[. Mazloum and A. Sibille, Analysis of Secret Key Randomness Exploiting the Radio Channel Variability, International Journal of Antennas and Propagation, vol.2015, 2015.
DOI : 10.1109/25.282271

URL : https://hal.archives-ouvertes.fr/hal-01354008

]. T. Mazloum, F. Mani, and A. Sibille, A disc of scatterers based radio channel model for secure key generation, EUCAP, The Hague, Netherlands, Conference papers, pp.1290-1294, 2014.

E. Nicollet, F. Delaveau, R. Molì-ere, C. L. Ngassa, C. Lemenager et al., Towards a key-free radio protocol for authentication and security of nodes and terminals in advanced waveforms, 2015.

F. Vitucci, T. Mani, A. Mazloum, V. E. Sibille, and . Espotti, Ray tracing simulations of indoor channel spatial correlation for physical layer security, EUCAP, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01188298

T. Mazloum, F. Mani, and A. Sibille, Analysis of secret key robustness in indoor radio channel measurements, VTC-spring, 2015.

. Sibille, Tag signals for early authentication and secret key generation in wireless public networks, EuCNC, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01188310

C. Kameni-ngassa, M. Renaud, F. Delaveau, T. Mazloum, and A. Sibille, Secret key generation scheme from WIFI and LTE reference signals COST meeting presentations [TD.1] T. Mazloum, F. Mani, and A. Sibille, A disc of scatterers based radio channel model for secure key generation, p.9017, 2013.

]. F. Mani, E. Vitucci, T. Mazloum, A. Sibille, and V. D. Esposti, Ray tracing simulations of indoor channel spatial correlation for physical layer security, TD(13) 08072, COST IC1004, 2014.

]. P. Kyosti, Winner ii channel model, 2007.

A. Wyner, The Wire-Tap Channel, Bell System Technical Journal, vol.54, issue.8, pp.1355-1367, 1975.
DOI : 10.1002/j.1538-7305.1975.tb02040.x

M. Bloch and J. Barros, Physical-layer security: From information theory to security engineering, 2011.
DOI : 10.1017/CBO9780511977985

W. Stallings, Cryptography and Network Security: Principles and Practice, 2005.

W. Diffie and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.22, issue.6, pp.644-654, 1976.
DOI : 10.1109/TIT.1976.1055638

M. Bloch, J. Barros, M. Rodrigues, and S. Mclaughlin, Wireless Information-Theoretic Security, IEEE Transactions on Information Theory, vol.54, issue.6, pp.2515-2534, 2008.
DOI : 10.1109/TIT.2008.921908

A. Thangaraj, S. Dihidar, A. Calderbank, S. Mclaughlin, and J. Merolla, Applications of LDPC Codes to the Wiretap Channel, IEEE Transactions on Information Theory, vol.53, issue.8, pp.2933-2945, 2007.
DOI : 10.1109/TIT.2007.901143

URL : https://hal.archives-ouvertes.fr/hal-00336754

X. H. He and A. Yener, Providing secrecy with lattice codes, 2008 46th Annual Allerton Conference on Communication, Control, and Computing, pp.1199-1206, 2008.
DOI : 10.1109/ALLERTON.2008.4797696

H. Mahdavifar and A. Vardy, Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes, IEEE Transactions on Information Theory, vol.57, issue.10, pp.6428-6443, 2011.
DOI : 10.1109/TIT.2011.2162275

N. Romero-zurita, M. Ghogho, and D. Mclernon, Physical layer security of mimoofdm systems by beamforming and artificial noise generation, Physical Communication on Advances in MIMO-OFDM, pp.313-321, 2011.

