C. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

G. Stoneburner, C. Hayden, and A. Feringa, Computer Security, Information Technology Laboratory, NIST, 2004.

G. Boddapati, I. Matta, J. Day, and L. Chitkushev, Assessing the Security of a Clean-Slate Internet Architecture Layer, Seventh Workshop on Secure Network Protocols (NPSec), 2012.

J. Katz and Y. Lindell, Introduction to Modern Cryptography, 2014.

W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

Y. Fang, X. Zhu, and Y. Zhang, Securing resource-constrained wireless ad hoc networks, 2007 IEEE Sarnoff Symposium, pp.24-30, 2009.
DOI : 10.1109/SARNOF.2007.4567365

I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, A survey on sensor networks, IEEE Communications Magazine, vol.40, issue.8, pp.102-114, 2002.
DOI : 10.1109/MCOM.2002.1024422

R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn et al., TinyPK, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks , SASN '04, pp.59-64, 2004.
DOI : 10.1145/1029102.1029113

Y. Zhang, W. Liu, W. Lou, and Y. Fang, Securing Mobile Ad Hoc Networks with Certificateless Public Keys, IEEE Transactions on Dependable and Secure Computing, vol.3, issue.4, pp.386-399, 2006.
DOI : 10.1109/TDSC.2006.58

K. Ren, W. Lou, and Y. Zhang, LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.585-598, 2008.
DOI : 10.1109/INFOCOM.2006.303

Y. Zhou, Y. Fang, and Y. Zhang, Securing wireless sensor networks: a survey, IEEE Communications Surveys & Tutorials, vol.10, issue.3, pp.6-28, 2008.
DOI : 10.1109/COMST.2008.4625802

A. D. Wyner, The Wire-Tap Channel, Bell System Technical Journal, vol.54, issue.8, pp.1355-1387, 1975.
DOI : 10.1002/j.1538-7305.1975.tb02040.x

T. Cover and J. Thomas, Elements of Information Theory, 2001.

M. Bloch and J. Barros, Physical Layer Security, 2011.
DOI : 10.1017/CBO9780511977985

Y. Chen, Wiretap Channel with Side Information, 2007.

A. Mukherjee, S. Fakoorian, J. Huang, and A. Swindlehurst, Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.3, pp.1550-1573, 2014.
DOI : 10.1109/SURV.2014.012314.00178

I. Csiszàr and J. Korner, Broadcast channels with confidential messages, IEEE Transactions on Information Theory, vol.24, issue.3, pp.339-348, 1978.
DOI : 10.1109/TIT.1978.1055892

S. Leung-yan-cheong and M. Hellman, The Gaussian wire-tap channel, IEEE Transactions on Information Theory, vol.24, issue.4, pp.451-456, 1978.
DOI : 10.1109/TIT.1978.1055917

J. Barros and M. Rodrigues, Secrecy Capacity of Wireless Channels, 2006 IEEE International Symposium on Information Theory, pp.356-360, 2006.
DOI : 10.1109/ISIT.2006.261613

M. Bloch, J. Barros, M. Rodrigues, and S. Mclaughlin, Wireless Information-Theoretic Security, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2515-2534, 2008.
DOI : 10.1109/TIT.2008.921908

W. Trappe and K. Zeng, The challenges facing physical layer security, IEEE Communications Magazine, vol.53, issue.6, pp.16-20, 2015.
DOI : 10.1109/MCOM.2015.7120011

S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari et al., On the effectiveness of secret key extraction from wireless signal strength in real environments, Proceedings of the 15th annual international conference on Mobile computing and networking, MobiCom '09, 2009.
DOI : 10.1145/1614320.1614356

M. Madiseh, S. He, M. Mcguire, S. Neville, and X. Dong, Verification of Secret Key Generation from UWB Channel Observations, Proc. IEEE ICC'09, pp.1-5, 2009.

S. Tmar-ben-hamida, J. Pierrot, and C. Castelluccia, Empirical Analysis of UWB Channel Characteristics for Secret Key Generation in Indoor Environments, Proc. IEEE PIMRC'10, 2010.

