E. Belmega and A. Chorti, Energy harvesting in secret key generation systems under jamming attacks, 2017 IEEE International Conference on Communications (ICC), 2017.
DOI : 10.1109/ICC.2017.7996559

URL : https://hal.archives-ouvertes.fr/hal-01474839

A. Chorti and E. Belmega, Secret key generation in Rayleigh block fading AWGN channels under jamming attacks, 2017 IEEE International Conference on Communications (ICC), 2017.
DOI : 10.1109/ICC.2017.7996660

URL : https://hal.archives-ouvertes.fr/hal-01474850

R. Ahlswede and I. Csiszár, Common randomness in information theory and cryptography. I. Secret sharing, IEEE Transactions on Information Theory, vol.39, issue.4, pp.1121-1132, 1993.
DOI : 10.1109/18.243431

U. Maurer, Protocols for Secret Key Agreement by Public Discussion Based on Common Information, IEEE Trans. Inf. Theory, vol.39, issue.5, pp.733-742, 1993.
DOI : 10.1007/3-540-48071-4_32

R. Ahlswede and I. Csiszár, Common randomness in information theory and cryptography. II. CR capacity, IEEE Transactions on Information Theory, vol.44, issue.1, pp.225-240, 1998.
DOI : 10.1109/18.651026

C. Bennett, G. Brassard, C. Crépeau, and U. Maurer, Generalized privacy amplification, IEEE Trans. Inf. Theory, vol.50, issue.2, pp.394-400, 1995.
DOI : 10.1109/isit.1994.394668

URL : ftp://ftp.inf.ethz.ch/pub/publications/papers/ti/isc/wwwisc/BBCM95.ps

C. Ye, A. Reznik, and Y. Shah, Extracting Secrecy from Jointly Gaussian Random Variables, 2006 IEEE International Symposium on Information Theory, pp.2593-2597, 2006.
DOI : 10.1109/ISIT.2006.262101

C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe et al., Information-theoretically secret key generation for fading wireless channels, IEEE Trans. Inf. Forensics Security, vol.5, issue.2, pp.240-154, 2010.

T. Chou, S. Draper, and A. M. Sayeed, Key Generation Using External Source Excitation: Capacity, Reliability, and Secrecy Exponent, IEEE Transactions on Information Theory, vol.58, issue.4, pp.2455-2474, 2012.
DOI : 10.1109/TIT.2011.2176311

URL : http://arxiv.org/pdf/1110.6476

W. Yunchuan, Z. Kai, and P. Mohapatra, Adaptive wireless channel probing for shared key generation based on PID controller, IEEE Trans. Mobile Comput, vol.12, issue.9, pp.1842-1852, 2013.

A. Mukherjee, S. A. Fakoorian, H. Jing, and A. Swindlehurst, Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.3, pp.1550-1573
DOI : 10.1109/SURV.2014.012314.00178

O. Gungor, F. Chen, and C. Koksal, Secret Key Generation Via Localization and Mobility, IEEE Transactions on Vehicular Technology, vol.64, issue.6, pp.2214-2230, 2015.
DOI : 10.1109/TVT.2014.2342714

U. Maurer and S. Wolf, Secret-key agreement over unauthenticated public channels-part III: privacy amplification, IEEE Transactions on Information Theory, vol.49, issue.4, pp.839-851, 2003.
DOI : 10.1109/TIT.2003.809559

V. Yakovlev, V. Korzhik, and G. Morales-luna, Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2535-2549, 2008.
DOI : 10.1109/TIT.2008.921689

S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, Radiotelepathy: Extracting a cryptographic key from an un-authenticated wireless channel, Proc. 14th ACM Annual Int. Conf. Mobile Comput. Netw, 2008.

C. Saiki and A. Chorti, A novel physical layer authenticated encryption protocol exploiting shared randomness, 2015 IEEE Conference on Communications and Network Security (CNS), pp.113-118, 2015.
DOI : 10.1109/CNS.2015.7346818

M. Zafer, D. Agrawal, and M. Srivatsa, Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary, IEEE/ACM Transactions on Networking, vol.20, issue.5, pp.1440-1451, 2012.
DOI : 10.1109/TNET.2012.2183146

R. Molì-ere, F. Delaveau, C. L. Ngassa, C. Lemenager, T. Mazloum et al., Tag signals for early authentication and secret key generation in wireless public networks, Eur. Conf. Netw. Commun. (EuCNC), pp.108-112, 2015.