Y. Hong, P. Lan, and C. Kuo, Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches, IEEE Signal Processing Magazine, vol.30, issue.5, pp.29-40, 2013.
DOI : 10.1109/MSP.2013.2256953

R. Negi and S. Goel, Secret communication using artificial noise, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005., pp.1906-1910, 2005.
DOI : 10.1109/VETECF.2005.1558439

N. Anand, S. Lee, and E. Knightly, STROBE: Actively securing wireless communications using Zero-Forcing Beamforming, 2012 Proceedings IEEE INFOCOM, pp.720-728, 2012.
DOI : 10.1109/INFCOM.2012.6195817

C. Shannon, Communication Theory of Secrecy Systems*, Bell System Technical Journal, vol.28, issue.4, pp.656-715, 1949.
DOI : 10.1002/j.1538-7305.1949.tb00928.x

U. Maurer, Secret key agreement by public discussion from common information, IEEE Transactions on Information Theory, vol.39, issue.3, pp.733-742, 1993.
DOI : 10.1109/18.256484

R. Ahlswede and I. Csiszar, Common randomness in information theory and cryptography. I. Secret sharing, IEEE Transactions on Information Theory, vol.39, issue.4, pp.1121-1132, 1993.
DOI : 10.1109/18.243431

C. Bennet and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, Int. conf. on computers, systems and signal processing, pp.175-179, 1984.
DOI : 10.1016/j.tcs.2014.05.025

A. Ekert, Quantum cryptography based on Bell???s theorem, Physical Review Letters, vol.67, issue.6, 1991.
DOI : 10.1103/PhysRevLett.67.661

A. Hassan, W. Stark, J. Hershey, and S. Chennakeshu, Cryptographic Key Agreement for Mobile Radio, Digital Signal Processing, vol.6, issue.4, pp.207-212, 1996.
DOI : 10.1006/dspr.1996.0023

J. Hershey, A. Hassan, and R. Yarlagadda, Unconventional cryptographic keying variable management, IEEE Transactions on Communications, vol.43, issue.1, pp.3-6, 1995.
DOI : 10.1109/26.385951

T. Mazloum, F. Mani, and A. Sibille, Analysis of Secret Key Robustness in Indoor Radio Channel Measurements, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), 2015.
DOI : 10.1109/VTCSpring.2015.7145702

URL : https://hal.archives-ouvertes.fr/hal-01194191

T. Mazloum and A. Sibille, Analysis of Secret Key Randomness Exploiting the Radio Channel Variability, International Journal of Antennas and Propagation, vol.2015, p.2015
DOI : 10.1109/25.282271

URL : https://hal.archives-ouvertes.fr/hal-01354008

T. Mazloum and A. Sibille, Performance of secret key generation in non stationary channels, Proc. 2015 9th Europ. Conf. Antennas and Propagation (EuCAP'15), 2015.
URL : https://hal.archives-ouvertes.fr/hal-01188291

J. W. Strutt, The theory of sound, 1896.

H. Lorentz, The theorem of poynting concerning the energy in the electromagnetic field and two general propositions concerning the propagation of light, Amsterdammer Akademie der Wetenschappen, vol.4, pp.176-1896

J. Guey and L. Krasny, Transceiver design and performance evaluation of MIMO systems with forward link channel knowledge, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004, pp.1386-1390, 2004.
DOI : 10.1109/VETECF.2004.1400251

S. Premnath, S. Jana, J. Croft, P. Gowda, M. Clark et al., Secret Key Extraction from Wireless Signal Strength in Real Environments, IEEE Transactions on Mobile Computing, vol.12, issue.5, pp.917-930, 2013.
DOI : 10.1109/TMC.2012.63

S. Hamida, J. Pierrot, and C. Castelluccia, Empirical analysis of UWB channel characteristics for secret key generation in indoor environments, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp.1984-1989, 2010.
DOI : 10.1109/PIMRC.2010.5671596

A. Bourdoux, B. Come, and N. Khaled, Non-reciprocal transceivers in OFDM/SDMA systems: Impact and mitigation, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings, pp.183-186, 2003.
DOI : 10.1109/RAWCON.2003.1227923

F. Kaltenberger, H. Jiang, M. Guillaud, and R. Knopp, Relative channel reciprocity calibration in mimo/tdd systems, Proc. 2010 Future Network and Mobile Summit, pp.1-10, 2010.