N. Patwari, J. Croft, S. Jana, and S. K. Kasera, High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements, IEEE Transactions on Mobile Computing, vol.9, issue.1, pp.17-30, 2010.
DOI : 10.1109/TMC.2009.88

S. Tmar-ben-hamida, J. Pierrot, and C. Castelluccia, On the Security of UWB Secret Key Generation Methods against Deterministic Channel Prediction Attacks, Proc. IEEE Vehicular Technology Conference, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00747839

U. Maurer, Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, vol.39, issue.3, pp.733-742, 1993.
DOI : 10.1109/18.256484

R. Ahlswede and I. Csiszar, Common randomness in information theory and cryptography. I. Secret sharing, IEEE Transactions on Information Theory, vol.39, issue.4, pp.1121-1132, 1993.
DOI : 10.1109/18.243431

U. Maurer and S. Wolf, Unconditionally secure key agreement and the intrinsic conditional information, IEEE Transactions on Information Theory, vol.45, issue.2, pp.499-514, 1999.
DOI : 10.1109/18.748999

S. Mjlosnes, Quantum Cryptography, " in A Multidisciplinary Introduction to Information Security, 2011.

D. Moskovich, An Overview of the State of the Art for Practical Quantum Key Distribution, 2015.

T. Chou, S. Draper, and A. Sayeed, Key Generation Using External Source Excitation: Capacity, Reliability, and Secrecy Exponent, IEEE Transactions on Information Theory, vol.58, issue.4, pp.2455-2474, 2012.
DOI : 10.1109/TIT.2011.2176311

P. Huang and X. Wang, Fast secret key generation in static wireless networks: A virtual channel approach, 2013 Proceedings IEEE INFOCOM, pp.2292-2300, 2013.
DOI : 10.1109/INFCOM.2013.6567033

P. K. Gopala, L. Lai, and H. , On the Secrecy Capacity of Fading Channels, IEEE Transactions on Information Theory, vol.54, issue.10, pp.4687-4698, 2008.
DOI : 10.1109/TIT.2008.928990

S. Xiao, H. Pishro-nik, and W. Gong, Dense Parity Check Based Secrecy Sharing in Wireless Communications, IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, pp.54-58, 2007.
DOI : 10.1109/GLOCOM.2007.18

A. Agrawal, Z. Rezki, A. Khisti, and M. Alouini, Noncoherent Capacity of Secret-Key Agreement With Public Discussion, IEEE Transactions on Information Forensics and Security, vol.6, issue.3, pp.565-574, 2011.
DOI : 10.1109/TIFS.2011.2158999

L. Lai, Y. Liang, and H. Poor, A Unified Framework for Key Agreement Over Wireless Fading Channels, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.480-490, 2012.
DOI : 10.1109/TIFS.2011.2180527

A. Khisti, Secret-Key Agreement Over Non-Coherent Block-Fading Channels With Public Discussion, IEEE Transactions on Information Theory, vol.62, issue.12, 2013.
DOI : 10.1109/TIT.2016.2618861

H. Koorapaty, A. Hassan, and S. Chennakeshu, Secure information transmission for mobile radio, IEEE Communications Letters, vol.4, issue.2, pp.52-55, 2000.
DOI : 10.1109/4234.824754

S. Severi, G. Abreu, G. Pasolini, and D. Dardari, A secret key exchange scheme for near field communication, 2014 IEEE Wireless Communications and Networking Conference (WCNC), 2014.
DOI : 10.1109/WCNC.2014.6952046

D. Simmons, N. Bhargav, J. Coon, and S. Cotton, Physical Layer Security over OFDM-Based Links: Conjugate-and-Return, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), 2015.
DOI : 10.1109/VTCSpring.2015.7146015

Y. Shen and M. Z. Win, Intrinsic Information of Wideband Channels, IEEE Journal on Selected Areas in Communications, vol.31, issue.9, 2013.
DOI : 10.1109/JSAC.2013.130919

U. Maurer and S. Wolf, Secret-key agreement over unauthenticated public channels-part I: definitions and a completeness result, IEEE Transactions on Information Theory, vol.49, issue.4, pp.822-831, 2003.
DOI : 10.1109/TIT.2003.809563

L. Lai, Y. Liang, and H. Poor, Key agreement over wireless fading channels with an active attacker, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp.1391-1396, 2010.
DOI : 10.1109/ALLERTON.2010.5707076

H. Li, L. Lai, S. Djouadi, and X. Ma, Key establishment via common state information in networked control systems, Proc. American Control Conference (ACC), pp.2234-2239, 2011.

