Delay Analysis of Physical-Layer Key Generation in Dynamic Roadside-to-Vehicle Networks

被引:21
作者
Jin, Rong [1 ]
Du, Xianru [2 ]
Zeng, Kai [3 ]
Huang, Liqun [4 ]
Xiao, Laiyuan [4 ]
Xu, Jing [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Elect Informat & Commun, Wuhan 430074, Peoples R China
[2] Univ Michigan, Dept Comp & Informat Sci, Dearborn, MI 48128 USA
[3] George Mason Univ, Dept Elect & Comp Engn, Fairfax, VA 22030 USA
[4] Huazhong Univ Sci & Technol, Sch Software Engn, Wuhan 430074, Peoples R China
关键词
Channel probing; delay analysis; dynamic wireless networks; physical layer key generation; roadside unit; vehicular networks; wireless networks; PRIVACY AMPLIFICATION; WIRELESS NETWORKS; PERFORMANCE; INFORMATION; CHANNELS;
D O I
10.1109/TVT.2016.2582853
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Secret key generation by extracting the shared randomness in a wireless fading channel is a promising way to ensure wireless communication security. Previous studies only consider key generation in static networks, but real-world key establishments are usually dynamic. In this paper, for the first time, we investigate the pairwise key generation in dynamic wireless networks with a center node and random arrival users (e.g., roadside units (RSUs) with vehicles). We establish the key generation model for these kinds of networks. We propose a method based on discrete Markov chain to calculate the average time a user will spend on waiting and completing the key generation, called average key generation delay (AKGD). Our method can tackle both serial and parallel key generation scheduling under various conditions. We propose a novel scheduling method, which exploits wireless broadcast characteristic to reduce AKGD and probing energy. We conduct extensive simulations to show the effectiveness of our model and method. The analytical and simulation results match each other.
引用
收藏
页码:2526 / 2535
页数:10
相关论文
共 23 条
[1]  
[Anonymous], 2008, QUEUEING MODELLING F
[2]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[3]  
Brassard G., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P410
[4]   Linking information reconciliation and privacy amplification [J].
Cachin, C ;
Maurer, UM .
JOURNAL OF CRYPTOLOGY, 1997, 10 (02) :97-110
[5]   Secrecy capacities for multiple terminals [J].
Csiszár, I ;
Narayan, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (12) :3047-3061
[6]   Performance of the 802.11p Physical Layer in Vehicle-to-Vehicle Environments [J].
Fernandez, Joseph A. ;
Borries, Kevin ;
Cheng, Lin ;
Kumar, B. V. K. Vijaya ;
Stancil, Daniel D. ;
Bai, Fan .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2012, 61 (01) :3-14
[7]   Queuing delay analysis for packet schedulers with/without multiuser diversity over a fading channel [J].
Ishizaki, Fumio ;
Hwang, Gang Uk .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2007, 56 (05) :3220-3227
[8]  
JANA S, 2009, P 15 ANN INT C MOB C, P321, DOI DOI 10.1145/1614320.1614356
[9]  
Jin R, 2014, IEEE ICC, P901, DOI 10.1109/ICC.2014.6883434
[10]   Secret-Key Generation Using Correlated Sources and Channels [J].
Khisti, Ashish ;
Diggavi, Suhas N. ;
Wornell, Gregory W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2012, 58 (02) :652-670