M. Petermann, M. Stefer, D. Wubben, M. Schneider, and K. Kammeyer, Lowcomplexity calibration of mutually coupled non-reciprocal multi-antenna ofdm transceivers, 7th IEEE Intl. Symp. on Wireless Commun. Sys. (ISWCS), p.285289, 2010.

A. Mahmood and M. Jensen, Assessing and removing the impact of nonreciprocal transceiver circuitry for channel-based key establishment, Proc. 9th European Conf. on Antennas and Propagation (EuCAP), 2015.

Y. Han, J. Ni, and G. Du, The potential approaches to achieve channel reciprocity in FDD system with frequency correction algorithms, Proceedings of the 5th International ICST Conference on Communications and Networking in China, pp.1-5, 2010.
DOI : 10.4108/chinacom.2010.154

A. Molisch, Wireless Communications, 2005.

M. Gudmundson, Correlation model for shadow fading in mobile radio systems, Electronics Letters, vol.27, issue.23, pp.2145-2146, 1991.
DOI : 10.1049/el:19911328

B. Fleury, First- and second-order characterization of direction dispersion and space selectivity in the radio channel, IEEE Transactions on Information Theory, vol.46, issue.6, pp.2027-2044, 2000.
DOI : 10.1109/18.868476

G. Durgin and T. Rappaport, Basic relationship between multipath angular spread and narrowband fading in wireless channels, Electronics Letters, vol.34, issue.25, pp.2431-2432, 1998.
DOI : 10.1049/el:19981689

C. Oestges, N. Czink, B. Bandemer, P. Castiglione, F. Kaltenberger et al., Experimental Characterization and Modeling of Outdoor-to-Indoor and Indoor-to-Indoor Distributed Channels, IEEE Transactions on Vehicular Technology, vol.59, issue.5, pp.2253-2265, 2010.
DOI : 10.1109/TVT.2010.2042475

P. Almers, Survey of Channel and Radio Propagation Models for Wireless MIMO Systems, EURASIP Journal on Wireless Communications and Networking, vol.2007, issue.1, 2007.
DOI : 10.1109/LCOMM.2003.815655

S. Hamida, J. Pierrot, B. Denis, C. Castelluccia, and B. Uguen, On the Security of UWB Secret Key Generation Methods against Deterministic Channel Prediction Attacks, 2012 IEEE Vehicular Technology Conference (VTC Fall), pp.1-5, 2012.
DOI : 10.1109/VTCFall.2012.6399358

URL : https://hal.archives-ouvertes.fr/hal-00747839

E. Vitucci, F. Mani, T. Mazloum, A. Sibille, and V. D. Esposti, Ray tracing simulations of indoor channel spatial correlation for physical layer security, Proc. 2019 9th Europ. Conf. Antennas and Propagation (EuCAP'15), pp.1-5, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01188298

V. Degli-esposti, D. Guiducci, A. De-'marsi, P. Azzi, and F. Fuschini, An advanced field prediction model including diffuse scattering, IEEE Transactions on Antennas and Propagation, vol.52, issue.7, pp.1717-1728, 2004.
DOI : 10.1109/TAP.2004.831299

L. Liu, C. Oestges, J. Poutanen, K. Haneda, P. Vainikainen et al., The COST 2100 MIMO channel model, IEEE Wireless Communications, vol.19, issue.6, pp.92-99, 2012.
DOI : 10.1109/MWC.2012.6393523

A. Saleh and R. Valenzuela, A Statistical Model for Indoor Multipath Propagation, IEEE Journal on Selected Areas in Communications, vol.5, issue.2, pp.128-137, 1987.
DOI : 10.1109/JSAC.1987.1146527