M. Forman and D. Young, A Generalized Scheme for the Creation of Shared Secret Keys through Uncorrelated Reciprocal Channels in Multiple Domains, 2009 Proceedings of 18th International Conference on Computer Communications and Networks, pp.1-8, 2009.
DOI : 10.1109/ICCCN.2009.5235210

K. Ren, H. Su, and Q. Wang, Secret key generation exploiting channel characteristics in wireless communications, IEEE Wireless Communications, vol.18, issue.4, pp.6-12, 2011.
DOI : 10.1109/MWC.2011.5999759

A. Hassan, W. Stark, J. Hershey, and S. Chennakeshu, Cryptographic Key Agreement for Mobile Radio, Digital Signal Processing, vol.6, issue.4, pp.207-212, 1996.
DOI : 10.1006/dspr.1996.0023

Q. Wang, H. Su, K. Ren, and K. Kim, Fast and scalable secret key generation exploiting channel phase randomness in wireless networks, 2011 Proceedings IEEE INFOCOM, pp.1422-1430, 2011.
DOI : 10.1109/INFCOM.2011.5934929

A. Sayeed and A. Perrig, Secure wireless communications: Secret keys through multipath, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.3013-3016, 2008.
DOI : 10.1109/ICASSP.2008.4518284

M. Tope and J. Mceachen, Unconditionally secure communications over fading channels, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277), pp.54-58, 2001.
DOI : 10.1109/MILCOM.2001.985763

T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels, IEEE Transactions on Antennas and Propagation, vol.53, issue.11, pp.3776-3784, 2005.
DOI : 10.1109/TAP.2005.858853

A. Azimi-sadjadi, A. Mercado, B. Kiayias, and . Yener, Robust key generation from signal envelopes in wireless networks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315295

S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, Radio-telepathy, Proceedings of the 14th ACM international conference on Mobile computing and networking, MobiCom '08
DOI : 10.1145/1409944.1409960

P. Barsocchi, S. Chessa, I. Martinovic, and G. Oligeri, AmbiSec: Securing Smart Spaces Using Entropy Harvesting, Proc. AmI'10, pp.73-85, 2010.
DOI : 10.1007/978-3-642-16917-5_8

S. Ali, V. Sivaraman, and D. Ostry, Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.644-650, 2010.
DOI : 10.1109/EUC.2010.103

Y. Wei, K. Zeng, and P. Mohapatra, Adaptive wireless channel probing for shared key generation, 2011 Proceedings IEEE INFOCOM, pp.2165-2173, 2011.
DOI : 10.1109/INFCOM.2011.5935028

C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe et al., Information-Theoretically Secret Key Generation for Fading Wireless Channels, IEEE Transactions on Information Forensics and Security, vol.5, issue.2, pp.240-254, 2010.

X. Wu, Y. Song, C. Zhao, and X. You, Secrecy extraction from correlated fading channels: An upper bound, 2009 International Conference on Wireless Communications & Signal Processing, pp.1-3, 2009.
DOI : 10.1109/WCSP.2009.5371757

M. Wilhelm, I. Martinovic, and J. Schmitt, Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels: Design, Implementation, and Analysis, ArXiv.org, Tech. Rep, 2010.

Y. Liu, S. Draper, and A. Sayeed, Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness, IEEE Transactions on Information Forensics and Security, vol.7, issue.5, pp.1484-1497, 2012.
DOI : 10.1109/TIFS.2012.2206385

T. Mazloum, F. Mani, and A. Sibille, Analysis of Secret Key Robustness in Indoor Radio Channel Measurements, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pp.1-5, 2015.
DOI : 10.1109/VTCSpring.2015.7145702

URL : https://hal.archives-ouvertes.fr/hal-01194191

S. Yasukawa, H. Iwai, and H. Sasaoka, Adaptive Key Generation in Secret Key Agreement Scheme based on the Channel Characteristics in OFDM Towards Robust Key Extraction from Multipath Wireless Channels, Proc. [70] Y. El Hajj Shehadeh, O. Alfandi, and D. Hogrefe, pp.385-395, 2012.

K. Zeng, D. Wu, A. Chan, and P. Mohapatra, Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks, 2010 Proceedings IEEE INFOCOM, 2010.
DOI : 10.1109/INFCOM.2010.5462004

J. Wallace, Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits, 2009 IEEE International Conference on Communications, pp.1-5, 2009.
DOI : 10.1109/ICC.2009.5199440

G. Pasolini and D. Dardari, Secret key generation in correlated multi-dimensional Gaussian channels, 2014 IEEE International Conference on Communications (ICC), pp.2171-2177, 2014.
DOI : 10.1109/ICC.2014.6883645

B. Quist and M. Jensen, Maximizing the Secret Key Rate for Informed Radios under Different Channel Conditions, IEEE Transactions on Wireless Communications, vol.12, issue.10, pp.5146-5153, 2013.
DOI : 10.1109/TWC.2013.090313.122034

A. Kitaura, T. Sumi, K. Tachibana, H. Iwai, and H. Sasaoka, A Scheme of Private key Agreement Based on Delay Profiles in UWB Systems, 2006 IEEE Sarnoff Symposium, pp.1-6, 2006.
DOI : 10.1109/SARNOF.2006.4534731

J. Huang and T. Jiang, Dynamic Secret Key Generation Exploiting Ultra- Wideband Wireless Channel Characteristics, Proc. IEEE Wireless Communications and Networking Conference (WCNC), pp.1701-1706, 2015.