G. Amariucai, S. Wei, and R. Kannan, Gaussian jamming in blockfading channels under long term power constraints, Proc. Int. Symp. Inf. Theory (ISIT), pp.24-29, 2007.
DOI : 10.1109/isit.2007.4557116

X. Song, P. Willett, S. Zhou, and P. Luh, The MIMO Radar and Jammer Games, IEEE Transactions on Signal Processing, vol.60, issue.2, pp.687-699, 2012.
DOI : 10.1109/TSP.2011.2169251

URL : http://www.engr.uconn.edu/msl/paper/Song/Song_2012.pdf

S. Wei, R. Kannan, V. Chakravarthy, and M. Rangaswamy, CSI Usage over Parallel Fading Channels under Jamming Attacks: A Game Theory Study, IEEE Transactions on Communications, vol.60, issue.4, pp.1167-1175, 2012.
DOI : 10.1109/TCOMM.2012.021712.100018

R. El-bardan, S. Brahma, and P. Varshney, Strategic Power Allocation With Incomplete Information in the Presence of a Jammer, IEEE Transactions on Communications, vol.64, issue.8, pp.3467-3479, 2016.
DOI : 10.1109/TCOMM.2016.2577686

L. Xiao, T. Chen, L. Jinliang, and D. Huaiyu, Anti-Jamming Transmission Stackelberg Game With Observation Errors, IEEE Communications Letters, vol.19, issue.6, pp.949-952, 2015.
DOI : 10.1109/LCOMM.2015.2418776

J. Guo, N. Zhao, R. Yu, X. Liu, and V. Leung, Exploiting Adversarial Jamming Signals for Energy Harvesting in Interference Networks, IEEE Transactions on Wireless Communications, vol.16, issue.2, pp.1267-1280, 2017.
DOI : 10.1109/TWC.2016.2643658

H. Fang, L. Xu, and K. Choo, Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks, Applied Mathematics and Computation, vol.296, pp.153-167, 2017.
DOI : 10.1016/j.amc.2016.10.022

A. Mukherjee and A. Swindlehurst, Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper, IEEE Transactions on Signal Processing, vol.61, issue.1, pp.82-91, 2013.
DOI : 10.1109/TSP.2012.2222386

M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering, 2011.
DOI : 10.1017/CBO9780511977985

M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt, Spread Spectrum Communications Handbook. Electronic Ed, 2002.

M. Strasser, C. Pöpper, S. C?apkunc?apkun, and M. ?. Cagalj, Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008.
DOI : 10.1109/SP.2008.9

URL : http://www.csg.ethz.ch/people/mariost/UFH_SP08.pdf

C. Pöpper, M. Strasser, and S. C?apkunc?apkun, Anti-jamming broadcast communication using uncoordinated spread spectrum techniques, IEEE Journal on Selected Areas in Communications, vol.28, issue.5, pp.703-715, 2010.
DOI : 10.1109/JSAC.2010.100608

R. Ramachandran, V. Sharma, and P. Viswanath, Capacity of Gaussian channels with energy harvesting and processing cost, IEEE Trans. Inf. Theory, vol.60, issue.5, pp.2563-2575, 2014.

Y. Gu and S. A¨?ssaa¨?ssa, RF-Based Energy Harvesting in Decode-and-Forward Relaying Systems: Ergodic and Outage Capacities, IEEE Transactions on Wireless Communications, vol.14, issue.11, pp.6425-5434, 2015.
DOI : 10.1109/TWC.2015.2453418

S. Ulukus, A. Yener, E. Erkip, O. Simeone, M. Zorzi et al., Energy Harvesting Wireless Communications: A Review of Recent Advances, IEEE Journal on Selected Areas in Communications, vol.33, issue.3, pp.360-381, 2015.
DOI : 10.1109/JSAC.2015.2391531

R. Zhang and C. K. Ho, MIMO broadcasting for silmutaneous wireless information and power transfer, pp.1989-2001, 2013.

A. Goldsmith, Wireless Communications, 2005.
DOI : 10.1017/CBO9780511841224

J. V. Neumann, O. Morgenstern, J. Xu, L. Duan, and R. Zhang, Theory of games and economic behavior Proactive eavesdropping via jamming for rate maximization over rayleigh fading channels, IEEE Wireless Commun. Lett, vol.5, issue.1, pp.80-83, 2007.

E. and V. Belmega, she was a Postdoctoral Researcher in a joint project between Princeton University, USA and the Alcatel-Lucent Chair on Flexible Radio in Supélec, France. She is currently an Assistant Professor with ETIS, UMR 8051 For young women doctoral candidates in science, Sc. and Ph.D. degrees both from the Université Paris-Sud 11 CNRS, France, and Inria. She was one of the ten recipients of the L'Oréal?UNESCO?French Academy of Science Fellowship, 2007.

A. Chorti, Eng. degree in EEE from the University of Patras (Greece) and a D.E.A. degree in Electronics at the University Pierre et Marie Curie -Paris VI (France), November 2005 she obtained her Ph.D. in EE from Imperial College London (UK). She undertook post-doctoral positions at the Universities of Southampton (UK), TCU (Greece) and UCL (UK), between 2005 and 2008. She has served as a Senior Lecturer in Communications at Middlesex University (UK) from, 2008.