J. Wallace and M. Jensen, Modeling the indoor MIMO wireless channel, IEEE Transactions on Antennas and Propagation, vol.50, issue.5, pp.591-599, 2002.
DOI : 10.1109/TAP.2002.1011224

H. Ozcelik, N. Czink, and E. Bonek, What Makes a Good MIMO Channel Model?, 2005 IEEE 61st Vehicular Technology Conference, pp.156-160, 2005.
DOI : 10.1109/VETECS.2005.1543269

W. Weichselberger, M. Herdin, H. Ozcelik, and E. Bonek, A stochastic MIMO channel model with joint correlation of both link ends, IEEE Transactions on Wireless Communications, vol.5, issue.1, pp.90-100, 2006.
DOI : 10.1109/TWC.2006.1576533

M. Patzold, B. Hogstad, and N. Youssef, Modeling, analysis, and simulation of MIMO mobile-to-mobile fading channels, IEEE Transactions on Wireless Communications, vol.7, issue.2, pp.510-520, 2008.
DOI : 10.1109/TWC.2008.05913

A. Borhani and M. Patzold, A non-stationary one-ring scattering model, 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp.2620-2625, 2013.
DOI : 10.1109/WCNC.2013.6554975

J. Karedal, F. Tufvesson, N. Czink, A. Paier, C. Dumard et al., A geometry-based stochastic MIMO model for vehicle-to-vehicle communications, IEEE Transactions on Wireless Communications, vol.8, issue.7, pp.3646-3657, 2009.
DOI : 10.1109/TWC.2009.080753

O. Renaudin, V. Kolmonen, P. Vainikainen, and C. Oestges, Non-Stationary Narrowband MIMO Inter-Vehicle Channel Characterization in the 5-GHz Band, IEEE Transactions on Vehicular Technology, vol.59, issue.4, pp.2007-2015, 2010.
DOI : 10.1109/TVT.2010.2040851

F. Graziosi and F. Santucci, A general correlation model for shadow fading in mobile radio systems, IEEE Communications Letters, vol.6, issue.3, pp.102-104, 2002.
DOI : 10.1109/4234.991146

T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels, IEEE Transactions on Antennas and Propagation, vol.53, issue.11, pp.3776-3784, 2005.
DOI : 10.1109/TAP.2005.858853

G. Tsouri and J. Wilczewski, Reliable symmetric key generation for body area networks using wireless physical layer security in the presence of an on-body eavesdropper, Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, ISABEL '11, pp.1-6, 2011.
DOI : 10.1145/2093698.2093851

K. Zeng, D. Wu, A. Chan, and P. Mohapatra, Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks, 2010 Proceedings IEEE INFOCOM, pp.1-9, 2010.
DOI : 10.1109/INFCOM.2010.5462004

J. Wallace and R. Sharma, Automatic secret keys from reciprocal mimo wireless channels: Measurement and analysis, IEEE Trans. Inform. Forensics and Security, vol.5, pp.381-392, 2010.

J. Croft, N. Patwari, and S. Kasera, Robust uncorrelated bit extraction methodologies for wireless sensors, Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN '10, pp.70-81, 2010.
DOI : 10.1145/1791212.1791222

S. Mathur, W. Trappe, N. Mandayan, C. Ye, and A. Reznik, Radio-telepathy, Proceedings of the 14th ACM international conference on Mobile computing and networking, MobiCom '08, pp.128-139, 2008.
DOI : 10.1145/1409944.1409960

C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe et al., Information-theoretically secret key generation for fading wireless channels, IEEE Trans. Information Forensics and Security, vol.5, pp.240-254, 2010.

C. Chen and M. Jensen, Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients, IEEE Transactions on Mobile Computing, vol.10, issue.2, pp.205-215, 2011.
DOI : 10.1109/TMC.2010.114

R. Wilson, D. Tse, and R. Scholtz, Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels, IEEE Transactions on Information Forensics and Security, vol.2, issue.3, pp.364-375, 2007.
DOI : 10.1109/TIFS.2007.902666

M. Madiseh, S. He, M. Mcguire, S. Neville, and X. Dong, Verification of secret key generation from uwb channel observations, Proc. 2009 IEEE Int. Conf. Communications (ICC'09), pp.1-5, 2009.