R. Wilson, D. Tse, and R. A. Scholtz, Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels, IEEE Transactions on Information Forensics and Security, vol.2, issue.3, 2007.

M. Madiseh, M. Mcguire, S. Neville, and A. Shirazi, Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios, 6th Annual Communication Networks and Services Research Conference (cnsr 2008), pp.88-95, 2008.
DOI : 10.1109/CNSR.2008.52

S. Tmar-ben-hamida, J. Pierrot, and C. Castelluccia, An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements, Proc. NTMS'09, 2009.

F. Marino, E. Paolini, and M. Chiani, Secret key extraction from a UWB channel: Analysis in a real environment, 2014 IEEE International Conference on Ultra-WideBand (ICUWB), 2014.
DOI : 10.1109/ICUWB.2014.6958955

M. Madiseh, S. Neville, and M. Mcguire, Time Correlation Analysis of Secret Key Generation via UWB Channels, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp.1-6, 2010.
DOI : 10.1109/GLOCOM.2010.5683999

O. Gungor, F. Chen, and C. Koksal, Secret key generation from mobility, 2011 IEEE GLOBECOM Workshops (GC Wkshps), pp.874-878, 2011.
DOI : 10.1109/GLOCOMW.2011.6162581

A. Badawy, T. Khattab, T. El-fouly, A. Mohamed, D. Trinchero et al., Secret Key Generation Based on AoA Estimation for Low SNR Conditions, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pp.1-7, 2015.
DOI : 10.1109/VTCSpring.2015.7146072

R. Mehmood, J. Wallace, and M. Jensen, Key Establishment Employing Reconfigurable Antennas: Impact of Antenna Complexity, IEEE Transactions on Wireless Communications, vol.13, issue.11, pp.6300-6310, 2014.
DOI : 10.1109/TWC.2014.2330835

S. Gollakota and D. Katabi, Physical layer wireless security made fast and channel independent, 2011 Proceedings IEEE INFOCOM, pp.1125-1133, 2011.
DOI : 10.1109/INFCOM.2011.5934889

A. Limmanee and W. Henkel, Secure physical-layer key generation protocol and key encoding in wireless communications, 2010 IEEE Globecom Workshops, pp.94-98, 2010.
DOI : 10.1109/GLOCOMW.2010.5700466

H. Vogt and A. Sezgin, Secret-key generation from wireless channels: Mind the reflections, 2014 IEEE International Conference on Communications Workshops (ICC), pp.783-788, 2014.
DOI : 10.1109/ICCW.2014.6881295

T. H. Nguyen and J. Barbot, Secret key management and dynamic security coding system, 2014 IEEE Fifth International Conference on Communications and Electronics (ICCE), pp.548-553, 2014.
DOI : 10.1109/CCE.2014.6916762

L. Yang and G. Giannakis, Ultra-wideband communications - An idea whose time has come, IEEE Signal Processing Magazine, vol.21, issue.6, pp.26-54, 2004.
DOI : 10.1109/MSP.2004.1359140

B. Denis, F. Dehmas, M. Pelissier, and L. Ouvry, La Technologie UWB Radio Impulsionnelle: un Etat des Lieux des Solutions enMatì ere de Localisation Haute Précision et de Transfert de DonnéesDonnées`Donnéesà Courte Portée, pp.62-74, 2013.

A. Molisch, D. Cassioli, C. Chong, S. Emami, A. Fort et al., A Comprehensive Standardized Bibliography 169

N. Amiot, M. Laaraiedh, and B. Uguen, PyLayers: An open source dynamic simulator for indoor propagation and localization, 2013 IEEE International Conference on Communications Workshops (ICC), 2013.
DOI : 10.1109/ICCW.2013.6649206

URL : https://hal.archives-ouvertes.fr/hal-01127772

S. Dubouloz, B. Denis, S. De-rivaz, and L. Ouvry, Performance Analysis of LDR UWB Non-Coherent Receivers in Multipath Environments, 2005 IEEE International Conference on Ultra-Wideband, 2005.
DOI : 10.1109/ICU.2005.1570037

M. Pezzin and D. Lachartre, A low Power, Low Data Rate Impulse Radio Ultra Wide Band Transceiver, Proc. FUNEMS'10, 2010.

S. Tmar-ben and . Hamida, Signal-based Security in Wireless Networks, 2012.

S. Tmar-ben-hamida, J. Pierrot, B. Denis, C. Castelluccia, and B. Uguen, On the Security of UWB Secret Key Generation Methods against Deterministic Channel Prediction Attacks, Proc. IEEE VTC Fall'12, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00747839

