pöpper, S. C?apkunc?apkun, and M. ?. Cagalj, Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008.
DOI : 10.1109/SP.2008.9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.1255

C. Pöpper, M. Strasser, and S. C?apkunc?apkun, Anti-jamming broadcast communication using uncoordinated spread spectrum techniques, IEEE Journal on Selected Areas in Communications, vol.28, issue.5, pp.703-715, 2010.
DOI : 10.1109/JSAC.2010.100608

R. Ramachandran, V. Sharma, and P. Viswanath, Capacity of Gaussian channels with energy harvesting and processing cost, IEEE Trans. Inf. Theory, vol.60, issue.5, pp.2563-2575, 2014.

Y. Gu and S. A¨?ssaa¨?ssa, RF-Based Energy Harvesting in Decode-and-Forward Relaying Systems: Ergodic and Outage Capacities, IEEE Transactions on Wireless Communications, vol.14, issue.11, pp.6425-5434, 2015.
DOI : 10.1109/TWC.2015.2453418

A. Mukherjee, S. A. Fakoorian, H. Jing, and A. Swindlehurst, Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.3, pp.1550-1573
DOI : 10.1109/SURV.2014.012314.00178

S. Ulukus, A. Yener, E. Erkip, O. Simeone, M. Zorzi et al., Energy Harvesting Wireless Communications: A Review of Recent Advances, IEEE Journal on Selected Areas in Communications, vol.33, issue.3, pp.360-381, 2015.
DOI : 10.1109/JSAC.2015.2391531

S. Wei, R. Kannan, V. Chakravarthy, and M. Rangaswamy, CSI Usage over Parallel Fading Channels under Jamming Attacks: A Game Theory Study, IEEE Transactions on Communications, vol.60, issue.4, pp.1167-1175, 2012.
DOI : 10.1109/TCOMM.2012.021712.100018