Y. Liu, S. Draper, and A. Sayeed, Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness, IEEE Transactions on Information Forensics and Security, vol.7, issue.5, pp.1484-1497, 2012.
DOI : 10.1109/TIFS.2012.2206385

R. Chou, M. Bloch, and E. Abbe, Polar coding for secret-key generation, Proc. 2013 IEEE Information Theory Workshop (ITW), pp.1-5, 2013.

U. Maurer and S. Wolf, Secret-key agreement over unauthenticated public channels-part III: privacy amplification, IEEE Transactions on Information Theory, vol.49, issue.4, pp.839-851, 2003.
DOI : 10.1109/TIT.2003.809559

A. Sibille, Analysis of Alice-Bob-Eve scenarios for secret key generation from random channels, 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS), pp.1-4, 2014.
DOI : 10.1109/URSIGASS.2014.6929292

R. Moliere, D. Delaveau, C. Ngassa, C. Lemenager, T. Mazloum et al., Tag signals for early authentication and Secret Key Generation in wireless public networks, 2015 European Conference on Networks and Communications (EuCNC), 2015.
DOI : 10.1109/EuCNC.2015.7194050

URL : https://hal.archives-ouvertes.fr/hal-01188310

F. Delaveau, A. Evestti, A. Kotelba, R. Savola, and N. Shapira, Active and passive eavesdropper threats within public and private cililian networks -existing and potential future countermeasures -an overview, 2013.

C. Ye, A. Reznik, and Y. Shah, Extracting Secrecy from Jointly Gaussian Random Variables, 2006 IEEE International Symposium on Information Theory, pp.2593-2597, 2006.
DOI : 10.1109/ISIT.2006.262101

T. Mazloum, F. Mani, and A. Sibille, A disc of scatterers based radio channel model for secure key generation, The 8th European Conference on Antennas and Propagation (EuCAP 2014), pp.1290-1294, 2014.
DOI : 10.1109/EuCAP.2014.6902012

M. Madiseh, M. Mcguire, S. Neville, and A. Shirazi, Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios, 6th Annual Communication Networks and Services Research Conference (cnsr 2008), pp.88-95, 2008.
DOI : 10.1109/CNSR.2008.52

A. Shahzadi, M. Madiseh, and A. Shirazi, Secret key capacity for wireless nakagami and suzuki fading channels, Int. Journal of Computer Science and Network Security (IJCSNS), vol.7, issue.3, pp.296-303, 2007.

I. Tunaru, B. Denis, and B. Uguen, Random patterns of secret keys from sampled IR-UWB channel responses, 2014 IEEE International Conference on Ultra-WideBand (ICUWB), pp.74-79, 2014.
DOI : 10.1109/ICUWB.2014.6958954

URL : https://hal.archives-ouvertes.fr/hal-01127769

A. Sayeed and A. Perrig, Secure wireless communications: Secret keys through multipath, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, pp.3013-3016, 2008.
DOI : 10.1109/ICASSP.2008.4518284

R. Sharma and J. Wallace, Bit error rate and efficiency analysis of wireless reciprocal channel key generation, 2010 IEEE International Conference on Wireless Information Technology and Systems, pp.1-4, 2010.
DOI : 10.1109/ICWITS.2010.5612262

S. Hamida, J. Pierrot, and C. Castelluccia, An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements, 2009 3rd International Conference on New Technologies, Mobility and Security, pp.1-5, 2009.
DOI : 10.1109/NTMS.2009.5384826

A. Pierrot, R. Chou, and M. Bloch, Experimental aspects of secret key generation in indoor wireless environments, 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC), pp.669-673, 2013.
DOI : 10.1109/SPAWC.2013.6612134

