Adaptive chaotic map-based key extraction for efficient cross-layer authentication in VANETs

被引:12
作者
Shawky, Mahmoud A. [1 ]
Usman, Muhammad [2 ]
Imran, Muhammad Ali [1 ]
Abbasi, Qammer H. [1 ]
Ansari, Shuja [1 ]
Taha, Ahmad [1 ]
机构
[1] Univ Glasgow, James Watt Sch Engn, Glasgow G12 8QQ, Scotland
[2] Glasgow Caledonian Univ, Sch Comp Engn & Built Environm, Glasgow G4 0BA, Scotland
基金
英国工程与自然科学研究理事会;
关键词
Chebyshev chaotic mapping; Cross-layer authentication; Doppler emulation; Physical-layer signatures; Secret key extraction; Vehicular ad-hoc networks; PHYSICAL-LAYER; CHANNEL ESTIMATION; SCHEME; SECURE;
D O I
10.1016/j.vehcom.2022.100547
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Vehicle-to-everything (V2X) communication is expected to offer users available and ultra-reliable transmission, particularly for critical applications related to safety and autonomy. In this context, establishing a secure and resilient authentication process with low latency and high functionality may not be achieved using conventional cryptographic methodologies due to their significant computation costs. Recent research has focused on employing the physical (PHY) characteristics of wireless channels to develop efficient discrimination techniques to overcome the shortcomings of crypto-based authentication. This paper presents a cross-layer authentication scheme for multicarrier communication, leveraging the spatially/temporally correlated wireless channel features to facilitate key verification without exposing its secrecy. By mapping the time-stamped hashed key and masking it with channel phase responses, we create a PHY-layer signature, allowing for verifying the sender's identity while employing the correlated channel responses between subcarriers to verify messages' integrity. Furthermore, we developed a Diffie-Hellman secret key extraction algorithm that employs the computationally intractable problems of the Chebyshev chaotic mapping for channel probing. Thus, terminals can extract high entropy shared keys that can be used to create dynamic PHY-layer signatures, supporting forward and backward secrecy. We evaluated the scheme's security strength against active/passive attacks. Besides theoretical analysis, we designed a 3-Dimensional (3D) scattering Doppler emulator to investigate the scheme's performance at different speeds of a moving vehicle and signal-to-noise ratios (SNRs) for a realistic vehicular channel. Theoretical and hardware implementation analyses proved the capability of the proposed scheme to support high detection probability at SNR >= 0 dB and speed <= 45 m/s.(c) 2022 The Author(s). Published by Elsevier Inc.
引用
收藏
页数:14
相关论文
共 47 条
[1]   An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network [J].
Al-shareeda, Mahmood A. ;
Anbar, Mohammed ;
Manickam, Selvakumar ;
Hasbullah, Iznan H. .
SYMMETRY-BASEL, 2020, 12 (10) :1-25
[2]   Physical-layer entity authentication scheme for mobile MIMO systems [J].
Althunibat, Saud ;
Sucasas, Victor ;
Mantas, Georgios ;
Rodriguez, Jonathan .
IET COMMUNICATIONS, 2018, 12 (06) :712-718
[3]   A survey on security attacks in VANETs: Communication, applications and challenges [J].
Arif, Muhammad ;
Wang, Guojun ;
Bhuiyan, Md Zakirul Alam ;
Wang, Tian ;
Chen, Jianer .
VEHICULAR COMMUNICATIONS, 2019, 19
[4]   A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks [J].
Asaar, Maryam Rajabzadeh ;
Salmasizadeh, Mahmoud ;
Susilo, Willy ;
Majidi, Akbar .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (06) :5409-5423
[5]  
Barker E., 2000, A statistical test suite for random and pseudorandom number generators for cryptographic applications
[6]   NERA: A new and efficient RSU based authentication scheme for VANETs [J].
Bayat, Majid ;
Pournaghi, Morteza ;
Rahimi, Majid ;
Barmshoory, Mostafa .
WIRELESS NETWORKS, 2020, 26 (05) :3083-3098
[7]   CircStat: A MATLAB Toolbox for Circular Statistics [J].
Berens, Philipp .
JOURNAL OF STATISTICAL SOFTWARE, 2009, 31 (10) :1-21
[8]   Physical characteristics of wireless communication channels for secret key establishment: A survey of the research [J].
Bottarelli, Mirko ;
Epiphaniou, Gregory ;
Ben Ismail, Dhouha Kbaier ;
Karadimas, Petros ;
Al-Khateeb, Haider .
COMPUTERS & SECURITY, 2018, 78 :454-476
[9]   Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase [J].
Cheng, Longwang ;
Zhou, Li ;
Seet, Boon-Chong ;
Li, Wei ;
Ma, Dongtang ;
Wei, Jibo .
MOBILE INFORMATION SYSTEMS, 2017, 2017
[10]   Authentication scheme for mobile OFDM based on security information technology of physical layer over time-variant and multipath fading channels [J].
Chin, Wen-Long ;
Trong Nghia Le ;
Tseng, Chun-Lin .
INFORMATION SCIENCES, 2015, 321 :238-249