I. Tunaru, B. Denis, and B. Uguen, Random patterns of secret keys from sampled IR-UWB channel responses, 2014 IEEE International Conference on Ultra-WideBand (ICUWB), 2014.
DOI : 10.1109/ICUWB.2014.6958954

URL : https://hal.archives-ouvertes.fr/hal-01127769

R. Gray and D. Neuhoff, Quantization, IEEE Transactions on Information Theory, vol.44, issue.6, pp.2325-2383, 1998.
DOI : 10.1109/18.720541

W. Burr, D. Dodson, and W. Polk, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, Information Technology Laboratory, NIST, 2010.

C. Ye, A. Reznik, and Y. Shah, Extracting Secrecy from Jointly Gaussian Random Variables, 2006 IEEE International Symposium on Information Theory, pp.2593-2597, 2006.
DOI : 10.1109/ISIT.2006.262101

J. Wallace and R. Sharma, Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis, IEEE Transactions on Information Forensics and Security, vol.5, issue.3, pp.381-392, 2010.

S. Riad, The deconvolution problem: An overview, Proceedings of the IEEE, vol.74, issue.1, pp.82-85, 1986.
DOI : 10.1109/PROC.1986.13407

R. Cramer, R. Scholtz, and M. Win, Evaluation of an ultra-wide-band propagation channel, IEEE Transactions on Antennas and Propagation, vol.50, issue.5, pp.561-570, 2002.
DOI : 10.1109/TAP.2002.1011221

J. Paredes, G. Arce, and Z. Wang, Ultra-Wideband Compressed Sensing: Channel Estimation, IEEE Journal of Selected Topics in Signal Processing, vol.1, issue.3, pp.383-395, 2007.
DOI : 10.1109/JSTSP.2007.906657

B. Smith, Instantaneous Companding of Quantized Signals, Bell System Technical Journal, vol.36, issue.3, pp.653-709, 1957.
DOI : 10.1002/j.1538-7305.1957.tb03858.x

M. Caramia, P. Dell, and . Olmo, Multi-objective Management in Freight Logistics Increasing Capacity, Service Level and Safety with Optimization Algorithms, 2008.

W. Gifford, W. Li, Y. Zhang, and M. Win, Effect of Bandwidth on the Number of Multipath Components in Realistic Wireless Indoor Channels, 2011 IEEE International Conference on Communications (ICC), pp.1-6, 2011.
DOI : 10.1109/icc.2011.5962896

I. Maravi´cmaravi´c, M. Vetterli, and K. Ramchandran, Channel Estimation and Synchronization with Sub-Nyquist Sampling and Application to Ultra-Wideband Systems, Proc. IEEE ISCAS'04, 2004.

M. Win and R. Scholtz, Characterization of ultra-wide bandwidth wireless indoor channels: a communication-theoretic view, IEEE Journal on Selected Areas in Communications, vol.20, issue.9, pp.1613-1627, 2002.
DOI : 10.1109/JSAC.2002.805031

V. Lottici, A. D. Andrea, and U. Mengali, Channel estimation for ultra-wideband communications, IEEE Journal on Selected Areas in Communications, vol.20, issue.9, pp.1638-1645, 2002.
DOI : 10.1109/JSAC.2002.805053

C. Carbonelli, U. Mengali, and U. Mitra, Synchronization and channel estimation for UWB signals, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), pp.764-768, 2003.
DOI : 10.1109/GLOCOM.2003.1258341

Z. Wang and X. Yang, Ultra Wide-Band Communications with Blind Channel Estimation Based on First-Order Statistics, Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, pp.529-532, 2004.

C. Falsi, D. Dardari, L. Mucchi, and M. Z. Win, Time of Arrival Estimation for UWB Localizers in Realistic Environments, EURASIP Journal on Advances in Signal Processing, vol.2, issue.9, p.32082, 2006.
DOI : 10.1109/TVT.2005.856196

N. Michelusi, U. Mitra, and M. Zorzi, Hybrid sparse/diffuse UWB channel estimation, 2011 IEEE 12th International Workshop on Signal Processing Advances in Wireless Communications, pp.201-205, 2011.
DOI : 10.1109/SPAWC.2011.5990395

L. Yang and G. B. Giannakis, Optimal Pilot Waveform Assisted Modulation for Ultrawideband Communications, IEEE Transactions on Wireless Communications, vol.3, issue.4, pp.1236-1249, 2002.
DOI : 10.1109/TWC.2004.830827