T. Ohira, Secret key generation exploiting antenna beam steering and wave propagation reciprocity, 2005 European Microwave Conference, pp.9-12, 2005.
DOI : 10.1109/EUMC.2005.1608780

R. Mehmood and J. Wallace, Experimental assessment of secret key generation using parasitic reconfigurable aperture antennas, 2012 6th European Conference on Antennas and Propagation (EUCAP), pp.1151-1155, 2012.
DOI : 10.1109/EuCAP.2012.6206173

P. Huang and X. Wang, Fast secret key generation in static wireless networks: A virtual channel approach, 2013 Proceedings IEEE INFOCOM, pp.2292-2300, 2013.
DOI : 10.1109/INFCOM.2013.6567033

L. Kang, S. Primak, and W. Xianbin, On secret key generation from multiple observations of wireless channels, Proc. 2014 IEEE Int. Conf. on Communication Systems (ICCS), pp.147-151, 2014.

S. Primak, K. Liu, and X. Wang, Secret Key Generation Using Physical Channels with Imperfect CSI, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), pp.1-5, 2014.
DOI : 10.1109/VTCFall.2014.6966172

G. Pasolini and D. Dardari, Secret Information of Wireless Multi-Dimensional Gaussian Channels, IEEE Transactions on Wireless Communications, vol.14, issue.6, pp.3429-3442, 2015.
DOI : 10.1109/TWC.2015.2406320

G. Tsouri and D. Wagner, Threshold Constraints on Symmetric Key Extraction from Rician Fading Estimates, IEEE Transactions on Mobile Computing, vol.12, issue.12, pp.2496-2506, 2013.
DOI : 10.1109/TMC.2012.226

K. Liu, S. Primak, and X. Wang, On secret key generation from multiple observations of wireless channels, 2014 IEEE International Conference on Communication Systems, pp.147-151, 2014.
DOI : 10.1109/ICCS.2014.7024783

S. Vaudenay, Secure Communications over Insecure Channels Based on Short Authenticated Strings, Advances in Cryptology CRYPTO 2005 (V. Shoup, pp.309-326, 2005.
DOI : 10.1007/11535218_19

J. Wallace, Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits, 2009 IEEE International Conference on Communications, pp.1-5, 2009.
DOI : 10.1109/ICC.2009.5199440

T. Cover and J. Thomas, Elements of Information Theory, 1991.

M. Madiseh, S. Neville, and M. Mcguire, Time Correlation Analysis of Secret Key Generation via UWB Channels, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp.1-6, 2010.
DOI : 10.1109/GLOCOM.2010.5683999

X. Zhu, F. Xu, E. Novak, C. Tan, Q. Li et al., Extracting secret key from wireless link dynamics in vehicular environments, 2013 Proceedings IEEE INFOCOM, pp.2283-2291, 2013.
DOI : 10.1109/INFCOM.2013.6567032

W. Burr, D. Dodson, and W. Polk, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST, 2010.

H. Koorapaty, A. Hassan, and S. Chennakeshu, Secure information transmission for mobile radio, IEEE Communications Letters, vol.4, issue.2, pp.52-55, 2000.
DOI : 10.1109/4234.824754

Q. Wang, H. Su, K. Ren, and K. Kim, Fast and scalable secret key generation exploiting channel phase randomness in wireless networks, 2011 Proceedings IEEE INFOCOM, pp.1422-1430, 2011.
DOI : 10.1109/INFCOM.2011.5934929

Y. Hajj-shehadeh, O. Alfandi, and D. Hogrefe, Towards robust key extraction from multipath wireless channels, Journal of Communications and Networks, vol.14, issue.4, pp.385-395, 2012.
DOI : 10.1109/JCN.2012.6292245

X. Gao, O. Edfors, F. Rusek, and F. Tufvesson, Massive MIMO Performance Evaluation Based on Measured Propagation Data, IEEE Transactions on Wireless Communications, vol.14, issue.7, pp.3899-3911, 2015.
DOI : 10.1109/TWC.2015.2414413

K. Pedersen, P. Mogensen, and B. Fleury, Spatial channel characteristics in outdoor environments and their impact on BS antenna system performance, VTC '98. 48th IEEE Vehicular Technology Conference. Pathway to Global Wireless Revolution (Cat. No.98CH36151), pp.719-723, 1998.
DOI : 10.1109/VETEC.1998.683676

J. Andersen, J. Nielsen, G. Pedersen, G. Bauch, and M. Herdin, Room electromagnetics, IEEE Antennas and Propagation Magazine, vol.49, issue.2, pp.27-33, 2007.
DOI : 10.1109/MAP.2007.376642

A. Richter, The Contribution of Distributed Scattering in Radio Channels to Channel Capacity: Estimation and Modeling, 2006 Fortieth Asilomar Conference on Signals, Systems and Computers, pp.951-955, 2006.
DOI : 10.1109/ACSSC.2006.354892

J. Kunisch and J. Pamp, Measurement results and modeling aspects for the UWB radio channel, 2002 IEEE Conference on Ultra Wideband Systems and Technologies (IEEE Cat. No.02EX580), pp.19-23, 2002.
DOI : 10.1109/UWBST.2002.1006310

V. Erceg, Tgn channel models, 2004.

G. Breit, Tgac channel model addendum, 2010.

R. Saadane, A. Menouni, R. Knopp, and D. Aboutajdine, Empirical eigenanalysis of indoor UWB propagation channels, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., pp.3215-3219, 2004.
DOI : 10.1109/GLOCOM.2004.1378944

K. Borner, J. Dommel, S. Jaeckel, and L. Thiele, On the requirements for quasi-deterministic radio channel models for heterogeneous networks, 2012 International Symposium on Signals, Systems, and Electronics (ISSSE), pp.1-5, 2012.
DOI : 10.1109/ISSSE.2012.6374332

A. Molisch, A Generic Model for MIMO Wireless Propagation Channels in Macro- and Microcells, IEEE Transactions on Signal Processing, vol.52, issue.1, pp.61-71, 2004.
DOI : 10.1109/TSP.2003.820144

H. Asplund, A. Glazunov, A. Molisch, K. Pedersen, and M. Steinbauer, The COST 259 Directional Channel Model-Part II: Macrocells, IEEE Transactions on Wireless Communications, vol.5, issue.12, pp.3434-3450, 2006.
DOI : 10.1109/TWC.2006.256967

L. Vuokko, V. Kolmonen, J. Salo, and P. Vainikainen, Measurement of Large-Scale Cluster Power Characteristics for Geometric Channel Models, IEEE Transactions on Antennas and Propagation, vol.55, issue.11, pp.3361-3365, 2007.
DOI : 10.1109/TAP.2007.908844

S. Szyszkowicz, H. Yanikomeroglu, and J. Thompson, On the Feasibility of Wireless Shadowing Correlation Models, IEEE Transactions on Vehicular Technology, vol.59, issue.9, pp.4222-4236, 2010.
DOI : 10.1109/TVT.2010.2082006

F. Graziosi, M. Pratesi, M. Ruggieri, and F. Santucci, A multicell model of handover initiation in mobile cellular networks, IEEE Transactions on Vehicular Technology, vol.48, issue.3, pp.802-814, 1999.
DOI : 10.1109/25.764997

A. Borhani and M. Patzold, A Unified Disk Scattering Model and Its Angle-of-Departure and Time-of-Arrival Statistics, IEEE Transactions on Vehicular Technology, vol.62, issue.2, pp.473-485, 2013.
DOI : 10.1109/TVT.2012.2227859

A. Borhani and M. Patzold, Modelling of non-stationary mobile radio channels using two-dimensional brownian motion processes, 2013 International Conference on Advanced Technologies for Communications (ATC 2013), pp.241-246, 2013.
DOI : 10.1109/ATC.2013.6698114