B. Geiger, T. Gigl, and K. Witrisal, Enhanced-accuracy channel estimation and ranging for IR-UWB energy detectors, 2010 IEEE International Conference on Ultra-Wideband, pp.1-6, 2010.
DOI : 10.1109/ICUWB.2010.5616870

M. Unser and J. Zerubia, A generalized sampling theory without band-limiting constraints, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, pp.959-969, 1998.
DOI : 10.1109/82.718806

M. Vetterli, P. Marziliano, and T. Blu, Sampling signals with finite rate of innovation, IEEE Transactions on Signal Processing, vol.50, issue.6, pp.1417-1428, 2002.
DOI : 10.1109/TSP.2002.1003065

T. Blu, P. Dragotti, M. Vetterli, P. Marziliano, and L. Coulot, Sparse Sampling of Signal Innovations, IEEE Signal Processing Magazine, vol.25, issue.2, pp.31-40, 2008.
DOI : 10.1109/MSP.2007.914998

I. Maravi´cmaravi´c and M. Vetterli, Sampling and reconstruction of signals with finite rate of innovation in the presence of noise, IEEE Transactions on Signal Processing, vol.53, issue.8, pp.2788-2805, 2005.
DOI : 10.1109/TSP.2005.850321

M. Vetterli, Sampling in the Age of Sparsity Available: http://lcav.epfl.ch/files, 2009.

D. Donoho, Compressed sensing, IEEE Transactions on Information Theory, vol.52, issue.4, pp.1289-1306, 2006.
DOI : 10.1109/TIT.2006.871582

URL : https://hal.archives-ouvertes.fr/inria-00369486

E. Candes and M. Wakin, An Introduction To Compressive Sampling, IEEE Signal Processing Magazine, vol.25, issue.2, pp.21-30, 2008.
DOI : 10.1109/MSP.2007.914731

F. Naini, R. Gribonval, L. Jacques, and P. Vandergheynst, Compressive sampling of pulse trains: Spread the spectrum!, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.2877-2880, 2009.
DOI : 10.1109/ICASSP.2009.4960224

URL : https://hal.archives-ouvertes.fr/hal-00481954

E. Lagunas and M. Najar, Sparse channel estimation based on compressed sensing for ultra wideband systems, 2011 IEEE International Conference on Ultra-Wideband (ICUWB), pp.365-369, 2011.
DOI : 10.1109/ICUWB.2011.6058865

T. Liu, X. Dong, and W. Lu, Compressed Sensing Maximum Likelihood Channel Estimation for Ultra-Wideband Impulse Radio, 2009 IEEE International Conference on Communications, pp.1-5, 2009.
DOI : 10.1109/ICC.2009.5198842

L. Shi, Z. Zhou, L. Tang, H. Yao, and J. Zhang, Ultra-wideband channel estimation based on Bayesian compressive sensing, 2010 10th International Symposium on Communications and Information Technologies, pp.779-782, 2010.
DOI : 10.1109/ISCIT.2010.5665094

M. Ozgor, S. Erkucuk, and H. Cirpan, Bayesian compressive sensing for ultra-wideband channel models, 2012 35th International Conference on Telecommunications and Signal Processing (TSP), pp.320-324, 2012.
DOI : 10.1109/TSP.2012.6256307

S. Ji, Y. Xue, and L. Carin, Bayesian Compressive Sensing, IEEE Transactions on Signal Processing, vol.56, issue.6, pp.2346-2356, 2008.
DOI : 10.1109/TSP.2007.914345

M. Basaran, S. Erkucuk, and H. Cirpan, The effect of channel models on compressed sensing based UWB channel estimation, 2011 IEEE International Conference on Ultra-Wideband (ICUWB), pp.375-379, 2011.
DOI : 10.1109/ICUWB.2011.6058867

Q. Zhou, Z. Zou, H. Tenhunen, and L. Zheng, Architectural analysis of compressed sensing based IR-UWB receiver for communication and ranging, 2014 IEEE International Conference on Ultra-WideBand (ICUWB), pp.222-227, 2014.
DOI : 10.1109/ICUWB.2014.6958982

Z. Sahinoglu, S. Gezici, and I. Guvenc, Ultra-Wideband Positioning Systems: Theoretical Limits, Ranging Algorithms and Protocols, 2008.
DOI : 10.1017/CBO9780511541056

G. Durgin, M. Wilhelm, I. Martinovic, and J. Schmitt, Space-Time Wireless Channels On Key Agreement in Wireless Sensor Networks based on Radio Transmission Properties, Proc. IEEE Workshop NPSec'09, 2002.