O. Renaudin, V. Kolmonen, P. Vainikainen, and C. Oestges, Wideband Measurement-Based Modeling of Inter-Vehicle Channels in the 5-GHz Band, IEEE Transactions on Vehicular Technology, vol.62, issue.8, pp.3531-3540, 2013.
DOI : 10.1109/TVT.2013.2257905

F. Amoroso and W. Jones, Geometric model for DSPN satellite reception in the dense scatterer mobile environment, IEEE Transactions on Communications, vol.41, issue.3, pp.450-453, 1993.
DOI : 10.1109/26.221077

Y. Corre and Y. Lostanlen, Three-Dimensional Urban EM Wave Propagation Model for Radio Network Planning and Optimization Over Large Areas, IEEE Transactions on Vehicular Technology, vol.58, issue.7, pp.3112-3123, 2009.
DOI : 10.1109/TVT.2009.2016973

V. Degli-esposti, F. Fuschini, E. Vitucci, and G. Falciasecca, Measurement and Modelling of Scattering From Buildings, IEEE Transactions on Antennas and Propagation, vol.55, issue.1, pp.143-153, 2007.
DOI : 10.1109/TAP.2006.888422

Y. Lostanlen and G. Gougeon, Introduction of diffuse scattering to enhance ray-tracing methods for the analysis of deterministic indoor UWB radio channels (Invited Paper), 2007 International Conference on Electromagnetics in Advanced Applications, pp.903-906, 2007.
DOI : 10.1109/ICEAA.2007.4387451

D. Cox and R. Leck, Distributions of multipath delay spread and average excess delay for 910-MHz urban mobile radio paths, IEEE Transactions on Antennas and Propagation, vol.23, issue.2, pp.206-213, 1975.
DOI : 10.1109/TAP.1975.1141042

H. Ghannoum, S. Bories, C. Roblin, and A. Sibille, Biconical antennas for intrinsic characterization of the UWB channel, IWAT 2005. IEEE International Workshop on Antenna Technology: Small Antennas and Novel Metamaterials, 2005., pp.101-104, 2005.
DOI : 10.1109/IWAT.2005.1461014

H. Hashemi and D. Tholl, Statistical modeling and simulation of the RMS delay spread of indoor radio propagation channels, IEEE Transactions on Vehicular Technology, vol.43, issue.1, pp.110-120, 1994.
DOI : 10.1109/25.282271

T. Jamsa, V. Hovinen, A. Karjalainen, and J. Iinatti, Frequency dependency of delay spread and path loss in indoor ultra-wideband channels, IET Seminar on Ultra Wideband Systems, Technologies and Applications, pp.254-258, 2006.
DOI : 10.1049/ic:20060520

S. Geng and P. Vainikainen, Frequency and Bandwidth Dependency of UWB Propagation Channels, 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications, pp.1-5, 2006.
DOI : 10.1109/PIMRC.2006.254447

C. Kameni-ngassa, M. Renaud, F. Delaveau, T. Mazloum, and A. Sibille, Secret key generation scheme from WiFi and LTE reference signals, WinnComm 2016, p.2016
DOI : 10.1007/s10470-017-0941-3

Y. Dodis, L. Reyzin, and A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Advances in Cryptology -EU- ROCRYPT 2004, pp.523-540, 2004.
DOI : 10.1007/978-3-540-24676-3_31

C. Bennett, G. Brassard, C. Crepeau, and U. Maurer, Generalized privacy amplification, IEEE Transactions on Information Theory, vol.41, issue.6, pp.1915-1923, 1995.
DOI : 10.1109/18.476316

Y. Zou, O. Raeesi, and M. Valkama, Efficient Estimation and Compensation of Transceiver Non-Reciprocity in Precoded TDD Multi-User MIMO-OFDM Systems, 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), pp.1-7, 2014.
DOI : 10.1109/VTCFall.2014.6965954