M. Madiseh, M. Mcguire, S. Neville, L. Cai, and M. Horie, Secret Key Generation and Agreement in UWB Communication Channels, IEEE GLOBECOM 2008, 2008 IEEE Global Telecommunications Conference, pp.1-5, 2008.
DOI : 10.1109/GLOCOM.2008.ECP.356

G. Shirazi and L. Lampe, A compressive sensing approach for secret key agreement based on UWB channel reciprocity, 2012 IEEE International Conference on Ultra-Wideband, pp.135-139, 2012.
DOI : 10.1109/ICUWB.2012.6340497

D. Karas, G. Karagiannidis, and R. Schober, Channel level crossing-based security for communications over fading channels, IET Information Security, vol.7, issue.3, 2013.
DOI : 10.1049/iet-ifs.2011.0360

I. Csiszar and P. Narayan, Secrecy Capacities for Multiple Terminals, IEEE Transactions on Information Theory, vol.50, issue.12, pp.3047-3061, 2004.
DOI : 10.1109/TIT.2004.838380

C. Chan and L. Zheng, Multiterminal Secret Key Agreement, IEEE Transactions on Information Theory, vol.60, issue.6, pp.3379-3412, 2014.
DOI : 10.1109/TIT.2014.2313566

C. Ye and A. Reznik, Group Secret Key Generation Algorithms, 2007 IEEE International Symposium on Information Theory, pp.2596-2600, 2007.
DOI : 10.1109/ISIT.2007.4557610

L. Lai, Y. Liang, and W. Du, Cooperative Key Generation in Wireless Networks, IEEE Journal on Selected Areas in Communications, vol.30, issue.8, pp.1578-1588, 2012.
DOI : 10.1109/JSAC.2012.120924

Q. Wang, K. Xu, and K. Ren, Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels, IEEE Journal on Selected Areas in Communications, vol.30, issue.9, pp.1666-1674, 2012.
DOI : 10.1109/JSAC.2012.121010

Y. Wei, C. Zhu, and J. Ni, Group Secret Key Generation Algorithm from Wireless Signal Strength, 2012 Sixth International Conference on Internet Computing for Science and Engineering, pp.239-245, 2012.
DOI : 10.1109/ICICSE.2012.64

N. Wang, N. Zhang, and T. Gulliver, Cooperative Key Agreement for Wireless Networking: Key Rates and Practical Protocol Design, IEEE Transactions on Information Forensics and Security, vol.9, issue.2, pp.272-284, 2014.
DOI : 10.1109/TIFS.2013.2293113

L. De-nardis, J. Fiorina, D. Panaitopol, and M. Benedetto, Combining UWB with Time Reversal for improved communication and positioning, Telecommunication Systems, vol.34, issue.3, pp.1145-1158, 2013.
DOI : 10.1007/s11235-011-9630-1

URL : https://hal.archives-ouvertes.fr/hal-00997281

D. Mackay, Bayesian Interpolation, Neural Computation, vol.49, issue.3, pp.415-447, 1992.
DOI : 10.1093/comjnl/11.2.185

T. Moon, The expectation-maximization algorithm, IEEE Signal Processing Magazine, vol.13, issue.6, pp.47-60, 1996.
DOI : 10.1109/79.543975

S. Borman, The Expectation Maximization Algorithm. A Short Tutorial, 2009.

S. Roweis and Z. Ghahramani, A Unifying Review of Linear Gaussian Models, Neural Computation, vol.45, issue.3, pp.305-345, 1999.
DOI : 10.1109/TIT.1967.1054010

A. P. Dempster, N. M. Laird, and D. B. Rubin, Maximum Likelihood from Incomplete Data via the EM Algorithm, JOURNAL OF THE ROYAL STATISTICAL SOCIETY, SERIES B, vol.39, issue.1, pp.1-38, 1977.

L. Stillwaggon-swan and L. Goldberg, Are Social Media Making Us Stupid? [Opinion], IEEE Technology and Society Magazine, vol.34, issue.1, pp.8-9, 2015.
DOI : 10.1109/MTS.2015.2396049

D. Lupton, Understanding the Human Machine [Commentary], IEEE Technology and Society Magazine, vol.32, issue.4, pp.25-30, 2013.
DOI : 10.1109/MTS.2013.2286431

J. Robbins, Ruminations on the IQ2 Debate: We Are Becoming Enslaved by Our Technology [Opinion], IEEE Technology and Society Magazine, vol.34, issue.1, pp.6-7, 2015.
DOI : 10.1109/MTS.2015.2396050

C. Nold and R. Van-kranenburg, The Internet of People for a Post- Oil World Available: http://situatedtechnologies, 2011.

D. Geer, The Right to Be Unobserved, IEEE Security & Privacy, vol.13, issue.4, pp.12-19, 2015.
DOI : 10.1109/MSP.2015.76

S. Eldridge, The Circle [Book Review], IEEE Technology and Society Magazine, vol.34, issue.1, pp.4-5, 2015.
DOI : 10.1109/MTS.2015.2395964

D. Anthony, T. Stablein, and E. Carian, Big Brother in the Information Age: Concerns about Government Information Gathering over Time, IEEE Security & Privacy, vol.13, issue.4, pp.12-19, 2015.
DOI : 10.1109/MSP.2015.70

J. Bustard, The Impact of EU Privacy Legislation on Biometric System Deployment: Protecting citizens but constraining applications, IEEE Signal Processing Magazine, vol.32, issue.5, pp.101-108, 2015.
DOI : 10.1109/MSP.2015.2426682

J. Nielsen, Assessment of cooperative and heterogeneous indoor localization algorithms with real radio devices, 2014 IEEE International Conference on Communications Workshops (ICC), 2014.
DOI : 10.1109/ICCW.2014.6881190

M. Laaraiedh, S. Avrillon, and B. Uguen, Enhancing Positioning Accuracy through Direct Position Estimators Based on Hybrid RSS Data Fusion, VTC Spring 2009, IEEE 69th Vehicular Technology Conference
DOI : 10.1109/VETECS.2009.5073539

URL : https://hal.archives-ouvertes.fr/hal-00379638

K. Zeng, K. Govindan, and P. Mohapatra, Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks, IEEE Wireless Communications, vol.17, issue.5, pp.56-62, 2010.
DOI : 10.1109/MWC.2010.5601959

D. Faria and D. Cheriton, Detecting identity-based attacks in wireless networks using signalprints, Proceedings of the 5th ACM workshop on Wireless security , WiSe '06, 2006.
DOI : 10.1145/1161289.1161298

N. Patwari and S. K. Kasera, Robust location distinction using temporal link signatures, Proceedings of the 13th annual ACM international conference on Mobile computing and networking , MobiCom '07, 2007.
DOI : 10.1145/1287853.1287867

Y. Zhang, W. Liu, W. Lou, and Y. Fang, Securing Sensor Networks with Location-Based Keys, Proc. IEEE WCNC'05, 2005.

O. Gungor, F. Chen, and C. Koksal, Secret Key Generation Via Localization and Mobility, IEEE Transactions on Vehicular Technology, vol.64, issue.6, pp.1-16, 2014.
DOI : 10.1109/TVT.2014.2342714

B. Denis, J. Pierrot, and C. Abou-rjeily, Joint distributed synchronization and positioning in UWB ad hoc networks using TOA, IEEE Transactions on Microwave Theory and Techniques, vol.54, issue.4, pp.1896-1911, 2006.
DOI : 10.1109/TMTT.2006.872082

A. Menezes, P. Oorschot, and S. Vanstone, Handbook of Applied Cryptography, 1996.
DOI : 10.1201/9781439821916

]. A. Wyn75 and . Wyner, The Wire-tap Channel, Bell Systems Technical Journal, vol.54, issue.8, pp.1355-1387, 1975.

U. Maurer, Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, vol.39, issue.3, pp.733-742, 1993.
DOI : 10.1109/18.256484

]. R. Ahl93, I. Ahlswede, and . Csiszar, Common Randomness in Information Theory and Cryptography. I. Secret Sharing, IEEE Transactions on Information Theory, vol.39, issue.4, pp.1121-1132, 1993.

]. S. Tma12, . Tmar-ben, and . Hamida, Signal-based Security in Wireless Networks, 2012.

W. Gifford, W. Li, Y. Zhang, and M. Win, Effect of Bandwidth on the Number of Multipath Components in Realistic Wireless Indoor Channels, 2011 IEEE International Conference on Communications (ICC), pp.1-6, 2011.
DOI : 10.1109/icc.2011.5962896

J. Paredes, G. Arce, and Z. Wang, Ultra-Wideband Compressed Sensing: Channel Estimation, IEEE Journal of Selected Topics in Signal Processing, vol.1, issue.3, pp.383-395, 2007.
DOI : 10.1109/JSTSP.2007.906657

]. I. Mar04, M. Maravic, K. Vetterli, and . Ramchandran, Channel Estimation and Synchronization with Sub-Nyquist Sampling and Application to Ultra-Wideband Systems, Proc. IEEE ISCAS'04, 2004.